in depth analysis, case study and lesson from the case of cyber security incident
With the evolution of technology, warfare has transcended traditional battlefields and penetrated the digital realm. This paper discusses the integral role of cybersecurity in military operations, emphasizing the crucial relationship between cyber defense and the attainment of national goals. This interdependence of cyber and traditional military domains necessitates a thorough understanding and appropriate investment in…
Real-World Scenario: The Annexation of Crimea (2014) In 2014, the world witnessed a classic example of hybrid warfare when Russia annexed Crimea from Ukraine. This operation was marked not just by conventional military means but also an intricate web of cyberattacks, information warfare, economic pressures, and diplomatic maneuvering. Galeotti, M. (2016). Hybrid war or gibridnaya…
The Dragon Unleashed: An Insight into the Storm-0558 Attack on U.S. Departments On July 11, 2023, Microsoft publicly disclosed that a group of Chinese hackers had spied on U.S. government agencies via a vulnerability in Microsoft’s cloud services. The attack was first detected in June, by an unnamed government agency which proceeded to inform Microsoft…
As reported by BBC and Gizmodo,The digital finance landscape experienced an unprecedented shock when Sky Mavis disclosed that its Ronin Network had been hacked. With a whopping $620 million drained out, primarily in Ethereum, the incident emerged as the most significant decentralized finance (DeFi) theft in history. This case study delves into the intricacies of…
Since 2021, the cyber security industry was rapidly growing due to the increased prevalence of cyber threats and the transition to digital platforms for businesses, governments, and individuals. According to Cybersecurity Ventures, it was predicted that global spending on cyber security products and services would exceed $1 trillion cumulatively over the five-year period from 2017…
In May 2021, Colonial Pipeline, the largest fuel pipeline in the United States, faced a devastating cyberattack. The attack, perpetrated through ransomware, halted the pipeline’s operations, causing widespread fuel shortages across multiple states and highlighting the vulnerable nature of critical infrastructures to cyber threats. This case study provides an in-depth analysis of the incident, the…
In 2021, JBS, the world’s largest meat processing company, fell victim to a cyberattack that disrupted its operations in North America and Australia. This attack, arriving on the heels of the Colonial Pipeline breach, underscores the increasing threats facing critical supply chains worldwide. As reported by BBC, NY Times and Washington Post, a ransomware attack…
As reported by Detikcom and CNN Indonesia some activists and journalists in Indonesia faced cyber attacks on their social media accounts. In today’s interconnected world, digital freedom of expression stands as a pivotal cornerstone of democracy and fair governance. The essence of this freedom is significantly captured in the work of activists and journalists who…
In an era of rapidly evolving digital threats, Tokopedia, one of Indonesia’s most renowned e-commerce platforms, was thrust into the spotlight in 2019. The company suffered a data breach leading to the theft of 15 million user records, positioning it at the center of global discussions around cybersecurity. This case study examines the technical factors…
In September 2018, Facebook disclosed that a security breach had exposed the personal information of 50 million users. The breach was caused by a vulnerability in Facebook’s code that allowed hackers to exploit a feature called “View As” to access the personal information of users’ friends. The world of social media was rocked to its…