Modern Australian
Men's Weekly

.

Deterring cyber attacks: old problems, new solutions

  • Written by Joe Burton, Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato
Deterring cyber attacks: old problems, new solutions

As the investigation into Russia’s interference in the US election deepens, it is becoming obvious that the events in 2016 are just the tip of an iceberg.

Ever since the Russian cyber assault on Estonia in 2007, policymakers and cyber security scholars have debated how best to deter cyber attacks that cross international borders. Yet both state and non-state actors continue using the internet for malicious purposes with an unacceptable level of impunity.

The growing global market in cyber crime is projected to hit US$6 trillion by 2021. Curtailing the risk requires new approaches.

Read more: The public has a vital role to play in preventing future cyber attacks

Old problems

Fundamentally, deterrence is about convincing an adversary that the costs of an attack outweigh the benefits. One of the problems in cyber deterrence policy has been a reliance on ideas that were formulated in the very different security environment of the Cold War.

Cold War concepts rely on deterrence by punishment (striking back at an adversary with retaliatory attacks) and deterrence by denial (denying your adversary the ability of a first strike, for example by having too many hidden nuclear missiles sites). While these binary models may have applied in the context of two nuclear superpowers locked in a decades-long geopolitical conflict, they don’t translate easily to a global network of interconnected computers.

Read more: Is counter-attack justified against a state-sponsored cyber attack? It's a legal grey area

The first problem is attribution. If you can’t identify the actor responsible for a cyber attack, how can you punish them? Retaliatory cyber attacks can also cause collateral damage. They drag in third parties who may come to the assistance of the adversary, escalate cyber conflict and legitimise the use of cyber capabilities for political and strategic gain. The prospect of using military force to punish cyber attackers is also viewed as disproportionate as a response to most malicious cyber activity.

Deterrence by denial is a similarly problematic framework. The “attack surface” the internet presents is staggeringly large. The number of internet-connected services is set to reach 75 billion by 2025. It is unrealistic to expect that we can ensure that all those devices are secure and cannot be used as back doors into other computer systems.

New solutions

Before leaving office, the Obama administration assigned US$19 billion for research on cyber security.

One of the priorities of this funding was to ensure further improvements to attribution technologies and processes. This could make a big difference to the effectiveness of cyber deterrence, especially when combined with clearer communication by policymakers about the evidence they have about the source of attacks. Cutting through some of the smoke and mirrors put in place around the Putin government’s cyber operations should be a high priority.

Another radical proposal is to change how the internet operates so that it becomes an identified and attributed network where logging in involves providing specific personal identification. This has been given serious attention in the US national security community.

It has obvious implications for maintaining the internet as a free and open global resource. But the internet will have to keep evolving to deal with the growing impact of cyber attacks. Building a more secure domain for some internet traffic is worth considering.

Changing how we think about attacks

New technology may help enhance cyber deterrence, but we will need to change our thinking too. During the Cold War, deterrence was absolute. Even one attack could have proven devastating. In contrast, deterrence in cyberspace will be cumulative. As the scholar Uri Tor has argued, cyber deterrence is about how to “postpone, limit, and shape a series of ongoing conflicts with a variety of state and sub-state actors”. It is not about preventing all attacks at all times.

The role of laws and norms in deterring malicious cyber activity should be given greater attention. Some countries don’t even have current laws that make hacking a criminal offence. This could be solved by more states signing up to the Budapest Convention on cyber crime, which requires the adoption of laws on cyber crime and enables collaborative policing to deal with cyber attackers.

New proposals coming out of the Tallinn Manual 2.0 process suggest the emergence of deterrence mechanisms through international law. This includes holding states to legal account when hackers are operating with impunity from within their territory or being directed by the state. In this scenario, a form of self-deterrence may emerge when governments realise that hackers pose risks to the states themselves.

Resilient systems

Cyber resilience involves having back ups for computer networks and the societal services they provide. A cyber attack would have minimal impact if systems are in place to replace an internet service as quickly as it is taken down.

Cyber resilience holds particular promise for critical infrastructure providers in the transport, health and energy sectors. These organisations will never have the authority to deter cyber attacks through retaliatory cyber countermeasures, but need to find ways to obscure the cyber targets on their backs.

Similarly, given recent efforts to subvert democracy through cyber operations, the resilience concept will have particularly appeal to the electoral governance sector. Building resilience in our elections systems (including election advertising on social media) is a priority for democratic countries, especially in light of the recent scandals around Cambridge Analytica’s misuse of Facebook data during the US election.

Authors: Joe Burton, Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato

Read more http://theconversation.com/deterring-cyber-attacks-old-problems-new-solutions-96279

Why A Smart Lock Is Becoming An Essential Upgrade For Modern Home Security

Homeowners today are placing greater importance on security, convenience and technology in their living spaces. One of the most significant advancem...

Expert-Led Solutions for Clear Complexions

Many people struggle with acne at different stages of their lives, and the journey toward clearer skin often feels overwhelming. Breakouts affect not ...

Is Long-Term Pigmentation Correction Possible?

Many individuals struggle with pigmentation concerns that affect how their skin appears and how they feel about themselves. These darkened patches, sp...

The Value Of Commercial Buyers Agents Melbourne For Smarter And More Strategic Property Purchases

Buying commercial property requires a deep understanding of market conditions, tenancy structures, asset performance and long-term financial impact...

EOR Solutions & Offshore Workforce Arrangements: A Smarter Way to Manage Global Teams

For Australian companies expanding into Asian markets, navigating local employment laws and regulations can be complex. By implementing employer of re...

Beachside Moves: A Guide to Moving to Sydney’s Coastal Suburbs

So, you've finally decided to do it. You're trading your city apartment for the salty breeze of beachside living. Who can blame you? Maybe it’s Bo...

The Most Common Causes of Concrete Deterioration (And How to Prevent Them)

Concrete is known for its strength, longevity, and reliability—but even the most durable surfaces can deteriorate over time if they’re exposed t...

Mat Pilates vs Reformer Pilates: What’s Better for Strength, Mobility, and Control?

Pilates has surged in popularity across Australia, and for good reason—it delivers a rare combination of strength, mobility, control, and mindful ...

Your guide to SEO for local business

Most people search online before they buy. In fact, 97% of people learn more about a local company online than anywhere else (Source: HubSpot). That m...

Indigenous Voices in Film, Literature & Music: Why They Matter More Than Ever

Across Australia and around the world, Indigenous storytelling is experiencing a long-overdue surge of recognition. First Nations creators are bring...

Mayfair Funerals: A Fresh, Intimate Approach for Perth Families

Description: Mayfair Funerals is reshaping funeral care in Perth with a compassionate, personal and affordable approach. Their signature Intimate Cre...

Barbecue Boats – The New Must-Have for Retirees!

When your working years are behind you, it’s time to kick back and relax. You’ve earned it! And there’s no better way to do that than by purch...

Pizza Brisbane City: Your Ultimate Guide to Finding the Perfect Slice in the CBD

Brisbane's city centre has evolved into a vibrant culinary destination, and nowhere is this transformation more evident than in its thriving pizza s...

Maximising Your Savings: How to Choose a Competitive Savings Account in Australia

In today's economic climate, Australians are increasingly focused on making their money work harder. With interest rates fluctuating and living cost...

What to Know When Researching a Tummy Tuck on the Gold Coast

Body confidence is something many people seek to improve as they move through different stages of life. Pregnancy, weight fluctuations and ageing ca...

Employer of Record Services & Manpower Outsourcing — The Smart Solution for Seamless Workforce Management

Expanding into Asian markets can feel overwhelming for many Australian businesses, especially when hiring employees in regions like Singapore, Malaysi...

Why Far-Infrared Saunas Are Becoming a Must-Have in Australian Homes; Just What Is a Far-Infrared Sauna?

A far-infrared sauna uses far-infrared (FIR) wavelengths to heat the body directly instead of relying on high cabin temperatures. Unlike traditional...

Tax Accountants Melbourne: Expert Support for Compliance and Financial Efficiency

Taxation is one of the most critical — and often most complex — aspects of financial management. Whether you’re a business owner, property inv...