CISS6022 Cybersecurity Week 3 Lecture PDF

Summary

This document is a lecture from the University of Sydney on Cybersecurity, specifically focusing on Week 3: Cyber Espionage and Cybercrime. It covers definitions of cybersecurity, historical context, and various related aspects such as surveillance technologies and counter intelligence strategies.

Full Transcript

CISS6022 Cybersecurity Week 3: Cyber Espionage and Cyber crime SULAGNA BASU We acknowledge the Traditional Owners of the lands on which we are meeting here today, the Gadigal people of the Eora Nation and pay our respects to elders past and present. We recognize that sovereignty was never ceded. T...

CISS6022 Cybersecurity Week 3: Cyber Espionage and Cyber crime SULAGNA BASU We acknowledge the Traditional Owners of the lands on which we are meeting here today, the Gadigal people of the Eora Nation and pay our respects to elders past and present. We recognize that sovereignty was never ceded. This always was and always will be Aboriginal land. Agenda Week 3 ▪ Week 1 summary ▪ What is espionage? ▪ Why do states need espionage? ▪ Cyber Espionage ▪ Cyber Counter Intelligence ▪ Targets ▪ Guest Speaker Week 1 Summary ▪ Definitions: What is cybersecurity? ▪ History/provenance of cyberspace ▪ What is security? The University of Sydney What is espionage? The University of Sydney Why do states need espionage? International anarchy Uncertainty Security dilemma The University of Sydney Intelligence “Intelligence is secret, state activity to understand or influence foreign entities” Lindsay, 2021 The University of Sydney The University of Sydney Cyber Espionage Easier, cheaper, lower threshold of risk Speedier More volume of data More players? HUMINT, SIGINT, COMINT, ELINT ….still, even cyber espionage may be prone to strategic and operational challenges. The University of Sydney The University of Sydney Cyber Counter Intelligence Defensive CCI (eg. threat intelligence) Offensive CCI (eg. Sockpuppets, disinformation) The University of Sydney The University of Sydney Targets - Who are the targets? - What kind of information? - Meta data vs Content The University of Sydney Surveillance Technologies Historical continuity: the use of surveillance as a tool of control and domination Dual use nature of technology Global North-South divide Role of private actors The University of Sydney The University of Sydney Discussion How do the motivations behind cyber espionage for national security, economic gain, and domestic stability differ, and what are the potential short-term and long-term consequences of each such espionage on the affected parties(targets) and the states/organisations/actors involved? The University of Sydney Break The University of Sydney

Use Quizgecko on...
Browser
Browser