scholarly journals Cyber hegemony and information warfare: A case of Russia

Author(s):  
Asma Rashid ◽  
Anum Yar Khan ◽  
Syed Wasif Azim

The world has shifted to a digital landscape in the recent decade with both its perks and underlying threats. Russia, throughout history has experimented with its information along with cyber channels and have been able to generate fruitful results that are manifested in the contemporary era. Russian expertise towards merging cyber domain into its military capabilities is praiseworthy to the point that its Western adversaries, despite the fact being economically and technologically advanced compared to Russia, have not been able to effectively counter Russian aggression. This research examines the essentiality of cyber security as a mere software or cyber command can create instability and drastic consequences requiring millions for clean-up by examining Russian cyber-attacks on Estonia, Georgia, Ukraine, US and Western Europe and concludes that the first steps towards Cyber and Information Warfare have been made, it is now to be made sure this does not escalate into a Cyber Arms Race. The research recommends that cyber security should be treated as an international issue with rules established for cyber governance and databases identifying cyber criminals and the software used by them or can be used by them and requires cooperation rather than competition amongst states particularly global superpowers.

Author(s):  
Muhammed Can

In recent years, controversial concepts like post-truth, truth decay, political technology, and blurred nature of reality have become more complex around the world. Perhaps, a most important manifestation of these concepts could be discerned in grey zone conflicts. Confrontations in the grey zone are regarded neither peace nor war by the major powers. Russia, China, and Iran constantly use grey zone tools, notably disinformation campaigns, influence operations in social media through troll farms, information warfare, and cyber-attacks to sustain the balance of power/threat with Western countries. What makes these conflicts very significant is that they are cheaper and less risky for aggressor states given the disastrous consequences of the total wars. Furthermore, these malicious activities have unique impacts on political realities thanks to the common usage of social media and cyberspace. Thereby, this article argues the cyber frontier of grey zone conflicts and its possible effects to reality through the concept/analogy of hyperobjectivity and nonlocality.


2019 ◽  
Vol 47 (02) ◽  
pp. 70-89
Author(s):  
Hala Bou Alwan

AbstractDespite an ongoing drive by governments and law enforcers around the world to improve the sophistication of their risk mitigation measures, cyber-attacks are continually increasing. A study from Computer Crime and Intellectual Property Section (CCIPS) shows more than 4,000 ransomware attacks occurred daily in 2016. That's a 300 percent increase over 2015, where 1,000 ransomware attacks were seen per day. Cyber criminals are successfully penetrating even the most high-profile companies and governmental agencies. The breach at the NSA was truly alarming and just one recent example of the dire situation the country, and world, face as cybercrime intensifies and the cyber security talent shortage becomes more serious.Accordingly, the purpose of this research is to focus on cyber education at the national, government, and law enforcement level examining the methodology to set the tone from the top ensuring alignment between governments, law enforcers, private sector, and academic level. It also examines the gaps in cyber laws and educational governance initiatives and their impact on efficient execution of cyber policies for various regions of the world with a focus on the United Arab Emirates and the United States of America.Finally, this article recommends policy guidelines and a compliance manual framework for governments and law enforcers to consider ensuring that cyber risks are properly addressed and mitigated in a structured and coherent way.


Author(s):  
Yurii I. Khlaponin ◽  
Svitlana V. Kondakova ◽  
Yevheniia Ye. Shabala ◽  
Liliia P. Yurchuk ◽  
Pavlo S. Demianchuk

The article is devoted to the study of trends in cybercrime, which is a threat to the country's information security. The place and role of cybersecurity in the system of national security are determined. The state of the system of protection against cyber attacks in the developed countries of the world, such as France, Japan, China, South Korea and the United Kingdom, was analyzed. The main shortcomings and perspectives of protection of cyberspace are revealed. The use of modern information technologies in state structures, as well as in society in general, proposes solving information security problems as one of the main ones. The economy, logistics and security of the country increasingly depend on the technical infrastructure and its security. To improve the effectiveness of the fight against cybercrime, developed countries have long started the appropriate work needed to create their own cyber security strategy. Incidents in the field of cybersecurity affect the lives of consumers information and many other services and cyber attacks aimed at various objects of infrastructure of electronic communications systems or technological processes management. Modern world trends in the development of cybercrime and the strengthening of cyber attacks indicate an increase in the value of combating it for the further development of society, which in turn predetermines the assignment of certain groups of social relations of the cybersphere to the competence of legal regulation. The current situation with cybercrime requires constant improvement of methods the fight against cybercrime, the development of information systems and methods aimed at ensuring the cyber security of the country. Necessary tasks are the development of a national strategy on cybersecurity, which will include tactical and strategic priorities and tasks in this area for state bodies. So, the issue of cyberspace security, the fight against cybercrime is relevant both at the international level and at the level of the individual country, and therefore needs further consideration.


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


Author(s):  
Madeline Carr

When The Anarchical Society was published in 1977, the world was on the doorstep of seismic technological change. Forty years later, the information age has placed cyber security at the centre of many global political concerns including armed conflict and international law. The ongoing difficulties associated with accurately attributing cyber attacks introduce a new dimension of anarchy in international relations. This essay draws on Bull’s ideas about social interplay to explore the problem of attribution in cyberspace. It finds that the difficulties of identifying (even) state actors undermine some of the processes and institutions upon which Bull based his ideas. However, it also finds that Bull’s work is useful in unpicking exactly why attribution is so problematic for international relations. Ultimately, Bull’s expectation that actors will look for social solutions to maintain order appears to be holding up in the information age much as it did in the industrial age.


Author(s):  
Kirti Raj Bhatele ◽  
Harsh Shrivastava ◽  
Neha Kumari

Cyber security has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. The challenges have always been endless in inventing right controls and procedures and implementing them with acute perfection for tackling with cyber attacks and crimes. The ever-increasing risk of cyber attacks and crimes grew exponentially with recent advancements in artificial intelligence. It has been applied in almost every field of sciences and engineering. From healthcare to robotics, AI has created a revolution. This ball of fire couldn't be kept away from cyber criminals, and thus, the “usual” cyber attacks have now become “intelligent” cyber attacks. In this chapter, the authors discuss specific techniques in artificial intelligence that are promising. They cover the applications of those techniques in cyber security. They end the discussion talking about the future scope of artificial intelligence and cyber security.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


2021 ◽  
Vol 13 (4) ◽  
pp. 77-87
Author(s):  
Maja Baretić ◽  
Nikola Protrka

The term “health information technology” (health IT) refers to the electronic systems that store, share, analyze, and protect electronic health records. It includes also electronic prescribing, knowledge sharing, patient support tools, and mobile health technology together with decision-making algorithms. The privacy, security, and ethics of health information are priority for both patients and healthcare providers. The health IT is a target for cyber-criminals; stolen health information, or blackmailing via different kind of cryptolockers, is good on the black market. While the healthcare industry relies more on technology, cyber-attacks are threatening health IT. This article argues health IT issues from two perspectives. The first one is a physician's point of view aiming to improve quality of care using fast and accurate health IT. The second is the standpoint of cyber-security specialists aiming to protect data form cyber-criminals, continually developing new strategies and best practices.


2018 ◽  
Vol 46 (3) ◽  
pp. 137-162
Author(s):  
Hala Bou Alwan

AbstractDespite an ongoing drive by organizations around the world to improve the sophistication of their risk mitigation measures, cyber-attacks are continually increasing. A study by Panda Labs shows in Q3 in 2016 alone, 18 million new malware samples were captured.2 Another study from Computer Crime and Intellectual Property Section (CCIPS) shows more than 4,000 ransomware attacks occurred daily in 2016. That's a 300% increase over 2015, where 1,000 ransomware attacks were seen per day.3 These studies reflect the double effect of technology—connecting the world and facilitating cyber-attacks simultaneously.


Author(s):  
Alaa Hussein Al-Hamami

Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.


Sign in / Sign up

Export Citation Format

Share Document