Cybersecurity - Cyberwar Flashcards

1
Q

Cyberwarfare

A

Cyberwarfare is when governments or groups use hacking to attack other countries for political or military reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Offensive Cyber Operations (OCO)

A

OCO are cyberattacks by governments to spy on, disrupt, or damage enemy systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Military Cyber Operations

A

These are cyberattacks used by the military to gain an advantage in war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Critical Infrastructure Attacks

A

These attacks target essential services like power, water, and hospitals.
๐Ÿ“Œ Example: A cyberattack on an energy grid shuts down electricity for an entire city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyberwarfare vs. Traditional Warfare

A

Cyberwarfare is faster, global, and cheaper than traditional war but can still cause major damage.
๐Ÿ“Œ Example: Instead of bombing a factory, a hacker could shut down its systems remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyberpersistence Theory

A

The idea that countries must always be ready for cyberattacks because threats never stop.
๐Ÿ“Œ Example: Governments monitor enemy cyber activities every day to prevent attacks before they happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyberespionage

A

Spying through hacking to steal secret information from governments or companies.
๐Ÿ“Œ Example: A hacker steals classified military plans from a government database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disinformation Attacks

A

Using fake news and propaganda to influence public opinion and create chaos.
๐Ÿ“Œ Example: Fake social media accounts spread false election results to cause panic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacktivists

A

Hackers who attack systems for political or social causes rather than money.
๐Ÿ“Œ Example: A hacktivist defaces a government website to protest against laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber-Mercenaries

A

These are hackers-for-hire who work for the highest bidder, including governments.
๐Ÿ“Œ Example: A group of hackers is paid to attack an enemyโ€™s banking system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attribution Problem

A

It is hard to know who launched a cyberattack because hackers hide their tracks.
๐Ÿ“Œ Example: A cyberattack comes from a Russian IP address, but the hackers could be from another country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Persistent Threats (APTs)

A

Highly organized hacker groups, often backed by governments, that carry out long-term cyberattacks.
๐Ÿ“Œ Example: APT44 (Sandworm), a Russian-backed hacker group, has been linked to attacks on Ukraineโ€™s power grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyberwarfare and International Law

A

Countries disagree on whether cyberattacks should be considered acts of war.
๐Ÿ“Œ Example: NATOโ€™s Tallinn Manual provides guidelines for cyberwarfare rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Election Interference

A

Hacking elections by stealing data, spreading fake news, or attacking voting systems.
๐Ÿ“Œ Example: Russian hackers allegedly influenced the 2016 US election by leaking emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyberattacks on Military Targets

A

Hackers target weapons systems, military databases, or communication channels.
๐Ÿ“Œ Example: A cyberattack disrupts an armyโ€™s GPS signals, making it harder to launch attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyberattacks on Civilian Infrastructure

A

Attacks that cause chaos in everyday life, like disrupting transportation, healthcare, or finance.
๐Ÿ“Œ Example: A hacker group takes down airport websites, delaying flights.

17
Q

Ransomware in Cyberwarfare

A

Some attackers use ransomware to encrypt important data and demand money.
๐Ÿ“Œ Example: The NotPetya attack in 2017 used ransomware to cause billions in damage worldwide.

18
Q

Power Grid Attacks

A

Cyberattacks on electricity supply systems to cause blackouts.
๐Ÿ“Œ Example: In 2015, Russian hackers shut down power for 230,000 people in Ukraine.

19
Q

Cyberattacks on Telecommunications

A

Targeting mobile networks and the internet to block communication.
๐Ÿ“Œ Example: In 2023, a cyberattack shut down Kyivstar, Ukraineโ€™s largest telecom provider.

20
Q

Distributed Denial of Service (DDoS) Attacks

A

Flooding a website or service with too much traffic so it crashes.
๐Ÿ“Œ Example: Hackers take down a countryโ€™s government websites by overloading them.

21
Q

Malware and Spyware in Cyberwarfare

A

Using malicious software to spy, steal data, or destroy systems.
๐Ÿ“Œ Example: The Stuxnet worm was used to damage Iranโ€™s nuclear program.

22
Q

Cyberwarfare Risk Assessment

A

Governments analyze threats and decide how prepared they are for cyberattacks.
๐Ÿ“Œ Example: Denmarkโ€™s threat report says Russia and China are the biggest cyber threats.

23
Q

Cyberwarfare and Energy Attacks

A

Hackers target oil, gas, and electricity systems to create economic damage.
๐Ÿ“Œ Example: A Russian hacker group tried to attack 22 Danish energy companies in 2023.

24
Q

Transportation Infrastructure Attacks

A

Hackers disrupt airports, railways, and shipping to slow down a countryโ€™s economy.
๐Ÿ“Œ Example: In 2024, Russian hackers took down websites for Danish transportation services.

25
Psychological Impact of Cyberwarfare
Cyberattacks can create fear, panic, and loss of trust in the government. ๐Ÿ“Œ Example: After a major cyberattack, people feel anxious because they donโ€™t know when it will happen again.
26
Decision Interference through Cyberattacks
Cyberattacks can manipulate peopleโ€™s decisions by spreading false information. ๐Ÿ“Œ Example: In Ukraine, Russian hackers posted fake surrender messages on government websites.
27
Harm Mitigation in Cyberwarfare
Governments prepare backup plans to reduce the impact of cyberattacks. ๐Ÿ“Œ Example: Using backup internet providers in case the main network is attacked.
28
International Cyber Collaboration
Countries work together to defend against cyber threats and share intelligence. ๐Ÿ“Œ Example: The EU and NATO train military units to fight cyberattacks.
29
The Future of Cyberwarfare
Cyberwarfare will continue to grow, and governments need better defenses. ๐Ÿ“Œ Example: Countries are investing more in cybersecurity to stop future cyber wars.