cyber defense
Recently Published Documents


TOTAL DOCUMENTS

403
(FIVE YEARS 158)

H-INDEX

17
(FIVE YEARS 5)

2022 ◽  
Author(s):  
Morgan Shepherd ◽  
Stuart Steiner ◽  
Daniel Conte De Leon ◽  
Miloslava Plachkinova

2022 ◽  
pp. 649-675
Author(s):  
Edison Ishikawa ◽  
Eduardo Wallier Vianna ◽  
João Mello da Silva ◽  
Jorge Henrique Cabral Fernandes ◽  
Paulo Roberto de Lira Gondim ◽  
...  

Providing cyber defense in a country is complex. It involves ensuring the security of various products and services that are part of a global supply chain. In this complex scenario, the challenge is the development of a cyber defense business ecosystem that, reaching a minimum level of maturity, guarantees the security of products and services in cyberspace. This work proposes a cyber defense business ecosystem of ecosystems (BEoE) model with two ecosystems that must be created or fostered, the human resources training ecosystem and the product and service homologation and certification ecosystem. These two cyber defense ecosystems are key to the sustainable growth of an entire chain of production and sourcing of cyber defense goods and services. The proposed model allows the Cyber Defense BEoE to evolve, so that different actors (companies and government agencies) with different levels of maturity in defense and cybersecurity may emerge. In this way, a country's Cyber Defense BEoE may be able to provide products and services at different levels of security for its defense system.


2021 ◽  
Author(s):  
Torvald F. Ask ◽  
Benjamin J. Knox ◽  
Ricardo Lugo ◽  
Lukas Hoffmann ◽  
Stefan Sütterlin

In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively selected information and have the goal of accurately presenting the severity and potential consequences of the situation. RCPs must be communicated between individuals, but also between organizations, and often from technical to non-/less technical personnel. The communication of RCPs is subject to many challenges that may affect the transfer of critical information between individuals. There are currently no common best practices for training communication for shared situational awareness among cyber defense personnel. The Orient, Locate, Bridge (OLB) model is a pedagogic tool to improve communication between individuals during a cyber threat situation. According to the model, an individual must apply meta-cognitive awareness (O), perspective taking (L), and communication skills (B) to successfully communicate the RCP. Gamification (applying game elements to non-game contexts) has shown promise as an approach to learning. We propose a novel OLB-based Gamification design to improve dyadic communication for shared situational awareness among (technical and non-technical) individuals during a cyber threat situation. The design includes the Gamification elements of narrative, scoring, feedback, and judgment of self. The proposed concept contributes to the educational development of cyber operators from both military and civilian organizations responsible for defending and securing digital infrastructure. This is achieved by combining the elements of a novel communication model with gamification in a context in urgent need for educational input.


2021 ◽  
Vol 23 (3) ◽  
pp. 477-490
Author(s):  
Maskun Maskun ◽  
Azhar Risaldy Rum

The purpose of this research is to identify cyber warfare as a model of War, its position in the perspective of international law, and the steps taken by the state in minimizing losses arising from cyber warfare. This research is normative research using conceptual and statute approaches to answer the problems in this research. The analysis used is content analysis. The study results indicate a need for a common understanding of cyber warfare as a new model of war agreed upon by countries in practice. Normative cyber warfare in international law has to be applied universally. The periodic simulations of cyber defense and artificial intelligence are needed in minimizing the losses caused by cyber warfare. The recommendation is to formulate a definition of cyber warfare universally agreed upon and the state's agreement on the meaning of cyber warfare in international law perspectives.


2021 ◽  
Vol 10 (2) ◽  
pp. 37-50
Author(s):  
Andreea DRAGOMIR

The article aims to highlight issues related to the risks to both the European Union and the Member States, but at the same time seeks to highlight current legislative and political approaches applicable in cyberspace. This set of tools used in cyber diplomacy includes the concepts of cooperation and diplomatic dialogue (common cyber network of EU states, common cyber defense unit) but also measures to prevent cyber-attacks (European Union Cyber Security Strategy), as well as sanctions. Throughout this presentation, the main idea is supported by the cross-border nature of cyberspace.


Author(s):  
Ricardo Buettner ◽  
Daniel Sauter ◽  
Jonas Klopfer ◽  
Johannes Breitenbach ◽  
Hermann Baumgartl

2021 ◽  
Author(s):  
Shah Md Istiaque ◽  
Md Toki Tahmid ◽  
Asif Iqbal Khan ◽  
Zaber Al Hassan ◽  
Sajjad Waheed

2021 ◽  
pp. 155-161
Author(s):  
S. KRASNIKOV

The issue of providing cyber defense has been detailed. Domestic strategic documents on cyber security and cyber defense are considered. The principles of implementation of the state military policy for the purpose of development of cyber defense potential are fixed. Prospects for the formation of cyber troops in Ukraine are outlined. NATO's approach to the concept and features of cyber defense is revealed. The Turkish experience of providing state cyber defense is highlighted. The prospects of improving the cyber defense potential of our country are identified, taking into account the effective achievements of foreign experience.


2021 ◽  
Author(s):  
Wyatt Hoffman

Artificial intelligence will play an increasingly important role in cyber defense, but vulnerabilities in AI systems call into question their reliability in the face of evolving offensive campaigns. Because securing AI systems can require trade-offs based on the types of threats, defenders are often caught in a constant balancing act. This report explores the challenges in AI security and their implications for deploying AI-enabled cyber defenses at scale.


Sign in / Sign up

Export Citation Format

Share Document