Advances in Digital Crime, Forensics, and Cyber Terrorism - Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
Latest Publications


TOTAL DOCUMENTS

21
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466687936, 9781466687943

Author(s):  
Vesna Poposka

Referring to the cyber space as the new dimension of warfare opens many legal challenges. Those challenges can be settled in two main clusters: first one related to the usage of cyberspace as a weapon itself, related the environment in which terrorist attack occurs (meaning that cyber infrastructure and cyber are used for terrorist attacks, or as an asset during counterterrorist operations), and the second drives on ancillary usage of the cyber infrastructure, means and methods for the same purposes. The cyberspace is lacking specific legal regime that is applicable, same as cyber attacks. While the specific applicable regime is lacking, as well as any consensus upon that issue, what has to be considered is if any parts of the currently ongoing legal regimes are applicable. Put into the context of cyber warfare, it can lead to different solutions, examined in the chapter.


Author(s):  
Metodi Hadji-Janev

Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is complex and poses serious challenges to national and international security. One way to protect the civilian populace is by deterring potential malicious actors (state and non-state) from exploiting cyberspace in a negative way. Given the changed reality and complexity that gravitates over the cyber conflict classical deterrence that have worked during the Cold War is not promising. The article argues that if the states are about to protect their civilians from the future cyber conflict by deterring potential attacker they need to change the approach to deterrence.


Author(s):  
Dimitar Stevo Bogatinov ◽  
Mitko Bogdanoski ◽  
Slavko Angelevski

The growing network attacks and intrusions have put the government organizations at a great risk. In cyberspace, humans have great limitations in data analyze and cyber defense because of the amount of data they have to process and the limited response time. Considering these parameters one of the best solutions is when the cyber defense mechanisms are AI (Artificial intelligence)-based because they can easily determine and respond to the attacks that are underway. The responses can be easily managed using man in the loop or fully atomized techniques. This chapter gives brief review of the usage of artificial intelligence in support of cyber defense, explains some useful applications that already exist, emphasizing the neural nets, expert systems and intelligent agents in cyber defense. Furthermore the chapter will propose a technical AI-based cyber defense model which can support the governmental and non-governmental efforts against cyber threats and can improve the success against malicious attack in the cyberspace.


Author(s):  
Lior Tabansky

Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems. Analysing the national responses to Cybersecurity challenges reveals the power of “Cyber War” metaphor and the resulting militarization of cyberspace. But these are unsuitable against cyber disruption of civilian national infrastructure. Further, the persistent trend towards militarization of cybersecurity has negative outcomes. How then should democratic societies provide Cybersecurity? One way of addressing the challenge is presented in the second part of the chapter. Israeli Cyber Defence stresses three lessons. 1. Despite the global risks, a national response is feasible. 2. Israel did not to task the IDF with cyber defence in civilian realm. 3. Technical prowess is not enough for national Cybersecurity, without political measures to settle conflicts and overcome barriers.


Author(s):  
Metodi Hadji-Janev

The post-Cold War reality has brought many changes that challenge political leaders, planners and operators. Using cyberspace to accomplish their political objectives, non-state actors and states have opened serious legal debates over the applicability of the international law of armed conflict principles in cyberspace. In this context, the article explores how the basic principles of International law of armed conflict will apply to the protection of the civilian population from the future cyber conflict. To accomplish this article addresses the ius ad bellum and the ius in bello aspects of cyber conflict.


Author(s):  
Zlatogor Borisov Minchev

The chapter describes the problem of building cyber threats resilience for the human factor as the technological growth is constantly changing the security landscape of the new digital world. A methodological framework for meeting the problem by using the “scenario method” and experts' support is outlined. An implementation of comprehensive morphological and system analyses of cyber threats are performed, followed by agent based mixed reality validation, incorporating biometrics monitoring. The obtained results demonstrate a correlation of experts' beliefs for cyber threats identification, related to human factor biometric response, whilst using social networks and inhabiting smart environments of living. The achieved results prove “use with care” necessity for new technologies, concerning cyber threats landscape for assuring a sustainable resilience balance from the human factor perspective.


Author(s):  
Mitko Bogdanoski ◽  
Marjan Stoilkovski ◽  
Aleksandar Risteski

There are many freeware and commercial tools which can be used to provide forensics information based on dead and live forensics acquisition. The main problem with these tools is that in many cases the investigator cannot explain the script functionality and generated results and information during the trial. Because of this reason there is an increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The chapter presents a novel developed First Responder script which can be used to perform a live and dead forensics analysis in support of Law Enforcement during the investigation process.


Author(s):  
Ashok Vaseashta ◽  
Sherri B. Vaseashta ◽  
Eric W. Braman

Advances in S&T coupled with universal access to cyberspace have motivated both state and non-state sponsored actors to new levels in the development of novel and non-traditional modes of attack to coerce, disrupt, or overthrow competing groups, regimes, and governments using unconventional warfare strategies. Threat vectors, caused directly or indirectly are asymmetric, kinetic, and unconventional. Current national and defense strategies in Cyberspace are mostly reactive and defensive, rather than pro-active and offensive. The web-crawlers research innovative ways to target security breaches. Securing critical infrastructure requires a top tier protection. This chapter is focused on ways to understand and combat unconventional warfare in cyber-space from CIS standpoint. This is crucial in avoiding a potential Cyber 9/11. To provide accurate intelligence, surveillance, preparedness and interdiction of such combative postures, ongoing studies of the ways that advance S&T may be employed so as to remain aware, alert and proactive for any/all such contingencies of use, are advocated.


Author(s):  
Stojan Slaveski ◽  
Biljana Popovska

Certain information and personal data, held by the government, needs to be kept secret because its disclosure to the general public could jeopardize the operation of the state. On the other hand, the state should allow the public to have free access to all other state-held information. To ensure a balance between these two claims of modern democratic societies, there is a need to legally regulate this matter. The state should have a law on access to public information and a law that will regulate the classification, access to and storage of information which should be kept secret. This chapter analyzes the global experiences in regulating this matter, with a particular emphasis on the practice in the Republic of Macedonia.


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


Sign in / Sign up

Export Citation Format

Share Document