首页 > 最新文献

Applied Cybersecurity & Internet Governance最新文献

英文 中文
Assessing Power and Hierarchy in Cyberspace: An Approach of Power Transition Theory 评估网络空间中的权力和等级制度:权力过渡理论
Pub Date : 2024-07-27 DOI: 10.60097/acig/190481
Enescan Lorci
This study explores the application of Power Transition Theory (PTT) to cyberspace, aiming to establish a comprehensive framework for understanding and measuring cyber power. Utilizing PTT’s national power model, the research treats states as rational and unitary actors, integrating the rational actor model to assess state behavior in cyberspace. The objectives include defining cyber power, developing a novel metric for its evaluation, andcategorizing states within a hierarchical structure of cyber power. By analyzing key components such as data resources, digital economic strength, and cyber political capacity, the study provides a nuanced understanding of cyber power dynamics. The results demonstrate that the traditional IR theories retain relevance in the cyber domain, offering a valuable lens for comprehending global cyber governance and geopolitical competition. This foundational work sets the stage for future analyses of power transitions within cyberspace, highlighting the critical interplay between traditional power metrics and emerging digital landscapes.
本研究探讨了权力过渡理论(PTT)在网络空间中的应用,旨在建立一个理解和衡量网络权力的综合框架。本研究利用 PTT 的国家权力模型,将国家视为理性和单一的行为体,整合理性行为体模型来评估国家在网络空间中的行为。研究目标包括定义网络力量、开发评估网络力量的新指标,以及在网络力量的等级结构中对国家进行分类。通过分析数据资源、数字经济实力和网络政治能力等关键要素,该研究提供了对网络权力动态的细致理解。研究结果表明,传统的国际关系理论在网络领域仍具有现实意义,为理解全球网络治理和地缘政治竞争提供了一个有价值的视角。这项奠基性工作为今后分析网络空间中的权力过渡奠定了基础,突出了传统权力衡量标准与新兴数字景观之间的重要相互作用。
{"title":"Assessing Power and Hierarchy in Cyberspace: An Approach of Power Transition Theory","authors":"Enescan Lorci","doi":"10.60097/acig/190481","DOIUrl":"https://doi.org/10.60097/acig/190481","url":null,"abstract":"This study explores the application of Power Transition Theory (PTT) to cyberspace, aiming to establish a comprehensive framework for understanding and measuring cyber power. Utilizing PTT’s national power model, the research treats states as rational and unitary actors, integrating the rational actor model to assess state behavior in cyberspace. The objectives include defining cyber power, developing a novel metric for its evaluation, and\u0000categorizing states within a hierarchical structure of cyber power. By analyzing key components such as data resources, digital economic strength, and cyber political capacity, the study provides a nuanced understanding of cyber power dynamics. The results demonstrate that the traditional IR theories retain relevance in the cyber domain, offering a valuable lens for comprehending global cyber governance and geopolitical competition. This foundational work sets the stage for future analyses of power transitions within cyberspace, highlighting the critical interplay between traditional power metrics and emerging digital landscapes.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"84 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141798194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to Special Issue on The Russian-Ukrainian War: Effects on Global Cybersecurity and Digital Infrastructure 俄乌战争:对全球网络安全和数字基础设施的影响》特刊导言
Pub Date : 2024-07-24 DOI: 10.60097/acig/191475
Jacek Leśkow
{"title":"Introduction to Special Issue on The Russian-Ukrainian War: Effects on Global Cybersecurity and Digital Infrastructure","authors":"Jacek Leśkow","doi":"10.60097/acig/191475","DOIUrl":"https://doi.org/10.60097/acig/191475","url":null,"abstract":"","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"20 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stronger together? EU Support for Ukrainian Local Authorities Facing Cyber Attacks (2022-2023) 携手更强大?欧盟支持乌克兰地方当局应对网络攻击(2022-2023 年)
Pub Date : 2024-07-23 DOI: 10.60097/acig/190344
I. Fyshchuk
This study attempts to explore the extent to which EU support during the decentralisation process in Ukraine facilitates local authorities’ digitalisation and strengthens their resilience against cyber attacks. The Ukrainian cyber attack cases are becoming more frequent in 2022 and 2023 in terms of war, especially on the websites of local authorities. The article demonstrates that decentralisation with the support of the EU-funded U-LEAD assistance programme provides an opportunity to bring state services closer to citizens and, accordingly, increase the efficiency of their provision. Decentralisation and digitalisation go hand in hand in the process of implementation in Ukraine. The digitalisation in this direction of local administrations becomes a tool for achieving this goal because it allows local administrations to offer more of their services in a digital format, which ensures the resilience of the development of local authorities. At the same time, the local authorities are less protected against cyber attacks, especially during the war. The article employs a semi-structured interview method to analyse data, revealing that representatives from local authorities participate in various training courses to enhance cybersecurity skills. However, the challenges vary and include issues such as lack of personnel, lack of funding, complex application procedures, lack of coordination, and technical capacity limitations. Indeed, Ukraine is still in the process of improving its own model of cyber defence for local authorities and the country as a whole in terms of countering Russian aggression, using among others practices of NATO and EU countries in the specified field.
本研究试图探讨欧盟在乌克兰权力下放过程中提供的支持在多大程度上促进了地方政府的数字化,并增强了其抵御网络攻击的能力。2022 年和 2023 年,乌克兰的网络攻击案件在战争方面日益频繁,尤其是对地方当局网站的攻击。文章表明,在欧盟资助的 U-LEAD 援助计划的支持下,权力下放提供了一个机会,使国家服务更贴近公民,从而提高服务效率。在乌克兰,权力下放和数字化在实施过程中齐头并进。地方行政机构在这方面的数字化成为实现这一目标的工具,因为它使地方行政机构能够以数字形式提供更多服务,从而确保地方当局发展的弹性。与此同时,地方政府在抵御网络攻击时受到的保护较少,尤其是在战争期间。文章采用半结构式访谈法分析数据,发现地方当局的代表参加各种培训课程,以提高网络安全技能。然而,面临的挑战各不相同,其中包括缺乏人员、缺乏资金、申请程序复杂、缺乏协调以及技术能力限制等问题。事实上,乌克兰仍在利用北约和欧盟国家在特定领域的做法,改进地方当局和整个国家的网络防御模式,以应对俄罗斯的侵略。
{"title":"Stronger together? EU Support for Ukrainian Local Authorities Facing Cyber Attacks (2022-2023)","authors":"I. Fyshchuk","doi":"10.60097/acig/190344","DOIUrl":"https://doi.org/10.60097/acig/190344","url":null,"abstract":"This study attempts to explore the extent to which EU support during the decentralisation process in Ukraine facilitates local authorities’ digitalisation and strengthens their resilience against cyber attacks. The Ukrainian cyber attack cases are becoming more frequent in 2022 and 2023 in terms of war, especially on the websites of local authorities. The article demonstrates that decentralisation with the support of the EU-funded U-LEAD assistance programme provides an opportunity to bring state services closer to citizens and, accordingly, increase the efficiency of their provision. Decentralisation and digitalisation go hand in hand in the process of implementation in Ukraine. The digitalisation in this direction of local administrations becomes a tool for achieving this goal because it allows local administrations to offer more of their services in a digital format, which ensures the resilience of the development of local authorities. At the same time, the local authorities are less protected against cyber attacks, especially during the war. The article employs a semi-structured interview method to analyse data, revealing that representatives from local authorities participate in various training courses to enhance cybersecurity skills. However, the challenges vary and include issues such as lack of personnel, lack of funding, complex application procedures, lack of coordination, and technical capacity limitations. Indeed, Ukraine is still in the process of improving its own model of cyber defence for local authorities and the country as a whole in terms of countering Russian aggression, using among others practices of NATO and EU countries in the specified field.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"128 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141811319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Truth and Information Warfare in their Technological Context 技术背景下的后真相与信息战
Pub Date : 2024-07-22 DOI: 10.60097/acig/190407
Ignas Kalpokas
As citizens are faced with an overabundance of information, their reliance on intuitive sorting strategies and platform-enabled content selection and delivery increases correspondingly. Under such circumstances, political action tends to be based on haphazard encounters with opinion-congruent content than on anything else, giving rise to so-called post-truth condition and, in turn, opening up conditions for manipulating such information encounters as part of information warfare operations. In particular, this novel environment necessitates a rethinking of informational agency, locating it within interactions between humans and technological artefacts, whereby humans as generators of data and algorithms as tools that structure the information domain based on such data co-construct political and social spaces. The impact of digital technologies is further amplified by the advent of synthetic (Artificial Intelligence-generated) media, which is foreseen to bring about epistemic confusion, that is, increasing inability to separate between reality and fiction. Under such conditions, and in any situationsof actual or perceived crisis and tension, audiences are inclined to rely on narratives as coping strategies, which is where information warfare operations come to the fore. Either capitalising on the existing fertile ground or having manufactured a condition of crisis and distrust, such operations are geared towards hijacking audience cognitive processes with narratives that suit their perpetrators.
当公民面对过量的信息时,他们对直观排序策略以及平台支持的内容选择和交付的依赖性也相应增加。在这种情况下,政治行动往往基于与观点一致的内容的偶然相遇,而不是其他,这就产生了所谓的 "后真相"(post-truth)状况,反过来也为操纵这种信息相遇作为信息战行动的一部分创造了条件。尤其是,在这种新环境下,有必要重新思考信息代理,将其置于人类与技术人工制品之间的互动之中,即人类作为数据的生成者,算法作为基于这些数据构建信息领域的工具,共同构建政治和社会空间。合成(人工智能生成)媒体的出现进一步扩大了数字技术的影响,预计将带来认识论上的混乱,即越来越无法区分现实与虚构。在这种情况下,以及在任何实际的或感知到的危机和紧张局势中,受众倾向于依赖叙事作为应对策略,这正是信息战行动凸显的地方。这些行动要么是利用现有的肥沃土壤,要么是制造危机和不信任的条件,其目的是用适合其实施者的叙事劫持受众的认知过程。
{"title":"Post-Truth and Information Warfare in their Technological Context","authors":"Ignas Kalpokas","doi":"10.60097/acig/190407","DOIUrl":"https://doi.org/10.60097/acig/190407","url":null,"abstract":"As citizens are faced with an overabundance of information, their reliance on intuitive sorting strategies and platform-enabled content selection and delivery increases correspondingly. Under such circumstances, political action tends to be based on haphazard encounters with opinion-congruent content than on anything else, giving rise to so-called post-truth condition and, in turn, opening up conditions for manipulating such information encounters as part of information warfare operations. In particular, this novel environment necessitates a rethinking of informational agency, locating it within interactions between humans and technological artefacts, whereby humans as generators of data and algorithms as tools that structure the information domain based on such data co-construct political and social spaces. The impact of digital technologies is further amplified by the advent of synthetic (Artificial Intelligence-generated) media, which is foreseen to bring about epistemic confusion, that is, increasing inability to separate between reality and fiction. Under such conditions, and in any situations\u0000of actual or perceived crisis and tension, audiences are inclined to rely on narratives as coping strategies, which is where information warfare operations come to the fore. Either capitalising on the existing fertile ground or having manufactured a condition of crisis and distrust, such operations are geared towards hijacking audience cognitive processes with narratives that suit their perpetrators.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"6 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141817430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investment in Cybersecurity Companies in Times of Political and Economic Instability 在政治和经济不稳定时期投资网络安全公司
Pub Date : 2024-07-18 DOI: 10.60097/acig/190342
G. Przekota
The socio-economic development that has taken place inrecent years takes into account cybersecurity issues. Cybersecurityhas many different dimensions, including the economic dimension.The Russian-Ukrainian conflict has shown that modern war is notonly conventional, but also cybernetic. Earlier, the massive shift toremote communication systems forced by COVID also increasedthe demand for cybersecurity. This means that cybersecurity com-panies receive new orders, which can have a positive impact ontheir financial results. In the opinion of many experts, investing insuch companies could be a good business. The research conductedin this article focuses on testing assumptions related to the rec-ognition of investments in technology companies as prospectiveinvestments. Therefore, this study examines the impact of Russia-Ukraine war (from February 2022 to December 2024) and the COVIDpandemic (from March 2020 to February 2022) on the valuation ofcybersecurity companies. The period from January 2015 to February2020 was used as the comparative period. The research materialconsists of companies and stock indices from the American andPolish markets. The results of the research are inconclusive. Infact, there are some examples of companies that took advantageof the Russian-Ukrainian conflict to achieve above-average returns.Such a business is risky, which is why these companies are achiev-ing above-average returns with increased shares price volatility.However, it turns out that automatically assigning a company to thecyber or IT category does not mean that it will be a good invest-ment in times of war or pandemic.
近年来的社会经济发展考虑到了网络安全问题。俄乌冲突表明,现代战争不仅是常规战争,也是网络战争。此前,COVID 迫使大规模转向远程通信系统,这也增加了对网络安全的需求。这意味着网络安全公司会接到新的订单,从而对其财务业绩产生积极影响。许多专家认为,投资这类公司是一门好生意。本文的研究重点是测试与重新认识技术公司投资为前瞻性投资相关的假设。因此,本研究探讨了俄乌战争(2022 年 2 月至 2024 年 12 月)和 COVID 大流行(2020 年 3 月至 2022 年 2 月)对网络安全公司估值的影响。比较期为 2015 年 1 月至 2020 年 2 月。研究材料包括美国和波兰市场的公司和股票指数。研究结果尚无定论。事实上,有一些公司利用俄乌冲突获得了高于平均水平的回报。这种业务具有风险性,这就是为什么这些公司在获得高于平均水平的回报的同时股价波动性也在增加。然而,事实证明,自动将一家公司归入网络或信息技术类别并不意味着在战争或流行病时期它将是一项良好的投资。
{"title":"Investment in Cybersecurity Companies in Times of Political and Economic Instability","authors":"G. Przekota","doi":"10.60097/acig/190342","DOIUrl":"https://doi.org/10.60097/acig/190342","url":null,"abstract":"The socio-economic development that has taken place in\u0000recent years takes into account cybersecurity issues. Cybersecurity\u0000has many different dimensions, including the economic dimension.\u0000The Russian-Ukrainian conflict has shown that modern war is not\u0000only conventional, but also cybernetic. Earlier, the massive shift to\u0000remote communication systems forced by COVID also increased\u0000the demand for cybersecurity. This means that cybersecurity com-\u0000panies receive new orders, which can have a positive impact on\u0000their financial results. In the opinion of many experts, investing in\u0000such companies could be a good business. The research conducted\u0000in this article focuses on testing assumptions related to the rec-\u0000ognition of investments in technology companies as prospective\u0000investments. Therefore, this study examines the impact of Russia-\u0000Ukraine war (from February 2022 to December 2024) and the COVID\u0000pandemic (from March 2020 to February 2022) on the valuation of\u0000cybersecurity companies. The period from January 2015 to February\u00002020 was used as the comparative period. The research material\u0000consists of companies and stock indices from the American and\u0000Polish markets. The results of the research are inconclusive. In\u0000fact, there are some examples of companies that took advantage\u0000of the Russian-Ukrainian conflict to achieve above-average returns.\u0000Such a business is risky, which is why these companies are achiev-\u0000ing above-average returns with increased shares price volatility.\u0000However, it turns out that automatically assigning a company to the\u0000cyber or IT category does not mean that it will be a good invest-\u0000ment in times of war or pandemic.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141826627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russia’s Invasion of Ukraine and National Cyber Security Strategies: Quantitative Compar-ison 俄罗斯入侵乌克兰与国家网络安全战略:定量比较
Pub Date : 2024-07-18 DOI: 10.60097/acig/190346
Olesya Vinhas de Souza
Shared understanding of the operational environmentin the cyber domain is the key enabler of NATO’s cyber posture.However, there have been no attempts to evaluate empirically theimpact of the war in Ukraine on intra-Alliance coherence. This studyapplies a novel methodology based on computation text analysisto evaluate the trends within the recently adopted national cyberstrategies with regards to the description of threats, risks, andactors involved in carrying out these threats – in particular, Italy,Latvia, the United Kingdom, and the United States. The analysisshows that before the large-scale invasion, the congruence was lowbetween the two continental European states vis-a-vis the UK andthe US on threat and risk assessment. After the invasion, these dif-ferences became smaller and the language of the updated NationalCyber Security Strategies became more homogeneous as mea-sured by the cosine similarity scores. There are still differences inthe discussion of relevant actors in cyberspace. The methodologyapplied here can be extended to measure the cohesiveness of theAlliance’s cyber posture along other dimensions.
对网络领域作战环境的共同理解是北约网络态势的关键推动因素。然而,一直以来都没有尝试对乌克兰战争对联盟内部一致性的影响进行实证评估。本研究采用了一种基于计算文本分析的新方法,以评估最近通过的国家网络战略在描述威胁、风险和参与实施这些威胁的行动者方面的趋势,尤其是意大利、拉脱维亚、英国和美国。分析表明,在大规模入侵之前,欧洲大陆两个国家与英国和美国在威胁和风险评估方面的一致性较低。入侵发生后,这些差异变得越来越小,更新后的国家网络安全战略的措辞也变得更加一致,余弦相似度得分也证明了这一点。在讨论网络空间中的相关行为者时仍存在差异。这里应用的方法可扩展用于衡量联盟在其他方面的网络态势的凝聚力。
{"title":"Russia’s Invasion of Ukraine and National Cyber Security Strategies: Quantitative Compar-ison","authors":"Olesya Vinhas de Souza","doi":"10.60097/acig/190346","DOIUrl":"https://doi.org/10.60097/acig/190346","url":null,"abstract":"Shared understanding of the operational environment\u0000in the cyber domain is the key enabler of NATO’s cyber posture.\u0000However, there have been no attempts to evaluate empirically the\u0000impact of the war in Ukraine on intra-Alliance coherence. This study\u0000applies a novel methodology based on computation text analysis\u0000to evaluate the trends within the recently adopted national cyber\u0000strategies with regards to the description of threats, risks, and\u0000actors involved in carrying out these threats – in particular, Italy,\u0000Latvia, the United Kingdom, and the United States. The analysis\u0000shows that before the large-scale invasion, the congruence was low\u0000between the two continental European states vis-a-vis the UK and\u0000the US on threat and risk assessment. After the invasion, these dif-\u0000ferences became smaller and the language of the updated National\u0000Cyber Security Strategies became more homogeneous as mea-\u0000sured by the cosine similarity scores. There are still differences in\u0000the discussion of relevant actors in cyberspace. The methodology\u0000applied here can be extended to measure the cohesiveness of the\u0000Alliance’s cyber posture along other dimensions.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141827334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Military Situation Awareness: Ukrainian Experience 军事形势意识:乌克兰的经验
Pub Date : 2024-07-17 DOI: 10.60097/acig/190341
V. Putrenko, Nataliia Pashynska
Situational awareness (SA) has become one of the keyconcepts in military sector. The Russian-Ukrainian war led to thedevelopment of information technology in Ukraine to manage troopsand combat situations. The army was supported by numerous volun-teer initiatives involving IT professionals. As a result, Ukrainian armyhas received modern software solutions based on the principles ofSA for use in real combat conditions. The purpose of the study is toanalyse the development of military and civilian SA information sys-tems during the war between Russia and Ukraine. In the course ofthe study, the methods of system analysis of the problem of SA wereused. The research classifies information solutions, assesses the dis-tribution of products by different classification sectors, and conductsa strengths, weaknesses, opportunities, and threats (SWOT) analysisof the developed products. Using the example of the most commonsolutions, the main features of existing software products and thetechnologies on which they operate were identified. Prospects forthe development of solutions, their contribution to military manage-ment, and problematic issues are identified.
态势感知(SA)已成为军事领域的关键概念之一。俄乌战争促使乌克兰发展信息技术,以管理部队和作战情况。军队得到了众多信息技术专业人员自愿参与的倡议的支持。因此,乌克兰军队获得了基于SA 原则的现代软件解决方案,可用于实战条件。本研究的目的是分析俄罗斯和乌克兰战争期间军用和民用 SA 信息系统的发展情况。在研究过程中,使用了系统分析 SA 问题的方法。研究对信息解决方案进行了分类,评估了不同分类部门的产品分布情况,并对开发的产品进行了优势、劣势、机会和威胁(SWOT)分析。以最常用的解决方案为例,确定了现有软件产品的主要特点及其运行技术。确定了解决方案的发展前景、对军事管理的贡献以及存在的问题。
{"title":"Military Situation Awareness: Ukrainian Experience","authors":"V. Putrenko, Nataliia Pashynska","doi":"10.60097/acig/190341","DOIUrl":"https://doi.org/10.60097/acig/190341","url":null,"abstract":"Situational awareness (SA) has become one of the key\u0000concepts in military sector. The Russian-Ukrainian war led to the\u0000development of information technology in Ukraine to manage troops\u0000and combat situations. The army was supported by numerous volun-\u0000teer initiatives involving IT professionals. As a result, Ukrainian army\u0000has received modern software solutions based on the principles of\u0000SA for use in real combat conditions. The purpose of the study is to\u0000analyse the development of military and civilian SA information sys-\u0000tems during the war between Russia and Ukraine. In the course of\u0000the study, the methods of system analysis of the problem of SA were\u0000used. The research classifies information solutions, assesses the dis-\u0000tribution of products by different classification sectors, and conducts\u0000a strengths, weaknesses, opportunities, and threats (SWOT) analysis\u0000of the developed products. Using the example of the most common\u0000solutions, the main features of existing software products and the\u0000technologies on which they operate were identified. Prospects for\u0000the development of solutions, their contribution to military manage-\u0000ment, and problematic issues are identified.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141830066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology of Quantitative Assessment of Network Cyber Threats Using a Risk-Based Approach 基于风险的网络威胁定量评估方法
Pub Date : 2024-07-15 DOI: 10.60097/acig/190345
Artem Zhylin, Hanna Holych
The methodology of a quantitative assessment of organ-isation’s network cyber threats was developed in order to quanti-tatively assess and compare the cybersecurity threat landscape inconditions of limited data while applying the risk-oriented approach.It can be used either for assessing the level of network cyber threatsof a particular organisation (as a quantitative measure of the criti-cality of cyber threats that are detected within the organisation’snetwork) or for comparing the level of network cyber threats ofseveral organisations during the same or different time periods,giving grounds for supporting the process of making manage-rial decisions regarding the organisation’s cybersecurity strategy.The proposed scheme of the algorithm can be used to automatethe calculation process. The assessment of network cyber threatsthat are considered in the article is not a full-fledged measure ofthe cyber risk because the methodology was developed consider-ing the common circumstances of the deficiency of the risk contextdata. Nevertheless, the results of the methodology implementationpartially reflect the overall level of the organisation’s cyber risk andare expected to be used in the case when the full-featured propercyber threats assessment can’t be organised for some reason.
组织网络威胁定量评估方法的开发是为了在数据有限的情况下,以风险为导向,对网络安全威胁状况进行定量评估和比较。它既可用于评估特定组织的网络威胁水平(作为在该组织网络内检测到的网络威胁严重程度的量化衡量标准),也可用于比较多个组织在相同或不同时间段内的网络威胁水平,为有关组织网络安全战略的管理决策过程提供支持依据。文章中考虑的网络威胁评估并不是对网络风险的全面衡量,因为该方法是在考虑到风险背景数据不足的常见情况下开发的。尽管如此,该方法的实施结果部分反映了组织网络风险的整体水平,并有望在因某些原因无法组织全面的适当网络威胁评估时使用。
{"title":"Methodology of Quantitative Assessment of Network Cyber Threats Using a Risk-Based Approach","authors":"Artem Zhylin, Hanna Holych","doi":"10.60097/acig/190345","DOIUrl":"https://doi.org/10.60097/acig/190345","url":null,"abstract":"The methodology of a quantitative assessment of organ-\u0000isation’s network cyber threats was developed in order to quanti-\u0000tatively assess and compare the cybersecurity threat landscape in\u0000conditions of limited data while applying the risk-oriented approach.\u0000It can be used either for assessing the level of network cyber threats\u0000of a particular organisation (as a quantitative measure of the criti-\u0000cality of cyber threats that are detected within the organisation’s\u0000network) or for comparing the level of network cyber threats of\u0000several organisations during the same or different time periods,\u0000giving grounds for supporting the process of making manage-\u0000rial decisions regarding the organisation’s cybersecurity strategy.\u0000The proposed scheme of the algorithm can be used to automate\u0000the calculation process. The assessment of network cyber threats\u0000that are considered in the article is not a full-fledged measure of\u0000the cyber risk because the methodology was developed consider-\u0000ing the common circumstances of the deficiency of the risk context\u0000data. Nevertheless, the results of the methodology implementation\u0000partially reflect the overall level of the organisation’s cyber risk and\u0000are expected to be used in the case when the full-featured proper\u0000cyber threats assessment can’t be organised for some reason.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141649222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the cybersecurity of Ukrainian public companies listed on the Warsaw Stock Exchange S.A. 评估在华沙证券交易所(Warsaw Stock Exchange S.A.)上市的乌克兰上市公司的网络安全状况
Pub Date : 2024-07-15 DOI: 10.60097/acig/190343
Anna Anna Szczepańska-Przekota
Nowadays, the number of sophisticated cyberattackstargeting critical infrastructure or banking systems is increas-ing. Cases of successful attacks are not uncommon, as statistics inUkraine demonstrate, and they are becoming more frequent andadvanced. This results in an increased risk for companies listed onthe stock exchange. The article provides examples of cyberattacksin Ukraine, including those using ransomware, attempts to infiltrateenergy systems, and attacks on government institutions. It is notedthat the presence of cyber threats is strongly linked to the politi-cal and international situation of the country. Analyses conductedfocus on the examination of cyber threat events in Ukraine and theirimpact on the WIG_UKRAIN stock index from 2015 to 2023. The evalu-ation includes the index’s return rates on the day of the cyber threatoccurrence, the following day, and the average return rate within fivesessions after the threat. An analogous study for the WIG index isadopted as a benchmark. Based on the obtained results, it can besaid that before the year 2022, cyberattacks on Ukraine did not have asignificant impact on the value of the Ukrainian company stock index.The situation changed after 2022, where each potentially economi-cally harmful cyberattack contributed to the decrease in the value ofUkrainian-listed companies. Generally, the start of hostilities in 2022significantly increased the volatility of the WIG_UKRAIN index quota-tions. This is to be expected, as markets react badly to uncertainty.
如今,针对关键基础设施或银行系统的复杂网络攻击日益增多。正如乌克兰的统计数据所示,攻击成功的案例并不少见,而且越来越频繁和先进。这导致证券交易所上市公司的风险增加。文章举例说明了乌克兰的网络攻击,包括使用勒索软件的攻击、试图渗透能源系统的攻击以及对政府机构的攻击。文章指出,网络威胁的存在与该国的政治和国际形势密切相关。分析的重点是研究 2015 年至 2023 年乌克兰的网络威胁事件及其对 WIG_UKRAIN 股票指数的影响。评估包括网络威胁发生当日、次日的指数回报率,以及威胁发生后五次内的平均回报率。以 WIG 指数为基准进行了类似研究。根据所得结果,可以说在 2022 年之前,对乌克兰的网络攻击对乌克兰公司股票指数的价值没有显著影响。总体而言,2022 年敌对行动的开始大大增加了 WIG_UKRAIN 指数配额的波动性。这是意料之中的,因为市场对不确定性的反应很糟糕。
{"title":"Assessment of the cybersecurity of Ukrainian public companies listed on the Warsaw Stock Exchange S.A.","authors":"Anna Anna Szczepańska-Przekota","doi":"10.60097/acig/190343","DOIUrl":"https://doi.org/10.60097/acig/190343","url":null,"abstract":"Nowadays, the number of sophisticated cyberattacks\u0000targeting critical infrastructure or banking systems is increas-\u0000ing. Cases of successful attacks are not uncommon, as statistics in\u0000Ukraine demonstrate, and they are becoming more frequent and\u0000advanced. This results in an increased risk for companies listed on\u0000the stock exchange. The article provides examples of cyberattacks\u0000in Ukraine, including those using ransomware, attempts to infiltrate\u0000energy systems, and attacks on government institutions. It is noted\u0000that the presence of cyber threats is strongly linked to the politi-\u0000cal and international situation of the country. Analyses conducted\u0000focus on the examination of cyber threat events in Ukraine and their\u0000impact on the WIG_UKRAIN stock index from 2015 to 2023. The evalu-\u0000ation includes the index’s return rates on the day of the cyber threat\u0000occurrence, the following day, and the average return rate within five\u0000sessions after the threat. An analogous study for the WIG index is\u0000adopted as a benchmark. Based on the obtained results, it can be\u0000said that before the year 2022, cyberattacks on Ukraine did not have a\u0000significant impact on the value of the Ukrainian company stock index.\u0000The situation changed after 2022, where each potentially economi-\u0000cally harmful cyberattack contributed to the decrease in the value of\u0000Ukrainian-listed companies. Generally, the start of hostilities in 2022\u0000significantly increased the volatility of the WIG_UKRAIN index quota-\u0000tions. This is to be expected, as markets react badly to uncertainty.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"58 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141644303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital space 网络影响防御:将 DISARM 框架应用于罗马尼亚数字空间的认知黑客案例
Pub Date : 2024-07-10 DOI: 10.60097/acig/190196
Alina Bârgăoanu, Mihaela Pană
One of the main lessons learned in the context of Russia’sfull-scale invasion of Ukraine starting in February 2022 is that for-eign information manipulation and interference (FIMI) operationsare closely coupled with cyber threats. Regardless of whethercyberattacks are followed by an information manipulation compo-nent and vice versa, the merger of the two can be an early indica-tor of the potential for a conflict to escalate from the cyber areato the ground. Our article is premised on the idea that today’shighly technologised information ecosystem is a fertile ground forcyberattacks and information manipulation in the context of FIMI;more specifically, it enables cognitive hacking, meaning hackingthe human mind and human cognition altogether through techno-logical disruption and cyber pressure. Starting from this premise,the aim of the article is to highlight the technological determi-nants of cognitive hacking and identify silent or emerging threatsthat bypass technological sensors and seek to disrupt and manip-ulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analysea case of cognitive hacking carried out via a YouTube malvertis-ing campaign targeting Romanian users. This case study is anal-ysed qualitatively by matching the DISinformation Analysis & RiskManagement (DISARM) framework with evidence collected throughOpen-Source Intelligence (OSINT) tools, following an innovativeanalysis structured according to the purposes, actions, results andtechniques (PART) model. The extensive analysis of the identifiedcase shows that applying the DISARM framework to cyber-enabledoperations can be useful for anticipating and responding to FIMIthreats, even when such operations do not appear to have a spe-cific, immediately identifiable purpose.
俄罗斯从 2022 年 2 月开始大规模入侵乌克兰,从中汲取的主要教训之一是,外国信息操纵和干扰(FIMI)行动与网络威胁密切相关。无论网络攻击之后是否会有信息操纵行动,反之亦然,两者的结合都是冲突可能从网络领域升级到地面领域的早期迹象。我们这篇文章的前提是,当今高度技术化的信息生态系统是在 FIMI 背景下进行网络攻击和信息操纵的沃土;更具体地说,它使认知黑客(cognitive hacking)成为可能,即通过技术逻辑破坏和网络压力完全入侵人类思想和人类认知。从这一前提出发,文章旨在强调认知黑客的技术决定因素,并识别那些绕过技术传感器、试图破坏和操纵信息环境的无声或新兴威胁。实证部分以观察作为描述性方法,用于分析一个通过针对罗马尼亚用户的 YouTube 恶意攻击活动进行认知黑客攻击的案例。该案例研究采用创新的分析方法,根据目的、行动、结果和技术(PART)模型,将信息分析和风险管理(DISARM)框架与通过开放源情报(OSINT)工具收集的证据进行匹配,从而对案例研究进行定性分析。对已确定案例的广泛分析表明,将 DISARM 框架应用于网络行动有助于预测和应对 FIMI 威胁,即使这些行动似乎没有特定的、可立即识别的目的。
{"title":"Cyber influence defense: Applying the DISARM framework to a cognitive hacking case from the Romanian digital space","authors":"Alina Bârgăoanu, Mihaela Pană","doi":"10.60097/acig/190196","DOIUrl":"https://doi.org/10.60097/acig/190196","url":null,"abstract":"One of the main lessons learned in the context of Russia’s\u0000full-scale invasion of Ukraine starting in February 2022 is that for-\u0000eign information manipulation and interference (FIMI) operations\u0000are closely coupled with cyber threats. Regardless of whether\u0000cyberattacks are followed by an information manipulation compo-\u0000nent and vice versa, the merger of the two can be an early indica-\u0000tor of the potential for a conflict to escalate from the cyber area\u0000to the ground. Our article is premised on the idea that today’s\u0000highly technologised information ecosystem is a fertile ground for\u0000cyberattacks and information manipulation in the context of FIMI;\u0000more specifically, it enables cognitive hacking, meaning hacking\u0000the human mind and human cognition altogether through techno-\u0000logical disruption and cyber pressure. Starting from this premise,\u0000the aim of the article is to highlight the technological determi-\u0000nants of cognitive hacking and identify silent or emerging threats\u0000that bypass technological sensors and seek to disrupt and manip-\u0000ulate the information environment. The empirical part is based on observation as a descriptive method, which is used to analyse\u0000a case of cognitive hacking carried out via a YouTube malvertis-\u0000ing campaign targeting Romanian users. This case study is anal-\u0000ysed qualitatively by matching the DISinformation Analysis & Risk\u0000Management (DISARM) framework with evidence collected through\u0000Open-Source Intelligence (OSINT) tools, following an innovative\u0000analysis structured according to the purposes, actions, results and\u0000techniques (PART) model. The extensive analysis of the identified\u0000case shows that applying the DISARM framework to cyber-enabled\u0000operations can be useful for anticipating and responding to FIMI\u0000threats, even when such operations do not appear to have a spe-\u0000cific, immediately identifiable purpose.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"23 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141658941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Cybersecurity & Internet Governance
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1