Ontological (In)visibility and Cyber Conflict: The Problem of Sight and Vision in Establishing Threat

2021 ◽  
pp. 030437542110245
Author(s):  
Jonathon P. Whooley

This paper builds on the work of scholars working on ontological security, cyber security, and computer science to understand the problem of threat assessment and vision before, during, and after cyber-attacks. The previous use of ontological security theory (OST) has been limited because it has relied upon an overly simplistic vision of threat assessment at the international, state, and individual level. While previous scholars have examined the background, latent, or assumed visions of security threats as interpreted by agents and how their conditions do or do not effectively capture the anxieties of populations and practitioners this piece seeks to put these issues in conversation. In conceiving of ‘the state’ and ‘threat’ this piece examines the notion of vision, because as states conceive of threats in terms of terrorism (overt and theatrical) and cyber (covert and private) a mismatch of responses is noted. This piece reads the current cyber security landscape (2009-2019) in the United States through a lens of repeated and rambunctious cyber-threats and attacks and a largely passive response by the US citizenry through OST alongside: (1) the literature on computer science dealing with the concept of ontology, (2) the traditional threat framework found in the terrorism literature around response to threat with a comparison to the cyber-conflict literature, an (3) examination of the interplay between the public and government around the visibility and salience of cyberthreats.

Subject The threats and capabilities of UAE in cyber security. Significance Concerns over cyber security are mounting with high-profile commercial breaches on companies such as TV5 Monde, Sony Pictures Entertainment, Target and Home Depot, and disclosures on nation-state capabilities and actions, such as the Stuxnet attack on Iranian centrifuges at Natanz in 2010 and the Shamoon virus attack on Saudi Aramco in 2012. The combination of rising cyber crime and geopolitical cyber conflict, not least that emanating from the Islamic State group (ISG), alarms the United Arab Emirates (UAE) as it seeks to enhance its position as a financial and logistics hub. Impacts Cyber-savvy ISG sympathisers are likely to conduct further cyber attacks to avenge the US-led air campaign against ISG. ISG-sympathetic insiders may be an even higher threat to businesses and governments. Managed Security Services Providers (MSSP) will be the primary beneficiary of moves to increase cyber security.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 303-303
Author(s):  
HwaJung Choi ◽  
Robert Schoeni ◽  
Tsai-Chin Cho ◽  
Kenneth Langa

Abstract The paper’s goal is to assess whether and, if so, the extent to which prevalence in disability of adults near retirement ages in the US increased over time compared to their peers in England and examine income group differences in the relative trends. This study uses 2002-2016 Health and Retirement Study (HRS) and English Longitudinal Study of Ageing (ELSA) focusing on adults aged 55-64. Annual percent changes over the period of 2002-2016 for limitations in instrumental activities of daily living (IADL) and activities of daily living (ADL) are estimated for each survey (HRS and ELSA) using multivariable logistic regressions to adjust for individual-level characteristics While disability prevalence of adults ages 55-64 in England improved over the years of 2002-2016 (annual % change= -2.01 for IADL; - 2.53 for ADL), disability prevalence of US adults has not improved and in fact even worsened in terms of IADL (annual % change= +1.35). There are substantial variations in the IADL/ADL trends by income groups. In the US, the adverse trends in disability were more pronounced among the lowest income groups (annual % change in IADL=1.76 for bottom 20% vs. -2.08 for top 20%; annual % change in ADL=1.08 for bottom 20% vs. -2.08 for top 20%). In England, the disability status improved over time for all but the lowest income group. We will examine further to identify specific factors contributing to divergent/convergent trends in disability between the US and England.


2022 ◽  
pp. 193-203

The purpose of this chapter is to analyze and review trends in digital terminology. The chapter begins by examining the origins of computerization in the United States during the 19th and 20th centuries. Next, the chapter examines the key concepts punch cards and computer science. The chapter then discusses how the term computer science is misleading. This is followed by a discussion of how information technology became the most popular term in the US. The chapter then switches focus to Europe and discusses France's promotion of informatique as well as Europe's switch from informatics to ICT. Next, the chapter considers how the internet has given rise to terms like e-commerce. The chapter concludes by considering the transition from ICT to digital informing and informing technology.


2019 ◽  
Vol 47 (02) ◽  
pp. 70-89
Author(s):  
Hala Bou Alwan

AbstractDespite an ongoing drive by governments and law enforcers around the world to improve the sophistication of their risk mitigation measures, cyber-attacks are continually increasing. A study from Computer Crime and Intellectual Property Section (CCIPS) shows more than 4,000 ransomware attacks occurred daily in 2016. That's a 300 percent increase over 2015, where 1,000 ransomware attacks were seen per day. Cyber criminals are successfully penetrating even the most high-profile companies and governmental agencies. The breach at the NSA was truly alarming and just one recent example of the dire situation the country, and world, face as cybercrime intensifies and the cyber security talent shortage becomes more serious.Accordingly, the purpose of this research is to focus on cyber education at the national, government, and law enforcement level examining the methodology to set the tone from the top ensuring alignment between governments, law enforcers, private sector, and academic level. It also examines the gaps in cyber laws and educational governance initiatives and their impact on efficient execution of cyber policies for various regions of the world with a focus on the United Arab Emirates and the United States of America.Finally, this article recommends policy guidelines and a compliance manual framework for governments and law enforcers to consider ensuring that cyber risks are properly addressed and mitigated in a structured and coherent way.


2021 ◽  
Vol 2 (1) ◽  
pp. 105-122
Author(s):  
Devi Purwanti

The United States and China had conducted cyber cooperation since 2011. But in 2013, both states were involved in the cyber conflict that made the previous cyber collaboration had been ineffective. After that, in 2015, both states agreed to re-form cyber cooperation. This study aims to analyse the United States' motivation in conducting cyber partnerships with China using the cybersecurity concept. This research has discovered at the national level, the United States tried to achieve its information assurance through cyber defence strategy by strengthening collaboration. On the other hand, at the international level, norm construction through bilateral collaboration has made the United States become an impactful actor in international cybersecurity.


Subject China and the global internet governance regime. Significance Cyber security was a leading topic at the Global Conference on Cyberspace that took place on April 16-17 in The Hague. As online tensions escalate and cyber attacks grow in prevalence, the direction of Chinese policy will be crucial in determining the future of the global internet. At the same time, the United States has lost much political capital and bargaining power. Impacts China may try to establish alternative internet structures and systems. China's conception of national sovereignty will hold back the cooperation procedures necessary to manage cyber space incidents. Without international cooperation, countries and companies may seek to retaliate against cyber attacks rather than merely ward them off.


2019 ◽  
pp. 331-367
Author(s):  
Cameron S. D. Brown

This chapter examines legal and technical issues that arise when considering strategic retaliatory countermeasures to cyber-attacks. Implications connected with endorsing techniques of active defense for nation-states are viewed alongside challenges faced by private entities. Proactive avenues for tackling cyber-security threats are evaluated and shortcomings within the international system of governance are analyzed. Retributive justice as a legal and philosophical concept is viewed through the lens of customary international law pertaining to use of force and self-defense. Difficulties in adapting rules governing kinetic warfare to instances of cyber-conflict are elucidated. The danger of executing counterstrikes for private entities is explained with reference to cross-border dilemmas, conflict of laws, and risks stemming from civil, criminal, and also administrative liability. Protocols for safeguarding anonymity are observed and the problem of attribution is illustrated. Costs and benefits associated with adopting methods of active defense are presented and solutions to avoid accountability failure are recommended.


2021 ◽  
pp. 77-87
Author(s):  
Sonia Ibrahim ◽  
◽  
◽  
◽  
◽  
...  

Cyber security practices mainly involve the prevention of external threats to software, hardware, server data, and other assets which are connected to the internet. Organizations follow a lot of cyber security practices to protect their systems and databases from malicious cyber actors. Cybercriminals use different techniques like spear-phishing, phishing, password attack, denial of service, ransomware, etc. to cause harm to people, organizations, and governments and steal important information from them. We analyzed the use of deep learning algorithms to deal with cyber-attacks. Deep neural networks or deep learning consist of machine learning procedures to support the network to fix complex issues and learn from unmanaged data. In addition, we also analyzed some of the cyber security laws and practices implemented in the US and Saudi Arabia to work collaboratively against cyber threats. It is observed that both countries are doing well against cyberthreats, but they need to work even more to provide training and support to professionals in the public sector who handle sensitive data about cyber security.


2019 ◽  
Author(s):  
Jiemin Ma ◽  
Ahmedin Jemal

Abstract Data on recent trends in mortality from major cancers by individual-level socioeconomic status (SES) are lacking in the US. We examined mortality trends and disparities by educational attainment (rate ratio ≤12 vs. ≥16 years of education) from 2001-2016 for lung, colorectal, female breast, and prostate cancers among persons aged 25-74 years. During 2001-2016, death rates continued to decrease in each stratum of sex/education categories for all four cancers, with the steepest decline among those with ≥16 years of education. Consequently, relative educational disparities widened over time. Among men for example, lung cancer death rates from 2001-2016 decreased 2.70% per year in persons with ≤12 years of education compared to 5.44% per year among those with ≥16 years of education, and the rate ratio increased from 2.96 (95%CI, 2.84-3.09) to 4.58 (95%CI, 4.41-4.76). Enhanced interventions targeting low SES populations are needed to reduce the inequality and accelerate progress against cancer.


2018 ◽  
Vol 189 (3) ◽  
pp. 57-71 ◽  
Author(s):  
Boguslaw Olszewski

The term Advanced Persistent Threats (APT, APTs) has a relatively short history – originated in the United States’ government spheres and as such was referred to cyber attacks waged by a state actor. The emergence of such threats has been linked to the evolution of the hacker underground that took place after 2000. The activity of specialists swelling the Black Hat ranks had the nature of criminal offences, targeting data collected by corporations and state institutions. Despite a dozen or so years of experience with APTs, they continue to be a dynamic category of contemporary cyber security threats, with many evolving components beyond simple classification. Their unambiguous identification as a strictly separate type is obstructed mainly by the complex structure of such attacks, prompting analysts to locate them in a catalog containing various known vulnerabilities, mechanisms, cycles and variables. The analysis of the problem and the evolution of attacks to date has led to the hypothesis that Advanced Persistent Threats are now in the phase of their further modification and testing as a means of offensive action in inter-state and asymmetric conflicts. Armed forces and special services of states saw in them not only a tool per se to achieve economic and military advantage, but a theoretical basis for further research on the development of advanced cyber weapon.


Sign in / Sign up

Export Citation Format

Share Document