Cyber War in Perspective: Analysis from the Crisis in Ukraine
Russia has deployed cyber means during the Ukraine crisis mainly for information warfare purposes. It is just a new means to an old end. The west has to perhaps rethink the concept of cyberwar as it is often linked with physical effects which have not been the case in Ukraine. On the strategic level, we need to understand the long-term nature of the cyber operations employed by the enemies; the west should apply a similar framework for cyber operations.
Future of Cyberspace
Mr. Nicolas argued that cyberspace is a battlefield that needs reconnaissance via non-intrusive monitoring and use of honeypots. Therefore awareness and understanding are an essential requirement for a viable Internet in the future. Dr. Esser pointed out that complex vulnerabilities are deeply rooted in the software of the Internet. Threats are increasing and the common user cannot properly defend themselves Dr. Chan highlighted that mega-cities are posing new challenges. These challenges will include multiple means of gathering/transmitting information, protection of the citizen/environment using new tools, and protection of the complex diversity of IoT that will be in use to support those cities.
Zampalogne and Carolan keynote
Zampolagne presented the role of the EU-LISA in managing large-scale IT systems, which is de facto critical infrastructure for the EU. Cyber security is a legal obligation and they implement security by design. Carolan emphasized that agencies operating critical infrastructure can also be contributors to the overall discourse of cyber security: EU-LISA does capacity building by sharing best practices and developing security certification frameworks; engaging academia and industry; and keeping up-to-date with technological developments.
Academia is really lagging behind in the context of cyber security as intelligence agencies and criminal groups are not interested in discussing and revealing the risks – this is a fundamental change. Also, is the cyberspace really the fifth domain as it is possible to change the environment (it is not like the sea or air domain)? Another essential question: What is the cyber ‘too big to fail’ scenario, what is the threshold of government involvement? We are moving towards a more bridled Internet as there is no one in charge.
These overviews are for informational purposes only. Conference proceedings are available as a publication. Videos and presentations will be published on www.cycon.org later in the year.