Formulating the Building Blocks for National Cyberpower

2017 ◽  
Vol 7 (3) ◽  
pp. 16-28
Author(s):  
JC Jansen van Vuuren ◽  
Louise Leenen ◽  
Graeme Plint ◽  
Jannie Zaaiman ◽  
Jackie Phahlamohlaka

Cyber threats pose a growing risk to national security for all nations; cyberpower is consequently becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analysing the elements of cyberspace as part of national security. David Jablonsky (1997) distinguishes between natural and social determinants of power in his discussion of national power. Also, Jablonsky refers to Ray Cline's formula (Cline, 1993) to determine a rough estimate of “perceived” national power by focusing primarily on a state's capacity to wage war. In this paper, the formula for Perceived Power (PP) will be adapted for use in cyberspace to create a similar formula for Perceived Cyberpower (PCP) that focuses primarily on a state's capacity for cyberwarfare. Military cyberpower is one of the critical elements of cyberpower. The paper also discusses how to operationalise military cyberpower.

2019 ◽  
pp. 1-15
Author(s):  
JC Jansen van Vuuren ◽  
Louise Leenen ◽  
Graeme Plint ◽  
Jannie Zaaiman ◽  
Jackie Phahlamohlaka

Cyber threats pose a growing risk to national security for all nations; cyberpower is consequently becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analysing the elements of cyberspace as part of national security. David Jablonsky (1997) distinguishes between natural and social determinants of power in his discussion of national power. Also, Jablonsky refers to Ray Cline's formula (Cline, 1993) to determine a rough estimate of “perceived” national power by focusing primarily on a state's capacity to wage war. In this paper, the formula for Perceived Power (PP) will be adapted for use in cyberspace to create a similar formula for Perceived Cyberpower (PCP) that focuses primarily on a state's capacity for cyberwarfare. Military cyberpower is one of the critical elements of cyberpower. The paper also discusses how to operationalise military cyberpower.


Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen

Cyberspace and cyber threats are increasingly recognized to pose a significant risk to a state's security. Cyberpower is central to national power and thus a driver towards the attainment of national security. The authors decompose national cyberpower by analyzing the elements of cyberspace as part of national security. David Jablonsky distinguishes between natural and social determinants of power in his discussion of national power and refers to Ray Cline's formula to determine a rough estimate of “perceived” national power by focusing primarily on a state's capacity to wage war. The authors present an adaptation of the formula for perceived power for use in cyberspace to create a similar formula for perceived cyberpower that focuses primarily on a state's capacity for cyberwarfare. Military cyberpower is one of the critical elements of cyberpower but little attention has been paid to this concept in the literature. In this chapter, concepts such as cyber effectiveness and the operationalization of military cyberpower are also addressed.


2018 ◽  
Vol 150 (12) ◽  
pp. 1688-1701 ◽  
Author(s):  
Worawan B. Limpitikul ◽  
Joseph L. Greenstein ◽  
David T. Yue ◽  
Ivy E. Dick ◽  
Raimond L. Winslow

L-type calcium channels (LTCCs) are critical elements of normal cardiac function, playing a major role in orchestrating cardiac electrical activity and initiating downstream signaling processes. LTCCs thus use feedback mechanisms to precisely control calcium (Ca2+) entry into cells. Of these, Ca2+-dependent inactivation (CDI) is significant because it shapes cardiac action potential duration and is essential for normal cardiac rhythm. This important form of regulation is mediated by a resident Ca2+ sensor, calmodulin (CaM), which is comprised of two lobes that are each capable of responding to spatially distinct Ca2+ sources. Disruption of CaM-mediated CDI leads to severe forms of long-QT syndrome (LQTS) and life-threatening arrhythmias. Thus, a model capable of capturing the nuances of CaM-mediated CDI would facilitate increased understanding of cardiac (patho)physiology. However, one critical barrier to achieving a detailed kinetic model of CDI has been the lack of quantitative data characterizing CDI as a function of Ca2+. This data deficit stems from the experimental challenge of uncoupling the effect of channel gating on Ca2+ entry. To overcome this obstacle, we use photo-uncaging of Ca2+ to deliver a measurable Ca2+ input to CaM/LTCCs, while simultaneously recording CDI. Moreover, we use engineered CaMs with Ca2+ binding restricted to a single lobe, to isolate the kinetic response of each lobe. These high-resolution measurements enable us to build mathematical models for each lobe of CaM, which we use as building blocks for a full-scale bilobal model of CDI. Finally, we use this model to probe the pathogenesis of LQTS associated with mutations in CaM (calmodulinopathies). Each of these models accurately recapitulates the kinetics and steady-state properties of CDI in both physiological and pathological states, thus offering powerful new insights into the mechanistic alterations underlying cardiac arrhythmias.


2018 ◽  
Vol 23 (1) ◽  
pp. 25-33
Author(s):  
Mihai-Marcel Neag

Abstract The mosaic approach to conflict requires redefinition of some doctrinal concepts that can influence the way in which the response to the risks and threats to the state of security, the future of military actions and the acceptance that the technological development will be a factor for the success of the wars future. The issues addressed could be important elements in the architecture of a possible future strategic concept of integrated use of the basic elements of national power - diplomatic, informational, military and economic. At the same time, the results of this theoretical approach can contribute, as a reference point, to proposing viable and innovative doctrinal and operational solutions to counteract aggressions to national security, regardless of their nature or origin.


Author(s):  
Nguyen Hoang Tien ◽  
Nguyen Van Tien ◽  
Rewel Jimenez Santural Jose ◽  
Nguyen Minh Duc ◽  
Nguyen Minh Ngoc

National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. The article proposes a new research approach treating security and military science as interdisciplinary, but two of the branches of social science. Using empirical analysis and case study as research methods, the article is focused on internal instability as challenging security issue that could pose a real threat and danger to the current socio-economic and political system. Based on the obtained research results we can draw some implications and propose some viable solutions for the Vietnamese authority to guard the safety and security of the people, society and also its political existence.


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


2019 ◽  
Vol 2019, 21/4 (Volume 2019/issue 21/4) ◽  
pp. 129-144
Author(s):  
BLAŽ TOMŠIČ

Russia’s annexation of Crimea in 2014, carried out with an amazing speed and coordination of various soft and hard instruments of national power, while simultaneously using the power of protests by the local pro-Russian population, is undoubtedly one of the better examples of hybrid warfare. The brutality and simultaneous surgical precision of the operation have made it feel as if each of the instruments of national power had played its precisely defined role, which had its basis in the national security and defence documents, such as the national security strategy and military doctrine. This is a proof of the adaptation of the Russia’s military and political strategic framework to the new global challenges of the modern world. The formerly rigid Russia using the primarily brutal military power typical of the Soviet regime, has in this case proved to be a dynamic and highly flexible force, capable of using various instruments of national power, coupled with an appropriate support of a considerably altered, but extremely effective military power instrument. In doing so, it actually shocked the Western professional and political public and opened a wide debate in professional circles, which had previously not attributed the ability of such activities to Russia. Hybrid warfare has become a constant feature of discussions in the military and political circles of the West, focusing primarily on finding solutions to effectively counter the new threat presented in Crimea by the Russian side. Key words Hybrid warfare, national strategy, military doctrine, Crimea.


2021 ◽  
Vol 27 (1) ◽  
pp. 20-25
Author(s):  
Maria Constantinescu

Abstract The contemporary security environment is characterized by Volatility, Uncertainty, Complexity and Ambiguity (VUCA), the use of hybrid warfare and grey zone conflicts, generating the need to adapt the national security strategies to the changes demands of the environment. In this context, the instruments of national power (diplomatic, information, economic, military) should be used in an integrated manner, in order to provide a more comprehensive approach to national security. The technology has become an integral part of the life of the society, and as such it should be taken into consideration as an instrument of power and highlighted as a major component of a national security strategy. The paper proposes a DIME-T approach to national instruments of power, by analysing the complex implications of technology on all the areas of security.


Sign in / Sign up

Export Citation Format

Share Document