قتال الإنترنت

(تم التحويل من Cyberwarfare)
أمن الحاسوب
أنظمة التشغيل الآمنة
البنية الأمنية
أمن حسب التصميم
التشفير الآمن
لا أمن الحاسوب
VulnerabilitySocial engineering
Eavesdropping
ExploitsTrojans
Viruses and worms
Denial of service
PayloadsBackdoors
Rootkits
راصد لوحة المفاتيح

Ramses II at Kadesh.jpgGustavus Adolphus at the Battle at Breitenfeld.jpgM1A1 abrams front.jpg

الحرب
التاريخ العسكري
العصور

قبل التاريخ • القديمة • الوسيطة
المعاصرة المبكرة • الصناعية • الحديثة

مجالات المعارك

جوية • معلوماتية • برية • بحرية • فضائية

أسلحة

مدرعات • مدفعية • بيولوجية • سلاح الفرسان
كيماوية • إلكترونية • مشاة
نووية • نفسية

تكتيكات

استنزاف • فدائيون • مناورة
حصار • حرب شاملة • خنادق

استراتيجية

اقتصادية • كبرى • عملياتية

التنظيم

التشكيلات • الرتب • الوحدات

الإمداد

المعدات • الذخيرة • خطوط الامداد

القوائم

المعارك • القادة • العمليات
الحصارات • المنظرون • الحروب
جرائم الحرب • الأسلحة • الكتاب

حرب الإنترنت Cyberwarfare، هو مصطلح يشير إلى استخدام الحواسيب والإنترنت في مهاجمة الأعداء ويدعون بالهاكرز. Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare.[1] There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists.[2] One view is that the term ‘cyberwarfare’ is a misnomer, since no offensive cyber actions to date could be described as ‘war’.[3] Offensive cyber actions, such as those in Estonia in 2007, Georgia in 2008, Iran in 2010, North Korea[4] have occurred in the context of international relations, only resulting in condemnation and denial by sides.[3] An alternative view is that 'cyberwarfare' is a suitable label for cyber attacks which cause physical damage to people and objects in the real world.[5]

While there is debate over how to define and use 'cyberwarfare' as a term, many states including the United States, United Kingdom, Russia, India, China, Israel, Iran, and North Korea[6][7][8] have active cyber operations for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains.[3]

The first instance of kinetic military action used in response to a cyber-attack resulting in the loss of human life was observed on May 5, 2019, when the Israel Defense Forces targeted and destroyed a building associated with an on-going cyber-attack.[9][10]

Ramses II at Kadesh.jpgGustavus Adolphus at the Battle at Breitenfeld.jpgM1A1 abrams front.jpg

الحرب
التاريخ العسكري
العصور

قبل التاريخ • القديمة • الوسيطة
المعاصرة المبكرة • الصناعية • الحديثة

مجالات المعارك

جوية • معلوماتية • برية • بحرية • فضائية

أسلحة

مدرعات • مدفعية • بيولوجية • سلاح الفرسان
كيماوية • إلكترونية • مشاة
نووية • نفسية

تكتيكات

استنزاف • فدائيون • مناورة
حصار • حرب شاملة • خنادق

استراتيجية

اقتصادية • كبرى • عملياتية

التنظيم

التشكيلات • الرتب • الوحدات

الإمداد

المعدات • الذخيرة • خطوط الامداد

القوائم

المعارك • القادة • العمليات
الحصارات • المنظرون • الحروب
جرائم الحرب • الأسلحة • الكتاب

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

أنوع الهجمات

هناك العديد من أنواع الهجوم في حرب الإنترنت، القائمة التالية مرتبة من الأقل خطراً إلى الأشد خطورة:

  • تخريب المواقع: الهجمات التي تشوهصفحات على الانترنت، أو denial-of-service attacks. هذا النوع من الهجمات عادة ما يـُرّد بسرعة وضرره محدود.
  • پروپاگندا: رسائل سياسية يمكن نشرها لأي شخص يرى الانترنت.
  • جمع بيانات. المعلومات السرية غير المحفوظة بأمان يمكن اعتراضها وإلتقاطها بل وتعديلها, مما يجعل التآمر ممكناً حتى من الجانب الآخر من العالم. انظر Titan Rain وMoonlight Maze.
  • Distributed Denial-of-Service Attacks: أعداد كبيرة من الحواسب في بلد واحد تشن DoS attack ضد أنظمة في بلد آخر.
  • تعطيل المعدات: الأنشطة العسكرية التي تستعمل الحواسب والسواتل للتنسيق هي في خطر من هذا النوع من الهجمات. الأوامر والاتصالات يمكن اعتراضها أو استبدالها مما يعرض حياة الجنود للخطر.
  • مهاجمة البنى التحتية الحساسة: شبكات الكهرباء والماء والوقود والاتصالات والمواصلات كلهم معرضون لهجمات هجمات الإنترنت.


التجسس واختراقات الأمن الوطني

التخريب

شبكة الطاقة الإلكترونية

الدوافع

عسكرية

مدنية

القطاع الخاص

حرب الإنترنت حسب البلد

الولايات المتحدة


American "Kill switch bill"

حرب الإنترنت في الصين


مكافحة التجسس على الإنترنت

المناوارات الأمريكية الصينية 2012

في 18 أبريل 2012 كشفت صحيفة ذه گارديان عن أن الولايات المتحدة والصين منخرطتان في مناورات سرية على حرب الإنترنت، وسط تصاعد الغضب في واشنطن، بشأن تزايد الهجمات الإلكترونية المنسقة التي تشنها بكين على الحكومات الغربية والشركات الكبرى. وأفادت الصحيفة بأن مسؤولين من وزارتي الخارجية والدفاع الأميركيتين، انخرطوا مع نظرائهم الصينيين في مناورتين إلكترونيتين العام الماضي، بهدف منع وقوع تصعيد عسكري مفاجئ بين الجانبين، إذا ما شعر كل واحد منهما بأنه مستهدف، ويخططان لإجراء مناورة مشتركة أخرى في هذا المجال الشهر المقبل. وأوضحت أن المناورات نظمها مركز الدراسات الإستراتيجية والدولية في واشنطن ومعهد الصين للعلاقات الدولية المعاصرة في بيجينغ، وسمحت للمسؤولين الحكوميين الأميركيين ووكالات الاستخبارات الأميركية، بإجراء اتصالات مع نظرائهم الصينيين في بيئة أقل رسمية.[11]

نقد على المصطلحات

هجمات معروفة

  • وفي 23 يناير 2008 لم يُسمح للعديد من المستخدمين زيارة المواقع الإلكترونية الرئيسية للساينتولوجي. اُكتـُشـِف أن مجموعة هاكر معروفة باسم anymous (ANON) ادعت المسئولية عن الهجوم.[15]


  • In 2012, in a startling volley of allegations, India has been accused of hacking a U.S commission's e-mail communications, which primarily dealt with the economic and security relations between U.S and China. Reports confirm that hackers from an Indian government spy unit managed to post on the Internet, what is being understood be an Indian military intelligence document on cyber-spying. The document, reportedly discussed at length on ways to target the U.S - China commission aided with the expertise lent by western mobile phone manufacturers. The document, reportedly, also included transcripts of the emails exchanged between members of the commission.[16]
  • On November 21, 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois.[17] However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center.[18]
  • In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort.[21]
  • Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and defense contractors.[22]
  • On November 26 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks, which had confirmed the involvement of Pakistani terrorists.[24]
  • In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said Britain faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened Britain’s economic future, and some countries were already using cyber assaults to put pressure on other nations.[25]
  • In May 2010, In response to Indian Cyber Army defacing Pakistani websites, 1000+ الهندn websites were defaced by PakHaxors, TeaMp0isoN, UrduHack & ZCompany Hacking Crew, among those were the Indian CID website, local government of Kerala, Box Office of Indian, Brahmos missile website, Indian HP helpdesk, Indian Institute of Science, and The Indian Directorate General of Shipping.[بحاجة لمصدر]
  • In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks against the Kyrgyz ISPs.[31]
  • In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria.[32][33]
  • In the 2006 war against Hezbollah, Israel alleges that cyber-warfare was part of the conflict, where the Israel Defense Force (IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units.[38] Richard A. Clarke adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."[39]:8


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

جهود المكافحة

منظمة تعاون شانغهاي (من أعضائها روسيا والصين) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements.[40] However, American General Keith B. Alexander did endorse talks with Russia over a proposal to limit military attacks in cyberspace.[41]

A Ukrainian professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind."[42]

انظر أيضاً

قراءات إضافية

  • Andress, Jason. Winterfeld, Steve. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress. ISBN 1-59749-637-5
  • Brenner, S. (2009). Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press. ISBN 0-19-538501-2
  • Carr, Jeffrey. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly. ISBN 978-0-596-80215-8
  • Cordesman, Anthony H., Cordesman, Justin G. Cyber-threats, Information Warfare, and Critical Infrastructure Protection, Greenwood Publ. (2002)
  • Janczewski, Lech; Colarik, Andrew M. Cyber Warfare and Cyber Terrorism IGI Global (2008)
  • Rid, Thomas (2011) "Cyber War Will Not Take Place," Journal of Strategic Studies, DOI:10.1080/01402390.2011.608939
  • Ventre, D. (2007). La guerre de l'information. Hermes-Lavoisier. 300 pages
  • Ventre, D. (2009). Information Warfare. Wiley – ISTE. ISBN 978-1-84821-094-3
  • Ventre, D. (Edit.) (2010). Cyberguerre et guerre de l'information. Stratégies, règles, enjeux. Hermes-Lavoisier. ISBN 978-2-7462-3004-0
  • Ventre, D. (2011). Cyberespace et acteurs du cyberconflit. Hermes-Lavoisier. 288 pages
  • Ventre, D. (Edit.) (2011). Cyberwar and Information Warfare. Wiley. 460 pages
  • Ventre, D. (2011). Cyberattaque et Cyberdéfense. Hermes-Lavoisier. 336 pages
  • Woltag, Johann-Christoph: 'Cyber Warfare' in Rüdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012).

المصادر

  1. ^ Singer, P. W. (Peter Warren). Cybersecurity and cyberwar : what everyone needs to know. Friedman, Allan. Oxford. ISBN 9780199918096. OCLC 802324804.
  2. ^ "Cyberwar - does it exist?". NATO. 2019. Retrieved 05/10/2019. {{cite web}}: Check date values in: |access-date= (help)
  3. ^ أ ب ت Cyber warfare : a multidisciplinary analysis. Green, James A., 1981-. London. 7 November 2016. ISBN 9780415787079. OCLC 980939904.{{cite book}}: CS1 maint: location missing publisher (link) CS1 maint: others (link)
  4. ^ Lockie, Alex. "North Korea's embarrassing missile failure may have been due to US cyber sabotage". Business Insider. Retrieved 2019-05-10.
  5. ^ Lucas, George. Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. Oxford. p. 6. ISBN 9780190276522.
  6. ^ "Advanced Persistent Threat Groups". FireEye (in الإنجليزية). Retrieved 2019-05-10.
  7. ^ "APT trends report Q1 2019". securelist.com. Retrieved 2019-05-10.
  8. ^ "GCHQ". www.gchq.gov.uk. Retrieved 2019-05-10.
  9. ^ Newman, Lily Hay (2019-05-06). "What Israel's Strike on Hamas Hackers Means For Cyberwar". Wired. ISSN 1059-1028. Retrieved 2019-05-10.
  10. ^ Liptak, Andrew (2019-05-05). "Israel launched an airstrike in response to a Hamas cyberattack". The Verge. Retrieved 2019-05-10.
  11. ^ "مناورات سرية أميركية صينية على حرب الإنترنت". البيان البحرينية. 2012-04-18. Retrieved 2012-04-19.
  12. ^ Jim Wolf, "U.S. Air Force prepares to fight in cyberspace", رويترز, 3 نوفمبر, 2006
  13. ^ Ian Traynor, 'Russia accused of unleashing cyberwar to disable Estonia", جريدة گارديان، 17 مايو، 2007
  14. ^ Website of Kyrgyz Central Election Commission hacked by Estonian hackers, Regnum, 14 December, 2007
  15. ^ [1]; A إعلان حرب was posted on youtube.[2]
  16. ^ [3] accessdate=10 Jan, 2012
  17. ^ Mathew J. Schwartz (November 21, 2011). "Hacker Apparently Triggers Illinois Water Pump Burnout". Information Week.
  18. ^ Kim Zetter (November 30, 2011). "Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report". Wired.com.
  19. ^ U.S. drone and predator fleet is being keylogged accessdate=2011-10-06
  20. ^ Hennigan, W.J. "Air Force says drone computer virus poses 'no threat'." LA Times, 13 October 2011.
  21. ^ "SK Hack by an Advanced Persistent Threat" (PDF). Command Five Pty Ltd. Retrieved 2011-09-24.
  22. ^ Jim Finkle (2011-08-03). "State actor seen in "enormous" range of cyber attacks". Reuters. Retrieved 2011-08-03.
  23. ^ Hacked by 'Pakistan cyber army', CBI website still not restored. Ndtv.com (2010-12-04). Retrieved on 2011-11-08.
  24. ^ 36 government sites hacked by ‘Indian Cyber Army’ – The Express Tribune. Tribune.com.pk. Retrieved on 2011-11-08.
  25. ^ Britain faces serious cyber threat, spy agency head warns. The Globe and Mail (2010-10-13). Retrieved on 2011-11-08.
  26. ^ AFP: Stuxnet worm brings cyber warfare out of virtual world. Google.com (2010-10-01). Retrieved on 2011-11-08.
  27. ^ Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon | Video on. Ted.com. Retrieved on 2011-11-08.
  28. ^ Sudworth, John. (2009-07-09) New cyberattacks hit South Korea. BBC News. Retrieved on 2011-11-08.
  29. ^ Williams, Martin. UK, Not North Korea, Source of DDOS Attacks, Researcher Says. PC World.
  30. ^ Danchev, Dancho (2008-08-11). "Coordinated Russia vs Georgia cyberattack". ZDnet. Retrieved 2008-11-25. {{cite news}}: Cite has empty unknown parameter: |coauthors= (help)
  31. ^ Website of Kyrgyz Central Election Commission hacked by Estonian hackers, Regnum, 14 December 2007
  32. ^ Fulghum, David A. "Why Syria's Air Defenses Failed to Detect Israelis", Aviation Week & Space Technology, 2007-10-03. Retrieved on 2007-10-03.
  33. ^ Fulghum, David A. "Israel used electronic attack in air strike against Syrian mystery target", Aviation Week & Space Technology, 2007-10-08. Retrieved on 2007-10-08.
  34. ^ "War in the fifth domain. Are the mouse and keyboard the new weapons of conflict?". The Economist. July 1, 2010. Retrieved 2010-07-02. Important thinking about the tactical and legal concepts of cyber-warfare is taking place in a former Soviet barracks in Estonia, now home to NATO's "centre of excellence" for cyber-defence. It was established in response to what has become known as "Web War 1", a concerted denial-of-service attack on Estonian government, media and bank web servers that was precipitated by the decision to move a Soviet-era war memorial in central Tallinn in 2007. {{cite news}}: Cite has empty unknown parameter: |coauthors= (help)
  35. ^ Estonia accuses Russia of 'cyber attack'. Csmonitor.com (2007-05-17). Retrieved on 2011-11-08.
  36. ^ Ian Traynor, 'Russia accused of unleashing cyberwar to disable Estonia", The Guardian, May 17, 2007
  37. ^ Boyd, Clark. (2010-06-17) BBC: Cyber-war a growing threat warn experts. BBC News. Retrieved on 2011-11-08.
  38. ^ "Israel Adds Cyber-Attack to IDF", Military.com, Feb. 10, 2010
  39. ^ خطأ استشهاد: وسم <ref> غير صحيح؛ لا نص تم توفيره للمراجع المسماة Clarke
  40. ^ Tom Gjelten (September 23, 2010). "Seeing The Internet As An 'Information Weapon'". National Public Radio. Retrieved September 23, 2010.
  41. ^ Gorman, Siobhan. (2010-06-04) WSJ: U.S. Backs Talks on Cyber Warfare. Online.wsj.com. Retrieved on 2011-11-08.
  42. ^ Український центр політичного менеджменту – Зміст публікації – Конвенция о запрещении использования кибервойны. Politik.org.ua. Retrieved on 2011-11-08.

وصلات خارجية

هناك كتاب ، The Information Age، في معرفة الكتب.


؛ كتب

؛ تسجيلات

مقالات