• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

The New Battlefield: Cyberspace


By VARINDIA - 2017-04-16
The New Battlefield: Cyberspace

Methodology to Protect Critical Assets from Cyberattacks

Cyberspace has joined air, sea, land, and outer space as an arena of military interest, but the concept of cyberwarfare continues to evolve beyond the grasp of military leaders.
 
The strength of a nation is measured mainly by its economic success, social progression, scientific and technological advances, and military power. The role of a nation’s military is to protect its citizens and territory; a secure populace has the freedom to maintain and develop its economy. However, with the rise of cyberwarfare, citizens, corporations, and governments are left vulnerable to cyberattacks via computers and communications systems. This requires a dramatic shift in military tactics and functionality. Nations are now open to forms of attack besides physical force; one can undermine countries’ economic strength by paralyzing the economic values of civilians through covert cyberattacks. Governments operate largely in cyberspace with highly sensitive information, and traditional military services will likely soon expand to protect state information from cyberattacks. 

 

The damage that cyberattacks could potentially inflict on a nation and its industrial control systems is significantly more threatening than the damage that would result from attacks on IT systems. A review of a number of such cases in the past year shows that attackers are now more interested in targeted attacks on industrial control systems. Therefore, this is a good time to assess how we protect these systems.


(Follow to Fortinet report) Industrial control systems (ICS) are computerized systems that supervise the physical processes such as electricity transmission, transportation of gas and oil through pipelines, water supply, traffic lights, and other systems that are used as the foundation of modern society. Supervisory control and data acquisition (SCADA) systems are the branch of ICS that manages the electronic exchange of data. In recent years, these control systems - on which our most critical infrastructures and manufacturing industries depend – have been under sophisticated cyberattacks with alarming frequency. 

 

An example of such an attack occurred in 2011 when hackers damaged a main water pump in Chicago, Illinois; it is believed that they gained access to the utility’s network and broke the pump by remotely turning it on and off quickly. The Federal Bureau of Investigation and the Department of Homeland Security launched an investigation of the case, which has sparked fears of hackers’ infiltration and subsequent paralysis of public systems that are essential to the safety of our society.

 

Another example of a recent cyberattack occurred in India at the beginning of this year, when hackers infiltrated the systems of three government-owned banks to create fake trade documents, which were used to conduct illegal purchases and to raise funds abroad. To try to determine whether their systems have been hacked and tampered with, and to try to prevent future hacks, banks now have to check the documents that were shared through SWIFT (Society for Worldwide Interbank Financial Telecommunication) against the actual documents at their base. Finding the origin of these attacks and tracing the hackers can be a daunting task, involving “obtaining logs from ISPs and other entities since international data travels over the Internet straddling multiple service providers across geographies.”  Officials are left struggling to keep up with the rapidly advancing cyberattack methods and technologies, with the hackers usually working one step ahead.

 

So what is needed to combat the enemy on what is clearly the most threatening emerging battleground of our world? The answer, like the problem, is complex. But it clearly requires a new way of thinking about security, the military, and the government, as well as new strategies, fields of study, and technological tools. In an age when our most sensitive information and most valuable assets are stored electronically, cybersecurity has become one of the most important fields in which individuals, businesses, and governments must invest.

 

In concluding the first of a series of articles written by Mrs. Carmit Yadin, the Vital Intelligence Group CISO, it is well noted that the author who is from Israel appears to be insinuating that the cyber threatsfaced by a tiny powerhouse of security excellence pave the wayin methods that are indeed consistent with the countries general national security concept.We hereby assume that learning and understanding that advancing and ongoing cyber security measures must not only be proactive but must in many ways be predicative as well.

By Carmit Yadin, CISO and Director of Cyber Division, Vital Intelligence Group

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.