NATO tests cyber game security in Ukraine amid war
NATO’s large, multi – day cyber security exercise is set to bring together technicians from the Allies and Ukraine two months after Russia’s invasion.
The annual cyber war games called Lock Shields Training will kick off on Tuesday in Tallinn, Estonia. The event is organized by the North Atlantic Treaty Organization’s Cooperative Cyber Defense Center of Excellence, which includes experimental cyber attack exercises that test teams must defend against time pressure.
“Like-minded nations must work together to protect themselves,” Ms Numa said. He added that Ukrainian and Estonian specialists will work on the same team in training.
</div> <p>Finland's government websites were attacked on April 8, while the government was discussing joining NATO. Ukrainian government websites were hacked in January as Russian troops rallied around the country's borders. "Every political decision can be offensive," Ms Numa said, referring to the current debate in Finland about joining NATO. In 2007, Estonia was hit by a massive cyber attack. NATO officials have been discussing whether the coalition could help Ukraine prevent cyber-attacks in a variety of ways, and in January granted access to its malware information-sharing site. In February, Ann Newberger, US Deputy National Security Adviser on Cyber and Emerging Technology, traveled to Brussels and Warsaw to discuss Russian cyber threats with NATO, EU, Polish and Baltic officials. The NATO Alliance Group includes about 30 cyber security guards from various NATO organizations and member states, specializing in communications, digital forensics, legal expertise and recovery from attacks, said Ian West, head of the NATO Cyber Security Center, which protects NATO. Networks and is part of the Communications and Information Agency of the Company. He said the exercise would be useful for cyber security guards from different countries to communicate with each other about attacks on the same technology products used by multiple governments. West said. "We all use commercial off-the-shelf systems. We all use the same technology. As far as we know, many of these technologies are coming on the market and unfortunately they are vulnerable," he said. <div data-layout="inline " data-layout-mobile="" class=" media-object type-InsetMediaVideo inline scope-web|mobileapps article__inset article__inset--type-InsetMediaVideo article__inset--inline "> <figure class="media-object-video article__inset__video media-object-video--standard"> <figcaption class="wsj-article-caption article__inset__video__caption"> Russia's invasion of Ukraine has prompted NATO members to upgrade their weapons, deploy more troops in the east, and welcome more countries to the alliance. The WSJ's Shelby Holiday War describes three ways in which the NATO alliance was strengthened. Photo Gallery: Elizabeth Smelov </figcaption>
</div> The NATO Center for Organizing Lock Shields did not disclose details of the simulated cyber-attacks. This year's training will focus on "interdependence between national information technology organizations," it said in a statement. War games do not appeal to elements of recent cyber attacks in Ukraine because they are more recent, but the training usually includes scenes from real cyber attacks, Ms Numa said. In 2021, more than 2,000 participants took part in a simulation that tested how a country operates on its financial system, such as how to respond to large-scale cyber-attacks and how payments are made. The advantage of the training is that it lays the foundation for participants to measure their cyber security capabilities with each other, said Stephen Sosando, Senior Cyber Security Researcher at ETH Zurich. These games also help professionals get to know their peers in friendly countries, he said. "They are a great alliance with the partners behind them. If things happen, you can count on them to help you," he said. <strong>Write to </strong>Catherine Stub at [email protected] </div>
Copyright © 2022 Dow Jones & Company, Inc. All rights reserved. 87990cbe856818d5eddac44c7b1cdeb8