scholarly journals NATO’s current cybersecurity and cyber defense strategies

2020 ◽  
pp. 160-184
Author(s):  
Andrei Manoilo
Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


Author(s):  
Arif Sari ◽  
Ugur Can Atasoy

Cyber security is the newest internal concern of this century where different technologies developed through telecommunication, computers, and internet are used in the international arena as cyber-weapons. This chapter provides in-depth information about up-to-date cyber-attack methods and mechanisms used in the cyber war, and it focuses on the cyber war incidents starting from 1982 with Siberia Natural Gas Explosion until 2015 Russia-Turkey cyber-attack conflict and between variety of developed and developing countries in detail. In addition to this, cyber-weapons developed by Russia, USA, and Israel targeting critical infrastructure are elaborated. The chapter concludes with the use of cyber-attack methods and tools with their taxonomy and elaborates the fundamentals of cyber defense strategies to these proposed attacks with existing solutions from the literature.


2018 ◽  
pp. 1185-1207
Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


2019 ◽  
Vol 21 (1) ◽  
pp. 68-75
Author(s):  
Livia SANGEORZAN ◽  
◽  
Nicoleta ENACHE-DAVID ◽  
Claudia-Georgeta CARSTEA ◽  
Denisa-Iulia CATANA ◽  
...  

2018 ◽  
Vol 15 (2) ◽  
pp. 195-214 ◽  
Author(s):  
Martin Jose Hernandez Mediná ◽  
Cristian Camilo Pinzón Hernández ◽  
Daniel Orlando Díaz López ◽  
Juan Carlos Garcia Ruiz ◽  
Ricardo Andrés Pinto Rico

Open source intelligence (OSINT) is used to obtain and analyze information related to adversaries, so it can support risk assessments aimed to prevent damages against critical assets. This paper presents a research about different OSINT technologies and how these can be used to perform cyber intelligence tasks. One of the key components in the operation of OSINT tools are the “transforms”, which are used to establish relations between entities of information from queries to different open sources. A set of transforms addressed to the Colombian context are presented, which were implemented and contributed to the community allowing to the law enforcement agencies to develop information gathering process from Colombian open sources. Additionally, this paper shows the implementation of three machine learning models used to perform sentiment analysis over the information obtained from an adversary. Sentiment analysis can be extremely useful to understand the motivation that an adversary can have and, in this way, define proper cyber defense strategies. Finally, some challenges related to the application of OSINT techniques are identified and described.


2021 ◽  
Author(s):  
Tam ngoc Nguyen

Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Digital Twins (DTs) and particularly Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple knowledge domains. Simulated results offer insights into adversaries' behaviors and tactics, resulting in better proactive cyber-defense strategies. For the first time, this paper solidifies the vision of DTs and HDTs for cybersecurity via the Cybonto conceptual framework proposal. The paper also contributes the Cybonto ontology to guide the developments of such HDTs. In particular, the ontology formally documented 108 constructs and thousands of cognitive-related paths based on 20 time-tested psychology theories. Finally, the paper applied 20 network centrality algorithms in ranking the constructs by their cognitive influences. The top 10 constructs call for extensions of current digital cognitive architectures such as: explicitly implementing more refined structures of Long-term Memory and Perception, putting a stronger focus on influential non-cognitive constructs such as Arousal, and creating new capabilities for simulating, reasoning about, and selecting circumstances.


Sign in / Sign up

Export Citation Format

Share Document