Managing Hybrid Cyber Attacks

A Hybrid attack is a blend of both a Dictionary attack method as well as a brute force attack. This means that while a dictionary attack method would include a word list of passwords, the brute force attack would be applied to each possible password in that list.       

A hybrid cyber attack involves more than just a single threat vector. For example, it can include deceptive email to deliver malware, and then DDoS  (Distributed-denial-of-service) to complicate recovery from a malware attack, as also to disrupt normal traffic of a targeted server. This type of attack enables online criminals to carry out their crimes and then hide their tracks. 

 Hybrid threats incorporate a range of unique combinational threats specifically designed to target the attacked country's vulnerabilities. The instigator of a hybrid warfare is a state or a group of states that choose a non-conventional approach to warfare. The adversary selects from the whole menu of tactics and technologies and blends them in innovative ways to meet their own strategic culture, aims and Geography. The methods may include a decentralized planning, cyber attacks and non-state actors (religious, criminal or separatist groups). 

They follow a unified strategy and are generally operationally and tactically directed and coordinated by a common unit to achieve synergistic effects of the high-tech capabilities and resources of the instigator. The ultimate goal is no different from the goal pursued through conventional wars. 

Hybrid warfare is intended to bring down states and companies, but commonly consists of a large number of small attacks that target intellectual property of a foreign entity. 

First, the attacking government works with a "private sector" (often state-owned or influenced) partner to identify desirable IP, then the full spectrum of state espionage assets are brought to bear to acquire it. 

Second, state research and development resources assist in the rapid commercialization of the stolen IP. 

Finally, the state assists the partner - company in replacing the original producer of the IP, initially inside China and eventually in international markets. 

This assistance may go well beyond conventional "national champion" protections and include elements such as cyber attacks to slow or corrupt the IP originator's development effort; regulatory or legal action to weaken market position; campaigns to undermine market confidence, disruption of supply chains or sales channels and attacks on employees through blackmail or other coercive means. 

So, in order to manage this, 

First, we must acknowledge this as a dangerous reality and interpret individual events that might otherwise appear as random incidents in the broader and deliberate context of a hybrid war. 

Second, we should focus on the effects these attacks have, rather than the way in which attacks are conducted. 

Third, Corporate leaders must ensure that indicators of attack are quickly recognized, and a well - rehearsed response and communication plan is at the ready.

We must develop, to counter such threats, effective mechanisms for private-public co-operation, establishing relationships that help us to anticipate, avoid, defeat or recover from hybrid attacks. We must overcome the often adversarial relationship Business and Government to form effective and mutually- supportive partnerships. 

The global competitive framework has changed significantly: hybrid warfare will be a key feature of the strategic environment for the foreseeable future. It is different, but no less dangerous, than other conflicts we have experienced.   

                                          - -  - - - - - - - - -


     



     



  




    




   



  



      




                 

Comments

Popular posts from this blog

Qualities Of A Good Prime Minister

IMF suggestions for India Growth Rate

Working Of Nuclear Plant and Generation Of Energy

Artificial Intelligence on Business Forecasting

FDI - Foreign Direct Investment- Types And Essentials

Satellite Prediction Of Floods In India

Tools To Measure Economic Progress Of A Country

US Dollar - Effects in the modern economy

Economy of UAE

Devaluation and causes for Foreign Exchange rates variation