• About Us
  • Contact
  • Careers
  • Send Us a Tip
Menu
  • About Us
  • Contact
  • Careers
  • Send Us a Tip
CyberNews logo
Newsletter
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
Menu
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
CyberNews logo

Home » Security » Predicting where cyberattacks will take place

Predicting where cyberattacks will take place

by Adi Gaskell
10 December 2020
in Security
0
Person using laptop with Data breach inscription on screen with one hand and uploading on mobile on the other hand

© Shutterstock

40
SHARES
The importance of robust cybersecurity on a national level has seldom been more underlined than it has in 2020. 

In the past year, COVID responses have been hampered by cyberattacks while presidential elections have been riddled with concern about foreign interference and voter fraud. It’s perhaps no surprise, therefore, that Harvard has begun publishing a league table according to a country’s digital capabilities.

The National Cyber Power Index aims to compare the ability of each country to successfully defend itself from cyberattacks. It’s a tool that is obviously interesting in an academic sense, but its static nature doesn’t necessarily help cybersecurity teams in the here and now. This is where a new database that has been developed by researchers at Johns Hopkins University aims to step in.

The Cyber Attack Predictive Index (CAPI) provides a degree of foresight into where cyberattacks might happen on a national level. The initial scan suggests, for instance, that there is a strong likelihood of a cyberattack by Russia on Ukraine, with the second most likely being an attack by the United States against Iran.

“The use of cyber operations to degrade and disrupt critical infrastructure, to send a political message, to disrupt economic activities, or to shape adversarial national security objectives has led to a new type of conflict among nation-states,” the team explains. “As more countries develop cyber capabilities, cyber-attacks are likely to become more common in international relations.”

Predicting threats

The tool provides predictive analysis of the nations that are most likely to be engaging in cyber-warfare. The tool was developed after analyzing a number of major attacks undertaken since 2008 to try and determine whether any particular characteristics stood out that would allow future attacks to be predicted.

“These attacks set a precedent or stood out as unique in their intended effects,” the team explains. “Attribution of the attacks in our case studies was corroborated through public acknowledgment by the U.S. Government, persuasive arguments by researchers, or, in some cases, through self-identification by the attackers themselves.”

After assessing the details of each attack, a number of common factors stood out:

  • Knowledgeable and organized cyber force – As the Harvard index highlighted earlier identified, a key component of the cyberattack capabilities of any nation is the skills available to them. The Johns Hopkins team goes further, however, and highlights the importance not only of a strong talent base but also the ability to deploy advanced technology against an enemy.
  • Grievances that exist on a national level – Cyber attacks are an increasingly common international response when more traditional diplomatic measures are considered too mild, yet a military response too severe.
  • Lack of fear of repercussions – Obviously few nations want open warfare, so the sense that they can conduct their attack without reprisals, whether these are economic, legal, military, or cyber-based, is a clear motivating factor. Nations will weigh up the potential risks and consequences of their actions before proceeding.
  • The consistency of the attack with national security policy – A somewhat more complicated factor to consider is the overall alignment with the national security strategy of the country. These are often not things that are in the public domain so the researchers accept that a degree of guesswork is required to combine what is in the public domain with that which is not.
  • Technological vulnerabilities identified in the attacked country – Last, but not least, are the vulnerabilities in the target country’s infrastructure. Obviously, every networked architecture has vulnerabilities, but some will be more so than others. The researchers cite countries like Russia and China as difficult targets precisely because of the restrictive policies surrounding internet access and their relatively advanced technology.

Each of these factors is scored on a 1 to 5 scale, with higher scores signifying a higher likelihood of an attack occurring. The website provides 12 scenarios to illustrate the tool in action, with low-probability events, such as India attacking China, at one end, and high probability events, such as Israel attacking Iran, at the other.

The tool was developed in 2019 as the threat posed by things such as malware grew. The researchers, who have several decades worth of experience at the likes of the National Security Agency behind them aim to help policymakers and other officials understand where the risks are highest.

They have pulled together a CAPI Advisory Board, which consists of various project stakeholders. The group meets on a regular basis to discuss some of the hot-spots identified by the project and explore some of the implications of any cyber attacks that may unfold.

With cyber warfare an increasingly common occurrence, tools like this are likely to be part of a growing arsenal used to understand, predict, and subsequently defend against possible attacks.

Share40TweetShareShare

Related Posts

The satellite-hacker’s guide to the space industry: don’t panic (yet)

The satellite-hacker’s guide to the space industry: don’t panic (yet)

27 January 2021
Man in front of multiple computers

North Korea has been targeting threat researchers

27 January 2021
Teespring data leaked on hacker forum

8+ million Teespring user records leaked on hacker forum

25 January 2021
Covid-19 vaccine

Covid vaccines are now an excuse to launch phishing attacks

22 January 2021
Next Post
Facebook says some users facing issues with Messenger, Instagram

Facebook says some users facing issues with Messenger, Instagram

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Popular News

  • 70TB of Parler users’ messages, videos, and posts leaked by security researchers

    70TB of Parler users’ messages, videos, and posts leaked by security researchers

    83053 shares
    Share 83043 Tweet 0
  • The ultimate guide to safe and anonymous online payment methods in 2021

    13 shares
    Share 13 Tweet 0
  • ProtonMail review: have we found the most secure email provider in 2021?

    69 shares
    Share 69 Tweet 0
  • Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

    13365 shares
    Share 13361 Tweet 0
  • Japan to join forces with U.S., Europe in regulating Big Tech firms

    22 shares
    Share 22 Tweet 0
Google to stop using Apple tool to track iPhone users, avoiding new pop-up warning

Google to stop using Apple tool to track iPhone users, avoiding new pop-up warning

27 January 2021

‘World’s most dangerous malware’ Emotet disrupted

27 January 2021
The satellite-hacker’s guide to the space industry: don’t panic (yet)

The satellite-hacker’s guide to the space industry: don’t panic (yet)

27 January 2021
Man in front of multiple computers

North Korea has been targeting threat researchers

27 January 2021
GameStop extends Reddit driven hyper-rally after Musk tweet

GameStop extends Reddit driven hyper-rally after Musk tweet

27 January 2021
AT&T is sued for $1.35 billion over technology to synchronize smart devices

AT&T is sued for $1.35 billion over technology to synchronize smart devices

27 January 2021
Newsletter

Subscribe for security tips and CyberNews updates.

Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!
Categories
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
  • VPNs
  • Password Managers
  • Secure Email Providers
  • Antivirus Software Reviews
Tools
  • Personal data leak checker
  • Strong password generator
About Us

We aim to provide you with the latest tech news, product reviews, and analysis that should guide you through the ever-expanding land of technology.

Careers

We are hiring.

  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • About Us
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!