Tuesday, October 8, 2019

How to handle cyber?

How to handle cyber?

Cyberdefense is one of the most advanced and newest areas of military, and it is called as the fourth element in the things, that military force must control and handle. The cyberattacks are a new threat in the military strategies, and it can be used alone or with other weapon systems. Cyber attacks against web pages are commonly used for disturbing the business and governmental operations, and they have, of course, brought very much publicity for Eastern operators.

One of the biggest problems in cyber defense is how to detect homepages, which contains fake information, or what is using purely trolling? Of course, the data traffic to those homepages is easy to deny, but the thing is that also homepages, what is containing legal and right information can deny. So because of this, there could be a solution that might collect some data of the devices, which are used to make denial requests.

When people are making reports that some homepages are containing illegal or faked information, artificial intelligence can keep the database, what kind of persons are wanted that homepages are denied. The system could collect the data like the nationality of the user of the device, which is used to make that request. And the things like are the owners of those devices some firms can also save in the database.

That thing would help to focus are some homepages causing embarrassing situations in some specific countries or companies, and that would begin the investigations about what is going on with that homepage. And the data, what this homepage involves can analyze. Sometimes is very easy to recognize the reason, why some information is embarrassing for some actors. But sometimes the reason is somehow hard to notice. In those cases, the question is are the denial petitions made for cheating or some other reasons like covering environmental crimes.

But when we are thinking about the way to make cyberattacks, we must understand that there are many ways to make those things. One is simply the "denial of service" attack against homepages, which are gates to some services. In that case, the server or IP-address is bombed multiple "echo request" or simpler to say "ping" calls, what denies the other transmitting with those homepages.

Those attacks are easy to deny by closing the IP-addresses, where that transmitting comes.  But when we are thinking of the cyberattack from the military actions, the military force would operate in two ways. One is the approximate attacks against some social service and other homepages. Of course, those attacks have a great propaganda value, but that thing might disturb so-called real military and intelligence operations.

If we would make meanless attacks against targets like some culture ministry, we would give the warning to the enemy, and the opposite side might track the servers, which is taking part in the attack. And if we would see that attack is reported in the news, we might notice that we are uncovered. When we are looking at statistics that China and Russia along with Iran are top places in the cyberattacks, that thing might tell something like their intelligence is active and they are willing to make those things.

But it can also tell that those countries have caught many times. When we are thinking about Western Intelligence agencies, we must ask one question: are those operators only using more sophisticated and advanced tools in their operations? That might mean that the Western operators have just not caught from those attacks.

And there is a possibility, that some of those attacks might be done by using remote-controlled computers, which is operated from some other country. The bad relationships with Western nations with those countries might give a shield for regular industrial spies, who might work for private operators for making their missions. But when we are thinking about the cyberdefense, it would be a more complicated thing, what we ever believe.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Quantum microchips and photonic interactions.

"Artistic representation of metasurface quantum graphs. Credit: Joshua Mornhinweg" (ScitechDaily, Harvard Just Collapsed a Quantum...