The Opportunities of National Cyber Strategy and Social Media in the Rhizome Networks

2014 ◽  
Vol 4 (2) ◽  
pp. 23-34
Author(s):  
Aki-Mauri Huhtinen ◽  
Arto Hirvelä ◽  
Tommi Kangasmaa

Securing the society is a central task of the state. In the present day, as well as in the future, knowledge and information are evermore closely tied to electronic data transfer. Finland's newly published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyberspace has a human element and a technological element. It is a way to influence and affect society. It may be used to influence minds or to attack the physical world, for example by disrupting traffic control. But cyberspace cannot exist without people. The cyberspace offers the platform so called strategic communication. Strategic communication is a concept that unites the efforts of governmental organisations to influence people in support of national interests. Formal organisations and institutions are often seen as being opposed or resistant to change. Social Media and the cyber domain can offer many opportunities but also unknown threats and risks. In this paper we argue that securing an organisation is a living and continuously changing process. Deleuze and Guattari (1983) present the concept of a rhizome, meaning a dynamic weed formation which, opposed to the arboreal and hierarchical structure of the tree, involves spontaneous, unpredictable and distant connections between heterogeneous elements (Linstead & Thanem 2007, 1484) Strategic Communication is the focus of a heated discussion in the military field: How can militaries be credible and uphold the high standards of democracy within the asymmetric and complex battlefield? To be credible one must act according to what is said. The challenge is that the scene is global in the information age. The act, the actor, the scene, the purpose – all are exposed to a global audience through cyberspace on a very short notice. The most effective way of showing the scene and actors is an audiovisual product. Examples of this come from all conflict zones. Militaries are establishing Youtube channels and supplying material from intense fighting and frontline action. The solution for supporting the organisation's own arguments has been the Combat Camera capability, in other words media-trained soldiers who are where the main effort is happening. Within the spirit of strategic communication, the cyber strategy itself is one way to operationalise cyber security by announcing measures to be taken against cyber attacks. In this article the authors reflect on the Finnish Cyber Strategy and Strategic Communications from a phenomenological perspective.

Author(s):  
Aki-Mauri Huhtinen ◽  
Arto Hirvelä ◽  
Tommi Kangasmaa

Securing the society is a central task of the state. In the present day, as well as in the future, knowledge and information are evermore closely tied to electronic data transfer. Finland's newly published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyberspace has a human element and a technological element. It is a way to influence and affect society. It may be used to influence minds or to attack the physical world, for example by disrupting traffic control. But cyberspace cannot exist without people. The cyberspace offers the platform so called strategic communication. Strategic communication is a concept that unites the efforts of governmental organisations to influence people in support of national interests. Formal organisations and institutions are often seen as being opposed or resistant to change. Social Media and the cyber domain can offer many opportunities but also unknown threats and risks. In this paper we argue that securing an organisation is a living and continuously changing process. Deleuze and Guattari (1983) present the concept of a rhizome, meaning a dynamic weed formation which, opposed to the arboreal and hierarchical structure of the tree, involves spontaneous, unpredictable and distant connections between heterogeneous elements (Linstead & Thanem 2007, 1484) Strategic Communication is the focus of a heated discussion in the military field: How can militaries be credible and uphold the high standards of democracy within the asymmetric and complex battlefield? To be credible one must act according to what is said. The challenge is that the scene is global in the information age. The act, the actor, the scene, the purpose – all are exposed to a global audience through cyberspace on a very short notice. The most effective way of showing the scene and actors is an audiovisual product. Examples of this come from all conflict zones. Militaries are establishing Youtube channels and supplying material from intense fighting and frontline action. The solution for supporting the organisation's own arguments has been the Combat Camera capability, in other words media-trained soldiers who are where the main effort is happening. Within the spirit of strategic communication, the cyber strategy itself is one way to operationalise cyber security by announcing measures to be taken against cyber attacks. In this article the authors reflect on the Finnish Cyber Strategy and Strategic Communications from a phenomenological perspective.


Author(s):  
Aki-Mauri Huhtinen ◽  
Tommi Kangasmaa ◽  
Arto Hirvelä

Securing society is a central task of the state. In the present day as well as in the future, knowledge and information are ever more closely tied to electronic data transfer. Finland's published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyber Security Strategy was introduced 2013 and has provided guidance to all governmental actors how to implement security activities to be able to respond to increased security threats in networks. Visuality has increasing importance in strategic communications, not least because it is faster than the written word and globally distributed via social media. Relatedly, camera drones are becoming increasingly important tools in the security economy, especially when it comes to enhancing military capability through combat cameras. The main challenge facing society is that the cyber domain in general, and social media in particular, is moving out of the control of the nation-state.


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


2019 ◽  
Vol 9 (3) ◽  
pp. 116-133
Author(s):  
Joe Burton

AbstractThis article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts to intimidate through cyberspace, and the concept of ‘cyber swaggering’. The article moves on to explore how cyber-attacks have been used to undermine electoral process, to erode free and fair media reporting, and how manipulation of social media can constitute a ‘virtual infiltration’ and ‘virtual occupation’ of the information domain. The article then explores how cyber-attacks conducted during the conflict in Ukraine have limited or otherwise affected freedom of expression. I argue that the wider effects of cyber operations on political, civil and human rights have been underexplored in the cyber security literature; that cyber-attacks have adversely affected freedom of expression in the conflict in Ukraine and in other political disputes; and that the coercion concept is ill-suited to accounting for the socio-psychological impact of modern cyber operations.


2021 ◽  
Author(s):  
Regonda Nagaraju ◽  
Selvanayaki Kolandapalayam Shanmugam ◽  
Sivaram Rajeyyagari ◽  
Jupeth Toriano Pentang ◽  
B Kiran Bala ◽  
...  

Abstract E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An established validation and management system could face a single failure point and the system is prone to Distributed Denial of Service Attacks (DDoS), denial of service attacks (DoS), malware and other cyber attacks. The execution of a privacy preserving and a secure decentralized system is enabled by the block chain technology. Here any third-party organizations do not have any control over the transactions of the Government. With the help of block chain technology, new and existing data are encapsulated within ledger or blocks, which are evenly distributed through the network in an enduring and sustainable way. The privacy and security of information are improved with the help of block chain technology, where distribution and encryption of data are performed through the total network. This analytical paper maps out the analysis of the security in the e-government system, utilizing the block chain technology that provides privacy and security of information and thereby enhancing the trust among the public sector. Qualitative and theoretical analysis is made for the proposed topic and implications of privacy and security of the proposed system is made.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 87
Author(s):  
Sundresan Perumal ◽  
Sakinah Ali Pitchay ◽  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Pritheega Magalingam ◽  
...  

The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.  


Author(s):  
Pavlo Katerynchuk

Cyber security and cyber space of Ukraine remained for a long time out of the attention of domestic researchers and, therefore, civil servants. For more than 20 years, the young Ukrainian state did not waste its efforts on the formation of not only effective and reliable troops, but also information security. The government did not endeavored to strengthen the country’s defense, and only weakened its lack of progress in fighting corruption and the dominance of Russian media and intelligence. As a result, in the spring of 2014, after a long confrontation between the regime of Viktor Yanukovych and the citizens of Ukraine, Russia failed to conduct special operations with the aim of annexing the Crimea and facilitate the war in Donbas. Not the least role in this played a raid for information and factors cyber Russian hackers for the purpose of paralyzing government agencies and influence on public opinion in Ukraine through Russian-controlled media. As a result of prolonged and massive cyber attacks, Ukrainian state structures, the banking system, industrial facilities and private business suffered significant material and reputational losses. At the same time in Ukraine began to realize the seriousness of cyber security as a component of national security and contribute to creating cyber police, national cyber security strategy, acceptance of a number of regulations on cyber security, strengthening public defense for the protection of domestic cyber space. At the moment, Ukraine is on the way to rethinking the role of cyber security and the formation of a national system of protection against cyber threats.


2021 ◽  
Vol 6 (1) ◽  
pp. 121-128
Author(s):  
Miftha Pratiwi

Almost this past one-year Indonesia has been undergoing global crisis due to COVID-19 pandemic. The weakening of economic sector is caused by the restriction of activity as one form of the supports for the Government in applying health protocol. Many companies of various fields are unable to survive because of undergoing economic contraction. While there are so many companies are having economic contraction, YLEO Indonesia strives. According to one of the distributors, who gains a status as a diamond leader, the income of YLEO increases to 40% during the pandemic. This success is certainly not apart from the role of strategic communication conducted by the company. Moreover, if the company uses social media as one means or channel of communication in conveying education, promotion and interaction with its audience. This research aims at understanding the utilization of social media as a means of communication adopted which supports the business activity of YLEO. The method employed is qualitative descriptive in the form of in-depth interviews as the data collection technique, and content analysis. The summary of this research is the management and utilization of social media as important parts of the company because they are able to encourage the involvement of the audience in various activities in order to further know and understand the expectation and message relevancy which are conveyed to the audience.


Author(s):  
Sachin Umrao

This chapter is structured around the concepts of risk analysis due to underwater deployment of the cables for data transfer. Most of the organizations have deployed their networks below the water for shortening the distances between peers and also to reduce the physical destruction cost of cables. Furthermore, some organizations like Google kept their servers below the water because it reduced the cost of getting it cool, which in turn increases the efficiency. However, security consultants around the world in recent past expressed their considerations that a cyber-attack on these servers or cables might result in miserable economic collision. This might be overstated but there are infrequent situations in which cable breakage could be riotous. Although organizations cannot rule the threat of attacks on these apparatuses, there are fewer check measures that could reduce the possible attack chances in underwater communication.


Author(s):  
Zezhou Wang ◽  
Xiang Liu ◽  
Yongxin Wang ◽  
Chaitanya Yavvari ◽  
Matthew Jablonski ◽  
...  

Advanced Train Control System (ATCS) is a proprietary network protocol that expands the functionality and efficiency of Centralized Traffic Control (CTC) systems, by using radio communications (radio code line) for message delivery. However, end-to-end cyber security issues were not considered during initial design of ATCS in the 1980s. Meanwhile, the landscape of cyber-physical threats and vulnerabilities has changed dramatically over the last three decades. Even though cutting-edge systems like Positive Train Control (PTC) have adopted security properties such as integrity check and encryption methods, major railroads in North America still deploy legacy ATCS standards to maintain their individual CTC system. This paper first illustrated the background and general specifications of ATCS applications in North American railroads. The research team has noticed that few studies have systematically analyzed this topic since the emergence of ATCS, though its applications are still prevailing in the industry. Divided by both vital and non-vital operational scenarios, this paper presented case studies for ATCS-related vulnerabilities. We used a sender-receiver sequencing-based analysis and proposed a consequence-based simulation model to identify and further evaluate the cyber and physical risks under potential cyber-attacks. For the identified risk, the paper evaluated the likelihood based on the practical operational sequences, and recommended potential countermeasures for the industry to improve the security over the specific case. The research concluded that the fail-safe design in the ATCS systems would prevent the exploiting known security vulnerabilities which could result in unsafe train movements. However, the service disruptions under certain speculated attacks need further evaluation. At the end of this paper, we discussed our ongoing work for disruption evaluation in the wake of successful cyber attacks.


Sign in / Sign up

Export Citation Format

Share Document