
Widespread, easy access to the Internet, combined with the ability to become anonymous, presents a completely new spectrum of threats to national security. Today, information technology - and the ability to use it - is more widely available than ever.

With this dependency comes vulnerability to attack from virtually anyone, anywhere with a computer and a connection to the Internet. They rest on insecure foundations - the ability to network has far outpaced the ability to protect networks. Information systems are complex and interconnected infrastructures upon which many nations are now heavily dependent. Other related terms are cyberterrorism, cybercrime, strategic information warfare, electronic warfare. What followed sent companies and organizations on both sides of the straits scrambling to patch up their security systems and to temporarily shut down websites deemed a security risk.Ĭyberwar is not real war Declaring war is a privilege reserved for recognized leaders of nations, not a bunch of unelected kids, even they believe they are acting on behalf of their nation.īy definition, a cyberwar is a coordinated, systematic attack on computers, communications networks, databases and media. The next day, the website of Universiti Sains Malaysia (USM) was hacked and plastered with hostile Indonesian-sounding, anti-Malaysian messages messages reminiscent of 1963's Konfrontasi and the Gerakan Ganyang Malaysia (Crush Malaysia Movement). On March 5, 2005, Kuala Lumpur protested what it said was intrusion into its territory by an Indonesian naval vessel, while President Susilo Bambang Yudhoyono ordered the Indonesian military to make its presence felt in the disputed waters.


Nowadays, they go after sensitive data stored or processed.Ĩ Vulnerabilities are lasting only for a short time.A cyberwar between Indonesia and Malaysia was sparked by the dispute over the Ambalat oil fields in the Sulawesi Sea, and, possibly, the impact of the ending of the amnesty for illegal Indonesian workers. 1 Hack In The Box Security Conference 2007 Kuala Lumpur ENTERPRISE HACKING Who Needs Exploit Codes? Fetri Miftach Director of Professional Services Jim Geovedi Information Security TroublemakerĢ Penetration testing often focuses on individual vulnerabilities and services.ģ Automated penetration testing tools is commonly used and replacing manual audits and checklists.Ĥ Enterprise organisations tend to limit the scope of penetration test Risk of exposure Government Law Budgetĥ Attackers exploit circumstances to gain immediate advantage rather than being guided by consistent principles.Ħ Attackers will expand the scope of hacking not in accordance with the rules or standards.ħ Attackers are not always targeting the highest privilege on an operating system.
