Cyber Storm Exercise

Source: Wikipedia, the free encyclopedia.

The Cyber Storm exercise is a biennial

digital espionage.[1][2] The simulation was targeted primarily at American security organizations but officials from the United Kingdom, Canada, Australia and New Zealand participated as well.[3]

Cyber Storm I

The first Cyber Storm exercise took place February 6 through February 10, 2006 with the purpose of testing the nation's defenses against

Simulation

The exercise simulated a large scale attack on critical digital infrastructure such as

energy production
. The simulation took place a series of incidents which included:

Internal difficulties

During the exercise the computers running the simulation came under attack by the players themselves. Heavily censored files released to the

e-mail marked "IMPORTANT!" telling the participants in the simulation not to attack the game's control computers.[4]

Performance of participants

The Cyber Storm exercise highlighted the gaps and shortcomings of the nation's cyber defenses. The cyber storm exercise report found that institutions under attack had a hard time getting the bigger picture and instead focused on single incidents treating them as "individual and discrete".[5] In light of the test the Department of Homeland Security raised concern that the relatively modest resources assigned to cyber-defense would be "overwhelmed in a real attack".[6]

Cyber Storm II

Cyber Storm II was an international cyber security exercise sponsored by the United States Department of Homeland Security in 2008. The week-long exercise was centered in

Washington, DC and concluded on March 15.[7]

Cyber Storm III

Cyber Storm III was an international cyber security exercise sponsored by the United States Department of Homeland Security in 2010. The week-long exercise was centered in Washington, DC and concluded on October 1.[8]

See also

References

  1. ^
    Department of Homeland Security
    ). Accessed February 1, 2008.
  2. ^ Cyber Storm Exercise Report Archived February 12, 2012, at the Wayback Machine (Department of Homeland Security)
  3. ^ Kapica, Jack. A blogger’s paranoia Archived April 6, 2008, at the Wayback Machine, The Globe and Mail, Accessed February 1, 2008.
  4. ^ "Cyber 'War' Games Highlight Vital Security Flaws". www.cybertalkblog.co.uk. Archived from the original on April 16, 2021. Retrieved March 13, 2017.
  5. ^ Wait, Patience. Cyber Storm exercise challenged coordination, communications Archived February 11, 2008, at the Wayback Machine (Government computer news). Accessed February 1, 2008.
  6. ^ DHS releases report on Cyber Storm exercise. Accessed February 18, 2008.
  7. Computerweekly.com
    . Accessed March 21, 2008.
  8. ^ Ian Grant. "Cyber Storm III"