Cybersecurity and Cyberwar (55 page)

Read Cybersecurity and Cyberwar Online

Authors: Peter W. Singer Allan Friedman,Allan Friedman

BOOK: Cybersecurity and Cyberwar
13.05Mb size Format: txt, pdf, ePub

People's Liberation Army (PLA):
The Chinese military.

phishing:
An attempt to fool the user into voluntarily supplying credentials, such as a password or bank account number, often by spoofed e-mails or fake web pages. “Spear phishing” attacks are customized to target specific individuals.

protocol:
A set of formats and rules that defines how communications can be exchanged.

pwn:
Hacker term meaning to “own,” or take control of, a rival's systems and networks.

ransomware:
A type of malware that restricts access to a target and demands payment to return regular service.

red-team:
To examine and/or simulate an attack on oneself, in order to identify and close vulnerabilities before an adversary can do so. Often performed by “white hat” hackers.

RickRolling:
The Internet meme of tricking someone into watching a horribly addictive music video by 1980s singer Rick Astley.

root access:
The ability to read and write to every file on a system. This ability is necessary for the administration of an operating system, but if adversaries get root access, they “pwn” the system.

Secure Internet Protocol Router Network (SIPRNet):
The US military's classified network, used to communicate secret information following the same basic protocols as the broader Internet.

social engineering:
The practice of manipulating people into revealing confidential information online.

SQL injection:
A common attack vector against web servers. The attacker attempts to trick a website into passing a “rogue” Structured Query Language (SQL) command to the database. If the database program can be compromised, the attacker may be able to gain access to other files or permissions on the server.

Structured Query Language (SQL):
A type of programming language used to manage data.

Stuxnet:
Created by US and Israeli intelligence agencies, a computer worm specifically designed to sabotage Iranian nuclear research facilities.

supervisory control and data acquisition (SCADA):
A type of industrial control system, particularly used to monitor and manage interconnected sensors and control large facilities.

test beds:
Extensible models and mockups used to simulate large IT systems, networks, and operational environments, on which attacks and defenses can be mimicked, replicated, and practiced.

Tor:
Short for “The Onion Router,” an overlay network that provides online protection against surveillance and traffic analysis. Originally developed with US government funding, now maintained and operated by an international group of volunteers and researchers.

Transport Control Protocol (TCP):
Paired with the Internet Protocol, one of the foundational protocols of the Internet. Developed by Vint Cerf and Bob Kahn in 1974, TCP manages expectations that each end of a networked communication link has of the other end.

Trojan:
A type of malware disguised or attached to legitimate or innocuous-seeming software, but that instead carries a malicious payload, most often opening a backdoor to unauthorized users. Named after a large wooden farm animal.

typosquatting:
The practice of registering web domains just one letter off from a popular website, and collecting advertisement revenue from the page visits by those with clumsy fingers.

Unit 61398:
Also known in cybersecurity circles as the “Comment Crew” or “Shanghai Group,” a key unit in the Chinese military tasked with gathering political, economic, and military-related intelligence on the United States through cyber means. In 2013, it was caught stealing employee passwords to break into the computer networks of the
New York Times
.

virus:
A malware program that can replicate itself and spread from computer to computer.

watering hole:
A type of attack that targets specific groups by compromising websites frequently visited by that community or occupation.

whitelisting:
A security practice that defines a set of acceptable software, e-mail senders, or other components, then bans everything else.

WikiLeaks:
An online organization formed in 2006 with the goal of “exposing corruption and abuse around the world.” It is also frequently used to refer to a series of scandals in 2010, when a trove of US diplomatic cables were released online.

worm:
A type of malware that spreads automatically over a network, installing and replicating itself. The network traffic from rapid replication and spread can cripple networks even when the malware does not have a malicious payload.

zero day:
An attack that exploits a previously unknown vulnerability; taken from the notion that the attacks takes places on the zeroth day of the awareness. Knowledge about zero-day exploits are valuable to both defenders and attackers.

zombie:
A computer that has been compromised by an outside party, for the purpose of exploiting its computational and network resources; frequently linked into a botnet.

INDEX

9/11.
See
September 11

access control,
49
–
51

Acquisti, Alessandor,
31

Advanced Persistent Threat (APT),
55
–
60
,
91
,
141
,
188
–
189

Advanced Research Projects Agency (ARPA).
See
DARPA

Advanced Research Projects Agency Network (ARPANET),
16
,
18

Afghanistan,
96
,
101

air gap,
53
,
63
,
168

Alexander, Keith,
134
,
144
,
167

Algeier, Scott,
224

Alperovitch, Dmitri,
91
–
92
,
94
–
96
,
146
,
232

Al-Qaeda,
96
–
100
,
105

Anonymous,
78
,
80
–
84
,
112

Arab Spring,
88
,
109

Assange, Julian,
51
–
54
,
84
,
195

Assente, Michael,
233

asymmetric cryptography.
See
cryptography

Automated Teller Machine (ATM),
32
,
85
,
244

Autonomous System (AS),
24
–
25

Axelrod, Robert,
182
,
193

Baker, Stewart,
215

Barlow, John,
84
,
181

Baruch Plan,
160
,
162

Bataller, Erik,
226

Beijing Olympics,
75
,
92

Bellovin, Steve,
166
,
169

Bernard, Baruch.
See
Baruch Plan

Biden, Joe,
195

Big Data,
250

Bin Laden, Osama,
101
–
102
,
105

biometric,
32
,
244

Bitcoin.
See
digital currency

black market (digital),
73
,
90
,
98
,
109
,
158
,
178
.
See also
Silk Road

blue-team.
See
red-team

Botnets

and attribution,
72
–
73

combating against,
176
,
187
,
208

definition of,
44
–
45

Braithwaite, Bill,
231

Brammer, Robert,
240

Brenner, Joel,
121
,
234

Britain,
83
–
84
,
105
,
181

Brookings Institution,
21
–
23
,
57
,
249
–
250

Brown, Brittany,
102

Bucci, Steven,
242

Bush, George W.,
15
,
199

Byzantine Hades,
75

Cartwright, James,
156

cats,
10
,
21
,
38
,
174
,
193
,
219
,
252
,
254

cell phone.
See
mobile device

Center for Disease Control (CDC),
173
–
175

Central Intelligence Agency (CIA),
35
–
36
,
92
–
93
,
192
,
199
,
207

Cerf, Vint,
19
,
156

Certificate Authority (CA),
48
–
49

Charney, Scott,
176

China

as cyberattack target,
77
,
128

domestic Internet use,
15
,
54
,
72
,
107
,
110
,
252

offensive cyber operations,
57
,
59
–
60
,
75
–
76
,
78
,
92
–
95
,
112
–
114
,
138
–
144
,
226

U.S.–China relations,
7
,
60
,
68
–
70
,
74
,
121
,
180
,
188
–
189
,
192
–
193
,
214
–
215
(
see also
Great Firewall; Javaphile; People's Liberation Army (PLA); Unit 61398)

Citigroup,
37
–
38
,
68

Clark, David,
30

Clausewitz, Carol Von,
126

Clinton, Hillary,
106
–
107

Clinton, Larry,
234
–
235

cloud computing,
106
,
248
–
250

CNN,
113
,
214

Cold War,
67
,
121
–
122
,
147
–
149
,
160
–
162
,
173
–
174
,
192
,
238

Comment Crew.
See
Unit 61398

Computer Emergency Response Team (CERT),
188
,
200

computer network operations (CNO),
126
–
127

computer science,
19
,
65
,
142
,
239

Conficker,
72
–
73
,
196
–
197
,
244

Congress,
8
,
12
,
20
,
68
,
107
,
138
,
164
,
198
,
202
,
209
,
227

critical infrastructure

definition of,
15

protection of,
167
–
168

regulation,
200
,
202
,
210

vulnerability of,
63
,
97

Croom, Charles,
155

cryptography,
47
–
49
,
133

Cult of the Dead Cow,
77

cult of the offensive,
153

cyber arms race,
4
,
157
,
160
–
163
,
236

Cyber Command (CYBERCOM),
133
–
135

cyber theft,
26
,
92
,
95
,
125
,
146
,
177
,
189
,
219
–
220

cyberterrorism,
97
–
99

DARPA,
17
,
156
,
204

Defense Science Board,
144
–
145

Deibert, Ronald,
74
–
75
,
164
,
187

Dempsey, Martin,
249

Department of Defense

and creation of the Internet,
13
,
203

and cybersecurity,
52
–
53
,
133
,
198
,
225
(
see also
Cyber Command (CYBERCOM))

Department of Homeland Security (DHS),
36
–
37
,
133
,
199
–
200
,
220
,
235
–
236

deterrence,
70
,
136
–
137
,
144
–
147
,
155
–
156
,
161

device driver,
116

digital currency,
207

digital native,
4

Distributed Denial of Service (DDoS)

and attribution,
208

definition of,
44
–
45

examples of,
111
,
113
,
199

DNS Changer Virus,
169

Doctorow, Cory,
165

Domain Name System (DNS),
22

doxing

definition of,
79

examples of,
81
,
84

drive-by attack,
43
–
44

drone.
See
unmanned systems

Dungle, Lynn,
240

Dunlap, Charles,
124

Electronic Disturbance Theater,
78

Other books

A Lovely Day to Die by Celia Fremlin
Bloodlust by Alex Duval
The Bee Hut by Dorothy Porter
The Listeners by Monica Dickens
CHERUB: The Fall by Robert Muchamore
The Commander by CJ Williams
The Excursion Train by Edward Marston
The Goodbye Bride by Denise Hunter
Mass Effect: The Complete Novels 4-Book Bundle by Karpyshyn, Drew, Dietz, William C.