The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The global use of the cyber domain has heightened speed, agility, and interconnectivity within our societies. Consequently, it has also increased threats that share the same characteristics. No longer is reality linear, as two points in time and individuals can connect from varied locations almost instantly, shifting the balance of how we approach traditional security challenges. This paper argues...
The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets...
Digital economy is strengthening in prominence and relevance in the era of digital transformation. The economic opportunity and growth of nations are dependent on the digital world, as world community increasingly connected in the cyberspace. The boom in digital economy is coupled with cyber risks and cyber threats for nations. National cybersecurity strategy (NCSS) is an essential element as cybersecurity...
We operate a newly opened research and design organization at an undergraduate military service academy. Our mission is to focus on and rapidly improve cyberspace defenses for our government by solving tough operational problems and teaching our students to do the same, increasing the level of agility and innovation in government, attributes that are badly needed to keep pace with malicious state...
Organisational Integration has become a key agenda point for policy-makers as governments continue to change and create new organisations to address the cyber threat. Passing references on this topic, however, far outnumber systematic treatments. The aim of this paper is to investigate the potential effects of organisational integration of offensive cyber capabilities (OIOCC). I argue that OIOCC may...
How does the legislative and regulatory agenda in the US trade between security and privacy in cyberspace? How can we explain the shift in the agenda towards more security and less privacy in the past 20 years? In order to answer these questions, I use an original dataset (N=85) of US federal laws and regulations on security and privacy between 1967 and 2016. Within the database, each policy event...
The proposition that cyber espionage is acceptable state behavior, even as cyber attack is unacceptable, is in question. The United States has raised objections to certain types of cyber espionage activity, notably: (1) Chinese economically-motivated cyber espionage; (2) the (feared) transfer of data taken from the US Office of Personnel Management (OPM) and provided to criminals; and (3) Russian...
Dyn suffered multiple complex DDoS attacks in October 2016, constituting one of the largest cyberattacks of this nature ever documented. With this and other recent events in mind, the authors discuss conceptual and practical challenges around cyberwarfare and its impact on cyberspace governance.
This paper contributes to the ongoing efforts in the cybersecurity community to strengthen cyber workforce development by providing an overview of key gaps and proposing practical education strategies. Leveraging documented incidents from defense, industry, and academia and the rest of the United States government, we identify emerging cyber-education opportunities highlighting human-centric elements...
Cyber has been on NATO’s agenda since 2002, with clear mandates and taskings from Summits and Ministerials on how to develop its capacity in the area. Yet, despite an increasingly cyber-dependent world and visible progress on the Alliance’s civilian side, NATO has had no visible track record on how this change in the way the world does business has had an impact on its key military structure and enabler...
Inherently linked to States’ sovereignty and its relationship with third-party stakeholders, the governance of cyberspace has become a subject of great debate and controversies. One of the most prominent of them -the dominance of the United States as an hegemon- has raised concerns and triggered diverging reactions within the international community. Looking at recent events such as the invalidation...
Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously...
This paper examines cyber conflict using a lens of ‘winning’ or ‘losing’, or alternatively the role of ‘victory’ or ‘triumph’ compared to that of ‘defeat’, to draw broader conclusions about the dynamics of cyber power. To do so, the paper analyses writing on the general topic of winning over the years, then dives into the two most critical key case studies: the 2007 attacks on Estonia, and the 2008–2015...
In the arena of computer age cyber security is a big concern to prevent resources of networks, confidential data and crucial information in an organization. The motive of this paper is to highlight the different types of cyber threats and their solution to overcome from them. Besides that, it also describes the different aspects of cyber crime and its security in the global world. Now-a-days, with...
Todays' world is based on two main dimensions: a real one and cyber one that are mutually connected and interdependent. People's business and private lives use cyber space on a daily basis. Counties' economies with private and public sector companies use the Internet for their business and operation. However the systems connected to the Internet are subject of multiple threats that may cause not only...
While many states are developing national cyber security strategies, the exact role and responsibilities of the armed forces in cyberspace often remain unclear. Although attention has been devoted to acquiring specific technical capacities and expertise to act in cyberspace, decision-making processes, doctrines for deployment, and procedures generally lack systematic analysis. The first part of this...
From a national security perspective, cyberspace is a shared domain which requires a shared responsibility between stakeholders at national and global level. Many countries have taken concrete steps to safeguard and protect their sensitive national data in cyberspace against cyber threat such as foreign intelligence services. Data sovereignty is of paramount importance to a nation-state such as Indonesia...
The current framework of cyber terrorism consists of non-tested components which are related to physical terrorism as well as cyber security threats. However, there is no universally accepted definition of cyber terrorism, which seems to be a fundamental issue and challenge in countering threats from cyber terrorism. Grounded theory research begins by focusing on area of study and gathers data from...
The body of the article goes on to discuss the problem of cyberspace authoritative impact on political reality, as it shapes public opinion, lays the grounds of political beliefs and transforms the course of history. Broadly speaking, reliable information is a critical resource that helps to ensure the accountability of a government, enables a government to manage its operations, and allows the public...
The tremendous growth of information technology has abruptly changed the world into global village. It has caused the distances to shrink and information to flow across the globe as it occurs. At the same time it has also given boost to vulnerabilities, threats, frauds and criminals in the cyberspace. The ease of access, user friendly hacking tools and sophistication in cyber attacks has infringed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.