China's Cyber Tool

2014 ◽  
pp. 794-812
Author(s):  
Timothy L. Thomas

This chapter analyses how China is using cyber reconnaissance to achieve electronic shi, defined as strategic advantage. It examines China's cyber strategy and information age advantages; Chinese financial and military cyber threats; China's hacker population; and Chinese organizations devoted to cyber defense. Once attained, electronic shi allows a country to “win victory before the first battle.”

2012 ◽  
pp. 409-427
Author(s):  
Timothy L. Thomas

This chapter analyses how China is using cyber reconnaissance to achieve electronic shi, defined as strategic advantage. It examines China’s cyber strategy and information age advantages; Chinese financial and military cyber threats; China’s hacker population; and Chinese organizations devoted to cyber defense. Once attained, electronic shi allows a country to “win victory before the first battle.”


Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


Author(s):  
Sandhya Sukhabogi Et.al

Cyber Threat Intelligence (CTI) is the emerging strategy of cyber defense which helps organizations to combat the latest and more sophisticated cyber threats. Gathering this threat information, analyzing and communicating it between the security teams is very difficult and challenging because of the heterogeneous aspects involved.  The necessity of sharing the intelligence related data collected by organizations is increasing day by day to counter the ever changing and highly dynamic threat landscape. In this paper an attempt is made to understand CTI concept and how it is collected and analyzed to form useful actionable intelligence are observed. The importance of Threat intelligence sharing, and various standards working in the area of TIS are also mentioned. Finally the primary challenges in TIS are given a light in a broad view


Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


2018 ◽  
pp. 1185-1207
Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


2017 ◽  
Vol 10 (1) ◽  
pp. 1-34 ◽  
Author(s):  
Hemen Philip Faga

AbstractThis paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.


Ubiquity ◽  
2021 ◽  
Vol 2021 (March) ◽  
pp. 1-6
Author(s):  
Bushra Anjum

In this interview, Bushra Anjum, senior editor Ubiquity, sits down with Xiaokui Shu, a Research Staff Member at IBM, and they chat about the latest emerging issues in cybersecurity. Is it possible to discover modern cyber threats before attackers accomplish their goals? The discussion then turns to the new era of dynamic cyber defense, which consists of detection strategies and procedures developed on the fly by security analysts based on live observations.


Sign in / Sign up

Export Citation Format

Share Document