scholarly journals Deterrence by Denial approach for the most known State Cyber Vulnerabilities

Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.

2020 ◽  
Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.


Author(s):  
Khushpreet Kaur

Cybersecurity has a vital role in Information Technology. The cybersecurity security involves the security on data/information stored in various devices present on different networks. However, it is very difficult to secure information in today’s world because of the increasing number of devices like computer systems, mobile phones, televisions, etc. for technological development. The data can be in many forms like data of employees in the organization, an individual’s data present on a social media website, the data stored in mobile devices or on the cloud. This data is stored mostly on networks including the company’s websites, servers, the cloud which is the main reason for data to be hacked. Numerous cyber threats are increasing day by day and to ensure cybersecurity and privacy of internet users various challenges have been faced by IT industries. Those challenges include data security, mobile security, network security, Application Security, Biometric authentication. The elaboration of these cybersecurity challenges and cyberattacks will be discussed in this paper. Cyber attacks are not only harmful to organizations, but it is also dangerous for individuals. Those attacks are the attacks done by cyber attackers for their advantage or to harm individuals for their revenge. Some common cyber threats are phishing, ransomware attack, malware, etc. whose description is given below in the ‘Types of cyber-attacks’ section. Moreover, this paper includes cybersecurity techniques that will be helpful to reduce data breaches, identity theft, or other cyber threats. Awareness of those cyber techniques will help both individuals and organizations to protect their information from various types of cyberattacks.


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2018 ◽  
pp. 1060-1092
Author(s):  
Hanaa. M. Said ◽  
Rania El Gohary ◽  
Mohamed Hamdy ◽  
Abdelbadeeh M. Salem

Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.


Author(s):  
Oleksandr Klevtsov ◽  
Artem Symonov ◽  
Serhii Trubchaninov

The chapter is devoted to the issues of cyber security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPP). The authors examined the main types of potential cyber threats at the stages of development and operation of NPP I&C systems. Examples of real incidents at various nuclear facilities caused by intentional cyber-attacks or unintentional computer errors during the maintenance of the software of NPP I&C systems are given. The approaches to vulnerabilities assessment of NPP I&C systems are described. The scope and content of the assessment and periodic reassessment of cyber security of NPP I&C systems are considered. An approach of assessment to cyber security risks is described.


Author(s):  
Merve Yildirim

Due to its nature, cyber security is one of the fields that can benefit most from the techniques of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to defend against cyber-attacks that are constantly developing and strengthening in network systems. By applying artificial intelligence techniques, software that can detect attacks and take precautions can be developed. In cases where traditional security systems are inadequate and slow, security applications developed with artificial intelligence techniques can provide better security against many complex cyber threats. Apart from being a good solution for cyber security problems, it also brings usage problems, legal risks, and concerns. This study focuses on how AI can help solve cyber security issues while discussing artificial intelligence threats and risks. This study also aims to present several AI-based techniques and to explain what these techniques can provide to solve problems in the field of cyber security.


2015 ◽  
Vol 26 (2-4) ◽  
pp. 193-205 ◽  
Author(s):  
Sico van der Meer

Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effective (and cheaper) than a single focus on national cyber-deterrence strategies. In the long term, cooperation between states to establish confidence and commonly accepted norms of behaviour in cyber space are the most promising ways available to achieve enduring cyber security and stability. Enhancing interstate co-operation, transparency and predictability of behaviour in cyberspace will reduce the risks of misperception, escalation and conflict.


Sign in / Sign up

Export Citation Format

Share Document