The Cybersecurity Diplomacy course equips professionals with the knowledge and skills they need to act effectively in cybersecurity diplomacy. This online course analyses how the abuse of technology impacts geopolitical security, social and economi...
Start date:   17 May 2021
Register
Course
One could say that the wish list for cyber-peace was already written in 2015, when states agreed on some rules of behaviour in cyberspace - including that existing international law applies to it. Are we good to go? Not so fast. The devil is in the d...
 4 Dec 2019

Blog post
In December of last year, New York City was the place for diplomats to write a long list of New Year cyber-wishes, which came in the form of resolutions that established the first UN Open-Ended Working Group on Developments in the Field of ICTs in th...
 4 Dec 2019

Blog post
Vladimir Radunovic, Director of e-Diplomacy and Cybersecurity at DiploFoundation will give a brief presentation on the Geneva Internet Platform's (GIP) mapping of offensive cyber capabilities around the world and discuss trends in cyber-armament and ...
 2 Apr 2019

Event
Vladimir Radunovic, Director of e-Diplomacy and Cybersecurity at DiploFoundation will give a brief presentation on the Geneva Internet Platform's (GIP) mapping of offensive cyber capabilitiesaround the world and discuss trends in cyber-armament...
 25 Mar 2019

Event
At the opening of the annual UN Internet Governance Forum (IGF), held on 12–14 November 2018 at UNESCO in Paris, French President Emmanuel Macron launched the Paris Call for Trust and Security in Cyberspace, a high-level declaration laying out common...
 19 Dec 2018

Blog post
While cyberspace and information and communications technology (ICT) can deliver significant benefits to society, the growing use of ICT by state and non-state actors for malicious purposes – threatening not only peace and security but also the entir...
 25 Oct 2018

Event
An interactive online capacity development programme Internet governance (IG) has become one of the most important policy areas of our time. Topics like privacy protection, human rights online, and cybersecurity are increasingly in the focus of gl...

Course
Profile picture for user Vladimir Radunovic
Submitted by Vladimir Radunovic on Wed, 07/04/2018 - 10:28
Description

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack.

Long Text

Cyber-attacks of various purposes – for warfare or crimes, terrorism or political activism – commonly deploy the same types of cyber-weapons. Typically, (information about) a system vulnerability is embeddCybered into a software code called ‘exploit’ to penetrate the digital system. Additional code, called ‘payload’, is added to cause specific action for a particular target (like putting down an industrial control system, or sniffing and exfiltrating sensitive data). Unlike in the physical space, vulnerabilities can be discovered (and exploits and payloads developed) by civilians and groups that possess particular knowledge, rather than vast (financial and human) resources, such as companies or states. Vulnerabilities discovered in various available software or hardware should be responsibly disclosed to the authors, in order to issue patches and secure the services provided. This, however, is not a common scenario. Instead, vulnerabilities are traded and developed into weapons by various parties – including governments; and ignored by many – including companies and end-users. The responsibility for global cyber(in)security is, therefore, shared.

Year
2018-01-01T00:00:00
Author
Vladimir Radunovic, Vladimir Veljasevic
Year
Library Source
Resource type
Printer Friendly and PDF

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack.

Source: 
Cybersecurity
 Vladimir Radunovic, Vladimir Veljasevic, 2018
 

Resource text

Printer Friendly and PDF
Is cyber-armament a growing trend? What are the main diplomatic responses? And why is the private sector calling for a global political dialogue? This three-part post analyses cyber-armament as a growing trend, and looks at diplomatic initiatives on ...
 22 Feb 2017

Blog post
Governments have placed cybersecurity and cyberconflict at the top of their agendas. Bilateral cyber agreements among lead economies - including the EU, China, India, Japan, Russia, Germany, Canada, and the USA - are on the rise. The number of multil...
 2 Dec 2016

Blog post
Governments have placed cybersecurity and cyberconflict on top of their agendas. Bilateral cyber agreements among lead economies - including the EU, China, India, Japan, Russia, Germany, Canada, and the USA - are on the rise. The number of multilater...
 23 Nov 2016

Event
Subscribe to Cybernorms