Cyber warfare: How prepared is Nepal?
Previous attacks could be of great help to predict future attacks and patterns of attacks. We can expect satellites, naval forces, aircraft, missiles and rockets being hacked and exploited to cause severe damage to the global economy and infrastructure
Right from the usage of e-Commerce, online banking, social networking sites up to connecting every single device like the Internet of things - IOT -- i.e. toasters, refrigerators, televisions, temperature controls, home automation systems, nuclear power station to the Internet and controlling them from any end point of the globe have been developed.
After land, sea, air and space, warfare has entered the fifth domain: cyberspace.
Back in the old days, war was fought either from land, sea, air, and space with guns, ammunition, fighter jets, missiles, but now an individual or even a group of individuals can wage a war with just a use of computers and working Internet connection, right from their bed while taking a sip of tea and in pajamas.
So, cyber warfare is the art and science of fighting without fighting; defeating an opponent without spilling their blood. In other words, cyber war refers to the action by a nation-state, to penetrate other nations’ computers and networks for the purpose of causing damage or disruption.
These days almost all the nations are fully dependent on the Internet for storage and transference of information and information in this era has become a critical part of daily operations.
What we say, what we do, what we share, what we plan are very critical information we hold as an individual or as a nation overall, and this information could be used against us.
The Internet was not originally designed with security in mind, but as an open system to allow scientists and researchers to send data to one another quickly. Without strong investments in cyber security and cyber defenses, data systems remain open and susceptible to rudimentary and dangerous forms of exploitation and attack.
Back in the old days (the late 80’s and early 90’s), hackers used to break into systems for fun and with motive of learning new things. Robert Tappan Morris, a Cornell University graduate student who released the most notable internet worm also known as ‘Morris worm’ on November of 1988, was where the people started noticing the ability and potential of the Internet.
Nepal is also extremely vulnerable to cyber-attacks and is encountering a high number of malware attacks on a daily basis. The Asia Pacific region is especially vulnerable with emerging markets most at risk of malware threats.
Nepal has also become a target and being exploited by cyber criminals and state sponsored hackers. Previously, Naikon also known as APT-30 (Advanced Persistent Threat) group, has targeted military, government and civil organizations and exploited them.
Carbanak, an APT style attack, also resulted in financial loss for Nepal and almost thirty other countries. These types of attacks are growing rapidly although Nepal has not developed much in terms of technology.
Although Nepal has Information Technology Security Emergency Response Team (ITSERT-NP) it does not actively participate in research and development nor do they participate in active intelligence gathering and learning about new threats and spreading awareness.
Technical personnel capable of defending the national level infrastructure are extremely limited and are always outnumbered by start-up hackers. Lack of training, resource, materials and especially security awareness seem to be the problem in Nepal.
The first phase should be divided into learning defensive tactics and then gradually developing offensive techniques and eventually building up an elite cyber task force for national defense of information and security of Nepal.
During 2014-2015 Nepal was highly vulnerable to cyber-attacks since the national infrastructure almost collapsed because of the massive earthquake, and as a result, thousands of websites and servers, including servers from government, military and private servers, were victims of huge cyber-attacks and cyber vandalism.
The main reason Nepal became a target of cyber attackers was because of the chaos and dilemma caused by the earthquake. Most of the websites are built by people who have little or no knowledge about security and on top of that the websites are built for small amounts ranging from a minimum of five thousand to fifty thousand rupees.
Until and unless the gap between developers and security people are bridged, cyber-attacks will continue and will be a big curse for Nepalese economy and national infrastructure.
There is no such thing as hack-proof security but still adding an extra layer of security and using the concept of defense in depth will make attackers put in more effort, time and resource.
No matter how deep the defense is or how hard you are trained to defend, an attacker will always find a way inside and eventually break into the systems, but that does not mean to do nothing. We can never predict a cyber-war until we start one.
Previous attacks could be of great help to predict future attacks and patterns of attacks. We can expect satellites, naval forces, aircraft, missiles and rockets being hacked and exploited to cause severe damage to the global economy and infrastructure.
If we do not prepare now for cyber warfare, develop threat intelligence and prepare defensively then it could raise massive threats.