scholarly journals Cyber War - Trends and Technologies

2021 ◽  
Vol 21 (3) ◽  
pp. 65-94
Author(s):  
Darko Trifunović ◽  
Zoran Bjelica

Cyberspace has become an indispensable part in which special operations such as cyber war or warfare take place. The role of special war as the use of so-called soft power was emphasized. The country's number of potential adversaries in cyber warfare is unlimited, making highly endangered aspects of cyber civilian infrastructure, which is essentially military readiness, including the mobilization of forces through the civilian sector, also a likely target. A special type of cyber war or warfare is hybrid warfare. This type of warfare is increasingly resorted to because it is extremely cheaper than the conventional method of warfare and at the same time brings exceptional results. The first thing that affects cyber security policy analysts comes with the issue of neutrality, as well as the huge variety of assessments about future attack and defense technologies. There is also a consideration that the new (problematic) cyber technology will be deployed in a short period of time, in time periods, in just a few days in terms of warnings. Second, is the trends in cyber-attack and defense technologies and who is following those processes. Third, decision making technology having in mind high-performance computers, technologies that are well known, although rapidly evolving, are increasingly seen as a basic means of managing cyber defense at the national military and security level, as well as a new weapon in the hands of opponents. Fourth, role of intelligence in planning future scenarios for defense against hybrid or any other cyber threat/s.

2017 ◽  
Vol 4 (2) ◽  
pp. 205316801771593 ◽  
Author(s):  
Sarah Kreps ◽  
Debak Das

Accusations of Russian hacking in the 2016 US presidential election has raised the salience of cyber security among the American public. However, there are still a number of unanswered questions about the circumstances under which particular policy responses are warranted in response to a cyber-attack and the public’s attitudes about the conditions that justify this range of responses. This research investigates the attributes of a cyber-attack that affect public support for retaliation. It finds that cyber-attacks that produce American casualties dramatically increase support for retaliatory airstrikes compared to attacks with economic consequences. Assessments of attribution that have bipartisan support increase support to a lesser extent but for a broader range of retaliatory measures. The findings have important implications for ongoing debates about cyber security policy.


2015 ◽  
Vol 5 (1) ◽  
pp. 19-29 ◽  
Author(s):  
Oliver Burmeister ◽  
Jackie Phahlamohlaka ◽  
Yeslam Al-Saggaf

Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the “0x Omar”-Israeli conflict of 2012, as reported in the Arabic and English media and on the Internet, is used to explore ethical issues that this case raises and to examine how the risks posed could be mitigated in relation to relevant elements of the South African cybersecurity policy framework. Questions raised include: At what point does the policy require a nation state to prepare for a cyber offence in response to a cyber attack? Ethically, how are such actions consistent with the principle of good governance?


2018 ◽  
pp. 325-336
Author(s):  
Oliver Burmeister ◽  
Jackie Phahlamohlaka ◽  
Yeslam Al-Saggaf

Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the “0x Omar”-Israeli conflict of 2012, as reported in the Arabic and English media and on the Internet, is used to explore ethical issues that this case raises and to examine how the risks posed could be mitigated in relation to relevant elements of the South African cybersecurity policy framework. Questions raised include: At what point does the policy require a nation state to prepare for a cyber offence in response to a cyber attack? Ethically, how are such actions consistent with the principle of good governance?


Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


2019 ◽  
pp. 145-160
Author(s):  
Filip Kaczmarek

The research purpose of this paper is to examine the role of the BRI in China-Africa relations and the mutual interdependence between the BRI and other forms of Chinese presence in Africa. In order to attain this goal, the method of analysis of secondary data will be employed regarding concluded agreements, trade exchange, Official Development Assistance (ODA), foreign direct investment (FDI), debt, instruments of soft power and plans for the future. The analysis allows the several conclusions to be drawn. The BRI is so flexible that it can be extended in a relatively simple way and in a short period to other African countries. The BRI is the structuring factor in China’s strategic approach to Africa and can give new impetus to Chinese trade, investment and contracts in Africa. The former institutional co-operation framework that encompassed the whole of Africa was very general and did not result in the identification of such concrete sectoral priorities as is the case with the BRI. The Initiative has exerted influence on China’s policy in Africa. There is no doubt that the Initiative’s core task in Africa is infrastructure connectivity, but one of the tasks proposed for the future is industrial relocation. If this task is accomplished, it may be fundamental for Africa’s development.


2018 ◽  
pp. 1125-1145
Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


2021 ◽  
Vol 9 (09) ◽  
pp. 274-279
Author(s):  
Sumanta Bhattacharya ◽  
◽  
Bhavneet Kaur Sachdev ◽  
Arpan Kundu ◽  
Khewan Bansal ◽  
...  

Cyber space industry has made massive profit during this pandemic with everything going online along with the electronic industry in India , Today , Asia has the maximum population playing video gamers, the gaming industry is earning in billions , digital education , digital economy , work from home everything went online over night , which gave rise to cyber crime cases in India . India data is vulnerable and there is no cyber law which talks about privacy , more than 50% of the population lost their sensitive information online , there was cases of online job frauds and debit and credit fraud . The cyber law in India requires reform where phishing and cyber warfare are given legal protection in India , DATA protection , privacy and spamming requires legal attention . Banks are sensitive to cyber criminal because of the poor cyber security system and not so strong cyber laws which has affected the economy , people have lost many in lacs in these months , The cases of risen in 2020 to 2021 . India also needs to upgrade its cyber security policy and bring in professional in this field.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1413
Author(s):  
Yulu Qi ◽  
Rong Jiang ◽  
Yan Jia ◽  
Aiping Li

In 2012, Google first proposed the knowledge graph and applied it in the field of intelligent searching. Subsequently, knowledge graphs have been used for in-depth association analysis in different fields. In recent years, composite attacks have been discovered through association analysis in the field of cyber security. This paper proposes an attack analysis framework for cyber-attack and defense test platforms, which stores prior knowledge in a cyber security knowledge graph and attack rule base as data that can be understood by a computer, sets the time interval of analysis on the Spark framework, and then mines attack chains from massive data with spatiotemporal constraints, so as to achieve the balance between automated analysis and real-time accurate performance. The experimental results show that the analysis accuracy depends on the completeness of the cyber security knowledge graph and the precision of the detection results from security equipment. With the rational expectation about more exposure of attacks and faster upgrade of security equipment, it is necessary and meaningful to constantly improve the cyber security knowledge graph in the attack analysis framework.


Author(s):  
Arif Sari ◽  
Ugur Can Atasoy

Cyber security is the newest internal concern of this century where different technologies developed through telecommunication, computers, and internet are used in the international arena as cyber-weapons. This chapter provides in-depth information about up-to-date cyber-attack methods and mechanisms used in the cyber war, and it focuses on the cyber war incidents starting from 1982 with Siberia Natural Gas Explosion until 2015 Russia-Turkey cyber-attack conflict and between variety of developed and developing countries in detail. In addition to this, cyber-weapons developed by Russia, USA, and Israel targeting critical infrastructure are elaborated. The chapter concludes with the use of cyber-attack methods and tools with their taxonomy and elaborates the fundamentals of cyber defense strategies to these proposed attacks with existing solutions from the literature.


2013 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.


Sign in / Sign up

Export Citation Format

Share Document