{"id":10314,"date":"2022-06-23T18:51:00","date_gmt":"2022-06-23T21:51:00","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10314"},"modified":"2022-06-23T18:51:00","modified_gmt":"2022-06-23T21:51:00","slug":"como-la-nube-salvo-los-datos-de-ucrania-de-los-ataques-rusos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10314","title":{"rendered":"C\u00f3mo la nube salv\u00f3 los datos de Ucrania de los ataques rusos"},"content":{"rendered":"<p>Cuando comenz\u00f3 el ataque, los misiles de crucero golpearon una instalaci\u00f3n gubernamental ucraniana que albergaba servidores llenos de datos importantes. Al mismo tiempo, los ciberoperadores rusos llevaron a cabo &#8220;ataques de limpieza&#8221; en las redes inform\u00e1ticas, intentando eliminar toda la informaci\u00f3n almacenada. A pesar de la naturaleza sofisticada y hol\u00edstica del ataque ruso, los datos ucranianos sobrevivieron al ataque. Una semana antes, se sac\u00f3 la informaci\u00f3n del pa\u00eds. Los datos que alguna vez se almacenaron singularmente en servidores f\u00edsicos, se cargaron en la nube.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">In the waxing hours of first light on Feb. 24, as Russian soldiers lumbered across the Ukrainian border from their staging areas towards the fateful day\u2019s objectives, elements of the Russian military and security services worked in conjunction to strike a crippling blow.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Their target &#8211; critical Ukrainian government data.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">As the multi-pronged invasion commenced, cruise missiles struck a Ukrainian governmental facility housing servers full of important data. At the same time, Russian cyber operatives conducted \u201cwiper attacks\u201d on computer networks &#8211; attempting to delete all the stored information.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Despite the sophisticated and holistic nature of the Russian attack, the Ukrainian data survived the onslaught. For a week earlier, it had been virtually smuggled out of the country. The data which had once singularly been stored on physical servers, had been uploaded to the cloud.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cThe key to a country\u2019s digital resilience in wartime is the ability quickly to move data outside the country while still connecting to and relying on it for a government\u2019s digital operations,\u201d according to a report from Microsoft on the cyber lessons of the Ukrainian war. \u201cOne reason these kinetic and cyberattacks have had limited operational impact is because digital operations and data have been disbursed into the public cloud,\u201d it said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Microsoft, which competes with Amazon, IBM, Salesforce and other software and computer networking companies in providing cloud services to governments, published the report, \u201cDefending Ukraine: Early Lessons from the Cyber War,\u201d on June 22.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Prior to the Russia-Ukraine war, a data protection law prohibited the Ukrainian government from utilizing the cloud to store and process data, forcing all the data to be centralized and vulnerable, according to the report. The law was amended just days before the invasion to permit the very same information to be housed on the cloud.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The cloud is a system of decentralized, networked computer servers spread out all over the world. Stored data, often encrypted and secure, is housed in duplicate across multiple servers and can be accessed via the internet from any location. The redundancy means that even if one server is destroyed, the data is not lost because it is copied elsewhere.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Governments around the world have been exploring the idea of adopting the cloud for official use. The Pentagon awarded Microsoft a contract for just that reason in 2019 before rescinding it less than a year later. New DoD contracts for cloud computing are expected to be awarded this year.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cIt\u2019s also important to think about the longer-lasting lessons that come from these efforts,\u201d the Microsoft report said. \u201cThe last few months in Ukraine illustrate the very different defense needs that prevail during a war.\u201d<\/p>\n<p><strong>Fuente: <\/strong><a href=\"https:\/\/www.c4isrnet.com\/2022\/06\/22\/how-the-cloud-saved-ukraines-data-from-russian-attacks\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cuando comenz\u00f3 el ataque, los misiles de crucero golpearon una instalaci\u00f3n gubernamental ucraniana que albergaba servidores llenos de datos importantes. Al mismo tiempo, los ciberoperadores&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10315,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10314"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10314"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10314\/revisions"}],"predecessor-version":[{"id":10316,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10314\/revisions\/10316"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10315"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}