Cyber Warfare
Hey, eallow me to introduction the situation.
I am like the "unoffical" technical expert for my debate club, and we have a internationl conference invovling roughly 7-8 different nations, and even more nationalities and roughly 500 students. Now each year we pick a subject matter expert to testify and take a few Qs about the topic.
I was chosen for this year to speak of cyber threats. My job is pick several various situations and describe them. Only thing I could think of any idea would be connecting a rouge switch up to a network with a higher revision number but thats hardly a serious cyber terriosm threat.
So I wondering for all the secuirty guys whats some threats, even if they are not all that serious and how we can connect them.
I am like the "unoffical" technical expert for my debate club, and we have a internationl conference invovling roughly 7-8 different nations, and even more nationalities and roughly 500 students. Now each year we pick a subject matter expert to testify and take a few Qs about the topic.
I was chosen for this year to speak of cyber threats. My job is pick several various situations and describe them. Only thing I could think of any idea would be connecting a rouge switch up to a network with a higher revision number but thats hardly a serious cyber terriosm threat.
So I wondering for all the secuirty guys whats some threats, even if they are not all that serious and how we can connect them.
Comments
-
dynamik Banned Posts: 12,312 ■■■■■■■■■□I'd start here:
http://en.wikipedia.org/wiki/Cyber-warfare
http://twit.tv/sn82
The Security Now! podcast will go into much more detail than the Wikipedia article. It's definitely worth a listen. -
supertechCETma Member Posts: 377Cyber Terrorism – Is it a real threat?
By Marty Musters CISSP, CFE
http://www.computerforensics.ca/images/Cyber%20Terrorism.pdf
The Myths and Facts behind Cyber Security Risks
for Industrial Control Systems
http://www.isa.org/CustomSource/ISA/Div_PDFs/PDF_News/Glss_2.pdf
Electronic Technicians Association-International www.eta-i.org
The Fiber Optic Association www.thefoa.org
Home Acoustics Alliance® http://www.homeacoustics.net/
Imaging Science Foundation http://www.imagingscience.com/ -
cacharo Member Posts: 361Here is another well-written article I used to cite for a paper.
http://www.symantec.com/avcenter/reference/cyberterrorism.pdfTreat people as if they were what they ought to be, and you help them become what they are capable of being. -
c0d3_w0lf Member Posts: 117Bruce Schneier is a well-known security expert. I'd google him up and check out some of the stuff he's written. (He's written a couple of books about Cryptography that have almost become standard textbooks on the subject...really smart guy x.x)There is nothing that cannot be acheived.
-
liven Member Posts: 918c0d3_w0lf wrote:Bruce Schneier is a well-known security expert. I'd google him up and check out some of the stuff he's written. (He's written a couple of books about Cryptography that have almost become standard textbooks on the subject...really smart guy x.x)
Bump on this one, get his blogs, read about 10 of them and you will have more than you can talk about in an hour.
His writing is pretty addictive reading.encrypt the encryption, never mind my brain hurts. -
cgrimaldo Member Posts: 439 ■■■■□□□□□□I just wrote a research paper on this subject for one of my I/S courses this past fall. Seriously man, google cyber-terrorism, cyber-warfare and information warfare and you will have more than enough to talk about. Good luck!
-
Darthn3ss Member Posts: 1,096Fantastic. The project manager is inspired.
In Progress: 70-640, 70-685