Overview: Cyber Threats

Click to access:

Read Article

Watch Relevant Videos and Podcasts

Comments

Article

Author: Paul Meyer
Senior Fellow, The Simons Foundation Canada | Chair, Canadian Pugwash Group | Senior Advisor, ICT4Peace

Cyberspace, the broad term for the system of networked computer systems for which the Internet is the chief embodiment, is a unique, human-created environment. The potential of information and communication technology to benefit humanity is vast and the growth in its use world-wide has been exponential. Today close to four billion people are connected to the Internet and a community of “netizens” has emerged.

Unfortunately, the growth of cyberspace has not been matched by a similar development of global governance for it. Even more worrisome, is the degree to which cyberspace has become “militarized” with states developing capabilities, not only for the defence of their own systems, but also offensive capabilities that threaten damage and destruction to entities beyond their borders. These trends within national security establishments of leading cyber powers have accelerated and the detrimental impact of cyber operations on civilian interests has grown. A narrative of “cyber war” has been espoused by major states, depicting this remarkable product of human ingenuity as just another “war-fighting domain”.

Read more

Related Videos and Podcasts

65. Hacking the Bomb
https://youtu.be/-q1OqFsJNQQ
• Andrew Futter, Associate Professor of International Politics, University of Leicester
• Hans-Christian Breede, Associate Chair of Public Administration, The Royal Military College of Canada

59. Social Media Risks
https://youtu.be/sacSsgA5YhY
• Lisa Schirch, North American Research Director for the Today Institute.

55. A.I.and You
https://youtu.be/ty7nG9Bt9WU
• Cesar Jaramillo, Director Project Ploughshares
• Branka Marijan, Researcher Project Ploughshares

27. Assessing Risk of Global Threats
https://youtube.com/watch?v=vf4mzBTGBXw
• Mark Sedra, Adjunct Professor, Balsillie School

32. The Cyber Impact
https://youtu.be/VTsVZFu0eq0
• Branka Marijan, program officer, Project Ploughshares
• John Daniele, VP, Cybersecurity (GTA)

9. Preventing Cyber Threats
https://youtu.be/9qtwkkvYWGg
• Jack Gemmell, Toronto lawyer
• Paul Meyer, Former Canadian Ambassador for Disarmament
• Allison Pytlak, WILPF

Formatting Options For Comments

To enter a comment or post a share first wait a moment for the page to refresh/reload. Then click into the comments textbox and posting information will dynamically appear as a response to your click. Click on the appropriate icons for inserting an image but please don't attach videos this way. Simply type or paste the URL for the video into the comment and it will embed a preview into the page. The link when clicked will take you to the video itself. If you wish to boldface, underline, or italicize you can follow the formatting instructions below. When editing the only way to scroll within the box is using the arrow keys for up and down. You may also double click to expand the textbox.
Use the following html like code commands wrapping your text in the tags.


Author: admin

21
Please Leave A Comment

Photo and Image Files
 
 
 
Audio and Video Files
 
 
 
Other File Types
 
 
 
5 Comment authors
  Subscribe  
newest oldest most voted
Notify of

Getting ahead of the Christchurch Call By Alistair Knott, Newsroom, Oct 20, 2019 . https://www.newsroom.co.nz/2019/10/10/850847/getting-ahead-of-the-christchurch-call Instead of using what amounts to censorship, tech companies signed up to the Christchurch Call would be wise to adopt a more preventative tactic, writes the University of Otago’s Alistair Knott We have heard a lot recently from the world’s tech giants about what they are doing to implement the pledge they signed up to in the Christchurch Call. But one recent announcement may signal a particularly interesting development. As reported in the New Zealand Herald, the world’s social media giants ‘agreed to join forces… Read more »

jd3NE4lym3nWkCzHAXVO.jpg

It seems to me if you want a job and you are trained well enough our Canadian Security Establisment should be a good launch point.comment image

Sometimes Information Technology Companies need to know that there are places to find unique individuals who can protect them against cyberattacks like Lime Connect.

Screenshot 2019-09-10 21.38.16.png
Adam Wynne

What role would geomagnetic and solar storms have on cyber-security? In 1859, a large solar storm hit Earth – causing the electronics of the day (such as telegraphs) to go haywire. In more recent times (Cold War era, etc.) – atmospheric conditions and solar flares have almost sparked nuclear exchanges. Are current cyber systems shielded adequately from these phenomenon? Are operators able to identify these phenomenon vs. hostile attacks?

Adam Wynne

I think perhaps one of the earliest examples of cyber-warfare was the intercepted Zimmerman telegram in 1917 – between Germany and Mexico. Are there other examples of pre-internet “cyber” (electric, digital, etc.) warfare that should be considered within these contexts?

Adam Wynne

An interesting article from Will Dunn at the New Statesman (2018). Hybrid warfare – a mix of cyber and physical warfare – is an interesting concept which I have not heard previously. “Misinformation poses the most serious risk, says Futter, to “those ICBMs in the US and Russia that only need a few minutes to go.” Simple interference in communications – Unal points to satellites as a potential weak point – could be enough to stop the most important military decisions being made with a cool head. “Keeping weapons on high alert in a cyber environment,” says Futter, “is an… Read more »

With security being an important component to everyone’s organization one should take some time to learn about AI and how it can be used to protect ones corporate assets proactively.
https://www.ibm.com/security/security-intelligence/qradar?cm_mmc=Search_Bing-_-Security_Detect+threats++-+QRadar-_-WW_NA-_-qradar_e&cm_mmca1=000000MI&cm_mmca2=10000099&cm_mmca7=5245&cm_mmca8=kwd-81363975097015:loc-32&cm_mmca9=_k_{gclid}_k_&cm_mmca10={creative}&cm_mmca11=e&msclkid=9777932fcee31fc22f16ce73472dd597&utm_source=bing&utm_medium=cpc&utm_campaign=Search%7CProduct%20-%20Security%20Intelligence%20-%20QRadar%20Hub%20(qradar)%7C000000MI%7CWW%7CNA%7CEN%7CExact%7C10000099%7CNULL&utm_term=qradar&utm_content=QRadar_PR%20(Exact)

Paul Meyer

From Paul Meyer:
This is the submission by ICT4Peace, written by Paul Meyer for the UN Open-Ended Working group on Cyber Security, which will begin its work in September. (The UN Office of Disarmament Affairs has now posted it to the official site for the OEWG: https://www.un.org/disarmament/open-ended-working-group/ .)
This is the submission itself:
https://unoda-web.s3.amazonaws.com/wp-content/uploads/2019/08/ICT4PeaceBrief-OEWG-Aug42019.pdf

I had only learned recently of the CSA(Canadian Security Agency) recently as my education in Information security demanded it. I did search on it and realized the agency’s name might have been miscommunicated or misinterpreted by me…and it was actually the CSE(Communications Security Establishment which I found the website for. It has a very interesting site (https://www.cse-cst.gc.ca/en/careers-carrieres) which I briefly looked over. The gist of it all is I am happy to know we have such an agency to watch over our national boundaries and protect us from Cyber threats abroad from Russia and China and even some of our… Read more »