Cyber Security without Cyber War

2012 ◽  
Vol 17 (2) ◽  
pp. 187-209 ◽  
Author(s):  
M. E. O'Connell
Keyword(s):  
2018 ◽  
Vol 6 (2) ◽  
pp. 49-60 ◽  
Author(s):  
Brandon Valeriano ◽  
Ryan C. Maness

Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.


Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


2018 ◽  
pp. 1125-1145
Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


2021 ◽  
Vol 21 (3) ◽  
pp. 65-94
Author(s):  
Darko Trifunović ◽  
Zoran Bjelica

Cyberspace has become an indispensable part in which special operations such as cyber war or warfare take place. The role of special war as the use of so-called soft power was emphasized. The country's number of potential adversaries in cyber warfare is unlimited, making highly endangered aspects of cyber civilian infrastructure, which is essentially military readiness, including the mobilization of forces through the civilian sector, also a likely target. A special type of cyber war or warfare is hybrid warfare. This type of warfare is increasingly resorted to because it is extremely cheaper than the conventional method of warfare and at the same time brings exceptional results. The first thing that affects cyber security policy analysts comes with the issue of neutrality, as well as the huge variety of assessments about future attack and defense technologies. There is also a consideration that the new (problematic) cyber technology will be deployed in a short period of time, in time periods, in just a few days in terms of warnings. Second, is the trends in cyber-attack and defense technologies and who is following those processes. Third, decision making technology having in mind high-performance computers, technologies that are well known, although rapidly evolving, are increasingly seen as a basic means of managing cyber defense at the national military and security level, as well as a new weapon in the hands of opponents. Fourth, role of intelligence in planning future scenarios for defense against hybrid or any other cyber threat/s.


2015 ◽  
Author(s):  
Whitney Winders ◽  
Cariana Cornel ◽  
Caralea Cornel ◽  
Allie Larson ◽  
Sarah Cunha ◽  
...  

Author(s):  
Arif Sari ◽  
Ugur Can Atasoy

Cyber security is the newest internal concern of this century where different technologies developed through telecommunication, computers, and internet are used in the international arena as cyber-weapons. This chapter provides in-depth information about up-to-date cyber-attack methods and mechanisms used in the cyber war, and it focuses on the cyber war incidents starting from 1982 with Siberia Natural Gas Explosion until 2015 Russia-Turkey cyber-attack conflict and between variety of developed and developing countries in detail. In addition to this, cyber-weapons developed by Russia, USA, and Israel targeting critical infrastructure are elaborated. The chapter concludes with the use of cyber-attack methods and tools with their taxonomy and elaborates the fundamentals of cyber defense strategies to these proposed attacks with existing solutions from the literature.


2015 ◽  
Vol 5 (4) ◽  
pp. 59-68
Author(s):  
Matthew D. Gonzalez

The goal of this paper is to investigate international aspects regarding cyber security, cyber war, and terrorism. These aspects are legal issues, social implications, technical parameters, and the ethical bearing. As this article contains research pertaining to the Stuxnet worm and aims to predict the future of cyber war using recent statistics, the journal is most pertinent to this article's contents. Researchers and practitioners alike will reviewthe twenty-first century concept of cyber war which is subtler, yet just as dangerous as traditional confrontation methods.


2020 ◽  
Vol 3 (2) ◽  
pp. 181-192
Author(s):  
Iqbal Ramadhan

Cyber security is a new kind of topic in security studies. This issue came as prominent discourse when all the human aspect range from politics, military, economics and societal are connected to the cyber space. Cyber terrorism, cyber crime and cyber war are the most potential threat who come from the cyber world. As the strategic region in the world, South East Asia who has promising economic growth cannot escape from those threats. The aim of this research is to explain what kind of strategy that can be implemented in protecting the cyber security of South East Asia. To answer the research question, the author used mainstream approach such neorealism and neoliberalism. From the author’s perspective, ASEAN countries need to develop their technological power without ignoring the weightiness of interstate cooperation.   Keywords: cyber security, neorealism, neoliberalism, security studies, South East Asia Abstrak Keamanan cyber pada hakikatnya merupakan isu dalam studi keamanan yang terbilang masih sangat baru. Isu ini muncul ketika semua aspek kehidupan politik, militer, ekonomi, sosial dan budaya terhubung ke dunia maya. Ancaman cyber yang berpotensi sebagai ancaman adalah cyber terrorism, cyber crime dan cyber war. Asia Tenggara sebagai salah satu kawasan penting di dunia dengan tingkat pertumbuhan ekonomi yang cukup tinggi tidak terlepas dari ancaman tersebut. Penelitian ini bertujuan untuk membahas strategi seperti apakah yang paling tepat dalam menjaga keamanan cyber di kawasan Asia Tenggara. Dalam menjawab research question, peneliti menggunakan pendekatan mainstream seperti neorealism dan neoliberal. Pada intinya, negara yang tergabung sebagai anggota ASEAN perlu mengembangkan kemampuan power teknologinya tanpa mengesampingkan pentingnya kerja sama antar negara.   Kata Kunci: keamanan cyber, neorealis, neoliberalis, studi keamanan, Asia Tenggara    


Author(s):  
Esra Söğüt ◽  
O. Ayhan Erdem

Thanks to the internet, the distances between the countries are easily overcome and the communication network rapidly expands. This situation also affects the cyber security of the countries to a great extent. Attacks on critical infrastructures, companies, and public institutions can be magnitude that make great harms. These developments in cyber space bring new problems. One of them is cyber terror. Cyber terror does not have a certain and well-known definition. Cyber terror is the realization of terrorist acts in the field of cyber war. In addition, cyber space is a place of display for terrorist acts. The effects of cyber terror attacks have reached a level to scare all countries. There is not enough information about the definition, characteristics, methods used in cyber terror attacks and cyber terror groups. It is important for national administrators and staff to become conscious and to become informed about cyber terror. In this chapter, information will be presented, endeavors on awareness-creation will be made, and a role of guiding the future studies will be taken.


2020 ◽  
Vol 19 ◽  

According to the opinion of the leading experts in the field of Cyber Security over the last few years there has been a transition from the stage of Cyber Criminality to the stage of Cyber War. In order to respond adequately to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. The present paper describes some of the results obtained in the Faculty of Computer Systems and Technology at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. These results are shown separately in the sphere of Cyber Threats Intelligence and Security Incident Handling.


Sign in / Sign up

Export Citation Format

Share Document