THE FINAL CHAPTER Flashcards
US expects global cyber threats to the US and Allies from who
state and nonstate actors
What is at risk of cyber attacks
Networks, Systems, Information
Most important emerging cyber threats to our national security comes from what?
exploitation of our weakest tech: Mobile devices and the Internet of Things
enemy’s try to compromise what military fields
critical infrastructure and expose US military tech in fields of GUIDANCE STEALTH AND AUTONOMUS SYSTEMS
top cyber systems are developing what
cyberspace to increase operational reach into our military and civilian systems to exploit vulnerabilities and compromise national defense
China has cyber strats in what three plans
5 year plan
Road and Belt Initiative
Made in China 2025
What initiative is the Digital Silk Road from
Belt and Road Initiative
Made in China 2025 initiative does
operations to gather info and political adv over western countries
what does the Digital Silk Road do for china?
- long term access to IT networks
- creating foreign economy dependent on China
what are chinas two cyber forces
- PLASSF
- MSS
PLASSF
People’s Liberation Army Strategic Support Forces
MSS
Ministry of State Security
When were the two PLA elements publicaly announced
2015
what happened after PLASSF AND MSS were announced
General 3rd and 4th Dpeartments moved into PLASSF
what was 3rd Department
technical reconnaissance
what was 4th department
electronic countermeasures and radar
How has PLASSF forces been changing
increased operational security and sophistication of attacks
what happened in regards to China in 2018
US says 2 MSS actors involved in Operation Cloud Hopper
what’s Operation Cloud Hopper
2018 target IT service providers for access to sensitive info about gov and industries
what do Russia and China hope to do with their cyber attacks
Deny/disrupt network forces and infrastructure
North Korea and Iran do what in terms of cyber
Use it to asymmetrically respond to challenges in political, military, or economic domains
how can US AND ALLIES prevent cyber attacks
strengthen partnerships and share best practices
What does US need to establish effective cyberspace defense
next gen tech and a sound policy framework
what does the russian cyber community want to accomplish
reestablish dominance in its near-abroad, damage western/pro-democracy influence, and expand global influence
what are the three Russian Cyber groups
GRU, FSB, SVR
FSB
Federal Security Service
in charge of COUNTER
SVR
Foreign Intel Service
HUMAN INTEL
GRU
Main Directorate of the General Staff of the Armed Forces
OTHER