Cyber Intelligence and Security

Knowledge society is characterized by a hyper-dynamic knowledge, continuously subject to review and discussion, shared, cross-media-based, with multiple reference points and an overload of information. What types of information are at risk? So many, such as power delivery, communications, aviation, financial services, medical records, criminal records, business plans. The threat posed to nations from terrorists is no longer just physical but also expands to our digital world. The benefits of the information age are numerous, but nascent threats like transnational cyber terrorism and information warfare exist alongside the positive aspects of globalization. A new challenge has emerged for free societies: democracies must find ways to strike a balance between allowing internet freedom on one hand and maintaining adequate early warning and monitoring systems on the other. These systems, combined with expanded cybersecurity cooperation across borders, will be integral in detecting suspicious digital activities and countering attempted acts of cyber warfare and cyber terrorism.

Author(s):  
André Årnes

A central issue in assessing and responding to an attack on the Internet is the identification and localization of the attackers. In information warfare and cyber terrorism, an attack can be launched using a large number of hosts, in which case fast and accurate identification and tracing is crucial for handling and responding to the attack. In the digital world of the Internet, however, there are many cases where a successful trace is difficult or impossible. The design of the Internet, as well as services that hide the origin of communication and provide anonymity, complicate tracing and create a need for a wide range of tools for tracing. In this chapter, we provide a survey of different tools and services available for tracing the geographic location of hosts and users on the Internet. We consider both active and passive methods of identification and tracing. A passive trace uses information that is available through public sources, in log data, or through commercially available databases. Active methods involve the use of tools for probing the attacking party directly, for example, through scanning and pinging. Some of the methods for locating addresses on the Internet have been developed for use in electronic commerce and marketing applications, but the basic principles are equally applicable to digital investigations and information warfare. We consider only tracing of addresses on the Internet. Consequently, this chapter only considers the Internet Protocol (IPv4 and IPv6), as well as higher level protocols using IP (such as TCP, UDP, and HTTP). We refer to the host that we try to identify as the target host and its address as the target address. The system used to execute the tracing is referred to as the trace host.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Daniel Broby

AbstractThis paper presents an analytical framework that describes the business model of banks. It draws on the classical theory of banking and the literature on digital transformation. It provides an explanation for existing trends and, by extending the theory of the banking firm, it illustrates how financial intermediation will be impacted by innovative financial technology applications. It further reviews the options that established banks will have to consider in order to mitigate the threat to their profitability. Deposit taking and lending are considered in the context of the challenge made from shadow banking and the all-digital banks. The paper contributes to an understanding of the future of banking, providing a framework for scholarly empirical investigation. In the discussion, four possible strategies are proposed for market participants, (1) customer retention, (2) customer acquisition, (3) banking as a service and (4) social media payment platforms. It is concluded that, in an increasingly digital world, trust will remain at the core of banking. That said, liquidity transformation will still have an important role to play. The nature of banking and financial services, however, will change dramatically.


2016 ◽  
Vol 11 (4) ◽  
pp. 111-121 ◽  
Author(s):  
Lawrence Ogechukwu Obokoh ◽  
James Unam Monday ◽  
Udechukwu Ojiako

The paper explored the extent to which current microfinance lending impacts on indigenous SME access to finance and how the intermediation services of the microfinance banks (MFBs) contributed to or otherwise to the development of SMEs. A total of 800 such indigenous SMEs were identified, however, data were obtained from 300 of the identified indigenous SMEs from a questionnaire survey in four states (provinces) within the country that make up the Niger Delta region. The result shows positive contribution of microfinance lending to the development of such enterprises. However, it appears that a number of factors including cumbersome process, poorly packaged business plans and perceived high cost of credit still limit the access of indigenous SMEs to credit. Keywords: microfinance banks, SMEs, entrepreneurship, financial services. JEL Classification: G21, L26, M13


2021 ◽  
Vol 58 (2) ◽  
pp. 629-636
Author(s):  
Priyanka Mishra

INTRODUCTION- Misinformation. Hoaxes. Rumours. Fake news- so many terms for the same phenomenon. It is something which is not new and has been going on since as early as any of us can remember. Although recently, it has seen a sudden boom with the advent of the digital world and suddenly everyone seems to have an opinion on everything going on in the world, however ill formed it maybe. SUMMARY- In such a situation, how could the single biggest event of 2020- the corona virus or COVID 19 pandemic, be an exception to this trend. All of us have come across some piece of “information” regarding this microscopic being which while staying invisible to the naked eye has proved to be mankind’s worst nemesis till date and has brought the world down on its knees. It proved to be an evil which could exist in any form- pictures, videos, text messages, audio messages, news headlines or a simply misconstrued interpretation of something said by a public figure. There are various reasons responsible for this surge of fake news, primarily the multitude of information available today at one’s fingertips coupled with lack of scientific attitude and awareness. The proliferation of social media has democratized access to all types of information and at the same time blurred the line between truth and falsehood. Although there is evidence that social media was used as a channel to disseminate useful information such as common symptoms of COVID infection, need for social distancing etc, the consequences of false information masquerading as verifiable truth were apparent during the peak of the pandemic crisis, with false parallels being drawn between scientific evidence and uninformed opinion. CONCLUSION- Fake news needs to be scrutinised harder than ever with the world facing its biggest health crisis in centuries.


2020 ◽  
Vol 6 (16) ◽  
pp. 24-35
Author(s):  
Gbenga F. Babarinde ◽  
◽  
Matthew O. Gidigbi ◽  
Julius T. Ndaghu ◽  
Idera T. Abdulmajeed ◽  
...  

Digital finance is a type of financial service that employs digital products like personal computers, the internet, mobile phones, cards linked to a digital payment system. Innovations in the digital world cannot be divorced from Nigerian financial services most notably the banking sector. Therefore, it means that banking industry cannot but embrace digital innovations in their services delivery. Hence, there is a need to review the impact of digital finance in the Nigerian banking sector. Desk research method was used to examine how innovations in the digital world could impact the future financial service delivery in the Nigerian banking sector. From the review, it was that the digital world is quickly changing and this impacts banking in all ramification. It is recommended that the banking industry should try to keep pace with the digital innovations, for them to be able to meet up the demands of their digitally-savvy customers.


Author(s):  
E. A. Antonyan ◽  
I. I. Aminov

In the paper, modern blockchain technologies are called a revolutionary phenomenon, equal in importance to the ingenious invention of the 20th century — the Internet. Originally developed for Bitcoin digital currency and launching the network of the same name, the blockchain technology created a platform for the new type of the Internet, influenced the decentralization of the Network according to the distributed registry principle, and began to be used in various types and combinations for various purposes, including cybersecurity. The paper argues that the use of blockchain technology to ensure cybersecurity is infinite due to such unique properties as reliability, accessibility, high adaptability, economic efficiency, profitability. The use of blockchain technologies to combat cybercrime, including cyberterrorism, may extend to control over financial services, transportation or any other industry. However, the growth of criminal activity using the blockchain technology will also be enhanced if the law enforcement agencies are not technologically competent, can detect these developing centers, determine their actions and destroy plans at a faster pace.


2018 ◽  
Vol 21 ◽  
pp. 49-53
Author(s):  
Pēteris Grabusts

In the modern sense, the concept of information warfare includes the use and management of information and communication technologies to achieve a competitive advantage compared to the opponent. An information warfare is a manipulation with information that trusts a goal without an objective understanding, so that the goal is to take decisions against its own interests in the interests of the opponents. Information structures are considered as systems that produce and process various types of information, provide the storage of information and access to users. Such information structures may include neural networks, adaptive learning systems, etc. They must be prepared to train, respond to threats and ensure the safety of their existence, which is very topical during modern information warfare. This analytical article will cover more theoretical aspects related to the security of information systems from the system theory point of view. Knowledge base of the information structure can be a neural network, in which training should be provided from external threats.The author considers artificial neural networks as one of the potential threats in the context of information warfare.


2018 ◽  
Vol 9 (1) ◽  
pp. 70-78
Author(s):  
Olena Prymostka

The research is aimed to evaluate the internet marketing strategies in of life insurance companies in Ukraine. The insurance service in the time of digitalization faces scenarios of implementation in the marketing strategy on-line component. The main challenge for Ukrainian life insurance companies comparatively with the world practice is non-obligatory status of such kind of insurance contracts. So, on the one hand, costs of operation, regulatory pressures and inflexible technology infrastructure are increasing, and, on the other hand, economic recession does not allow to increase the number of insured persons, premiums and profit growth.Sector of financial services is characterized by an increase in the level of competition, life insurance compelled to compete with pensions funds, banks and other financial institutions in order to defend their market share. Insurance companies marketing strategy determines how an insurer can best achieve its goals and objectives, keep existing customers and attract new ones with minimal costs.Keeping all the above problems around the study would attempt to study all the factors that contributed to the effective marketing strategies. This paper presents different marketing strategies that are taken up in life insurance services keeping in view external and internal environment of the company.


Author(s):  
Olga Puchnina

The article analyzes the transformation of concepts like liberty, equality, and democracy depending on the political, historical, and socio-cultural context. The author proposes to trace the significant difference in understanding “universal” socio-political values by using the classical liberal theories of B. Constant and A. de Tocqueville compared to modern international political processes. The author uses comparative and historical analysis methods, and a cultural and axiological approach to studying the ideology and politics. The argument is that the ancient understanding of liberty was irrelevant for the society of the XIX century, just as B. Constant’s classical understanding of liberty no longer meets the changing socio-political needs of people living in the XXI century. It does not consider a fundamentally new sphere of human activity like freedom and privacy in the digital world. Recognizing the value of democracy, the author observes that today, A. de Tocqueville’s approach is more than adequate for understanding political processes. For example, the post-election information warfare in the United States in 2020 shows the relevance of the specific understanding of Tocqueville’s democracy as a profound process of total equality spread. The main conclusion is that the political values familiar to modern discourse often are interpreted inadequately to reality since scientific understanding is rigid and lags behind the rapid development of information technologies, globalization, and virtualization.


2020 ◽  
pp. 89-106
Author(s):  
Jacek Gerwatowski

This article analyses issues in the feld of information and IT securityand attempts to explain what is meant by information security and presentspotential opportunities and threats in this feld. The article discusses various types of information security threats, from those with a “traditional” character, such as espionage, through to threats resulting from the developmentof new technologies, e.g. cyber-terrorism and threats resulting from the activities of natural forces. The article presents the tasks of public administration and local government units in the feld of information security resulting,inter alia, from the provisions of the Act on access to public information orregulations on the protection of personal data.


Sign in / Sign up

Export Citation Format

Share Document