首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
DPIA for Cloud-based Health Organizations in the context of GDPR GDPR背景下基于云的医疗机构的DPIA
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1144
Dimitra Georgiou, C. Lambrinoudakis
The General Data Protection Regulation is the core instrument of the reformed legal framework for personal data protection in the European Union. The GDPR was put into effect on May 25, 2018, and requires assessing and conducting a Data Protection Impact Assessment for processing operations that are likely to result in a high risk to the rights and freedoms of natural persons, specifically using new technologies and considering the nature, scope, context, and purposes of the processing. Although GDPR does not precisely specify the types of processing activities for which a DPIA would be necessary, through the guidelines that it provides, the organization should conduct a DPIA, if there is large scale processing of health data. An example of this, is a Cloud-based Health Organization. Taking into account this parameter, that Cloud-based Health Organization processes personal data that could impact the freedoms and rights of a data subject under the GDPR and that the GDPR does not specify a DPIA process to follow, instead it allows organizations to use a framework that complements their existing processes, this paper presents the last two steps of a DPIA study for a Cloud-based Health Organization and provides guidelines on how to carry them out effectively. This study is part of a project for the compliance of Cloud-based Health Organizations with the General Data Protection Regulation 2016/679. For fulfilling the objectives of this study, the PIA-CNIL methodology is applied, which is in accordance with the data privacy impact assessment that has been described in ISO/IEC 29134. The main contribution of this work is the development of a guide that is designed to help Cloud-based Health organizations identify, analyze and reduce data protection risks in relation to their processing activities. More analytically, this research presents the risks that could be materialized by the data processing activities carried out by a Cloud-based Health Organization regarding its Processing Activities and could have an impact on the fundamental rights and freedoms of natural persons.
《一般数据保护条例》是欧盟个人数据保护法律框架改革后的核心工具。GDPR于2018年5月25日生效,要求对可能对自然人权利和自由造成高风险的处理操作进行数据保护影响评估,特别是使用新技术并考虑处理的性质、范围、背景和目的。尽管GDPR没有精确规定需要DPIA的处理活动类型,但通过其提供的指导方针,如果存在大规模的健康数据处理,组织应该进行DPIA。这方面的一个例子是基于云的医疗组织。考虑到这一参数,基于云的医疗机构处理的个人数据可能会影响数据主体在GDPR下的自由和权利,并且GDPR没有指定要遵循的DPIA流程,而是允许组织使用补充其现有流程的框架,本文介绍了基于云的医疗机构DPIA研究的最后两个步骤,并提供了如何有效执行这些步骤的指导方针。本研究是基于云的医疗组织遵守《2016/679通用数据保护条例》项目的一部分。为了实现本研究的目标,采用了PIA-CNIL方法,该方法符合ISO/IEC 29134中描述的数据隐私影响评估。这项工作的主要贡献是制定了一份指南,旨在帮助基于云的卫生组织识别、分析和减少与其处理活动有关的数据保护风险。从更深入的分析角度来看,这项研究提出了基于云的卫生组织就其处理活动开展的数据处理活动可能带来的风险,并可能对自然人的基本权利和自由产生影响。
{"title":"DPIA for Cloud-based Health Organizations in the context of GDPR","authors":"Dimitra Georgiou, C. Lambrinoudakis","doi":"10.34190/eccws.22.1.1144","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1144","url":null,"abstract":"The General Data Protection Regulation is the core instrument of the reformed legal framework for personal data protection in the European Union. The GDPR was put into effect on May 25, 2018, and requires assessing and conducting a Data Protection Impact Assessment for processing operations that are likely to result in a high risk to the rights and freedoms of natural persons, specifically using new technologies and considering the nature, scope, context, and purposes of the processing. Although GDPR does not precisely specify the types of processing activities for which a DPIA would be necessary, through the guidelines that it provides, the organization should conduct a DPIA, if there is large scale processing of health data. An example of this, is a Cloud-based Health Organization. Taking into account this parameter, that Cloud-based Health Organization processes personal data that could impact the freedoms and rights of a data subject under the GDPR and that the GDPR does not specify a DPIA process to follow, instead it allows organizations to use a framework that complements their existing processes, this paper presents the last two steps of a DPIA study for a Cloud-based Health Organization and provides guidelines on how to carry them out effectively. This study is part of a project for the compliance of Cloud-based Health Organizations with the General Data Protection Regulation 2016/679. For fulfilling the objectives of this study, the PIA-CNIL methodology is applied, which is in accordance with the data privacy impact assessment that has been described in ISO/IEC 29134. The main contribution of this work is the development of a guide that is designed to help Cloud-based Health organizations identify, analyze and reduce data protection risks in relation to their processing activities. More analytically, this research presents the risks that could be materialized by the data processing activities carried out by a Cloud-based Health Organization regarding its Processing Activities and could have an impact on the fundamental rights and freedoms of natural persons.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems 基于深度学习的软件定义网络空间系统入侵检测
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1085
Uakomba Uhongora, Ronald Mulinde, Yee Wei Law, J. Slay
This paper briefly reviews the application of the Software-defined Networking (SDN) architecture to satellite networks. It highlights the prominent cyber threats that SDN-based satellite networks are vulnerable to and proposes relevant defence mechanisms. SDN transforms traditional networking architectures by separating the control plane from the forwarding (data) plane. This separation enhances scalability and centralises management. In comparison, in traditional networks, the control plane and the data plane are usually combined, resulting in complex network management and reduced scalability. Satellite networks can take advantage of these benefits offered by SDN and this supports them as key enablers of critical services, including weather prediction, global broadband Internet coverage, and Internet of Things (IoT) services. Ease of configuration and flexibility are essential for satellites providing critical services to instantly adapt to network changes. These desirable attributes can be realised by applying SDN to satellite networks.  Although SDN offers significant benefits to satellite networks, it is vulnerable to cyber-attacks and particularly due to its centralised architecture. A common attack on SDN is the Distributed Denial of Service (DDoS) attack which could render the entire SDN unavailable. To mitigate such threats, an efficient Intrusion Detection System (IDS) is required to monitor the network and detect any suspicious traffic. However, traditional IDSs produce too many false positives and often fail to detect advanced attacks. For their ability to learn feature hierarchies in network traffic data automatically, whether, for network traffic classification or anomaly detection, deep learning (DL) plays an increasingly important role in IDSs. In this paper, we present a brief review of recent developments in cyber security for SDN-based space systems, and we identify vulnerabilities and threats to an SDN-based satellite network. We further discuss the potential of a DL-based IDS for the detection of cyber threats. Finally, we identify further research gaps in the recent literature and propose future research directions.
本文简要综述了软件定义网络(SDN)体系结构在卫星网络中的应用。强调了基于sdn的卫星网络易受的突出网络威胁,并提出了相关防御机制。SDN通过将控制平面与转发(数据)平面分离,改变了传统的网络架构。这种分离增强了可伸缩性和集中管理。相比之下,在传统网络中,控制平面和数据平面通常是结合在一起的,导致网络管理复杂,可扩展性降低。卫星网络可以利用SDN提供的这些优势,这支持它们成为关键服务的关键推动者,包括天气预报、全球宽带互联网覆盖和物联网(IoT)服务。易于配置和灵活性是卫星提供关键服务以立即适应网络变化的必要条件。通过将SDN应用于卫星网络,可以实现这些理想的属性。尽管SDN为卫星网络提供了巨大的好处,但它很容易受到网络攻击,特别是由于其集中式架构。对SDN的常见攻击是分布式拒绝服务(DDoS)攻击,它可以使整个SDN不可用。为了减轻这些威胁,需要一个有效的入侵检测系统(IDS)来监控网络并检测任何可疑的流量。然而,传统的入侵防御系统产生了太多的误报,往往无法检测到高级攻击。由于能够自动学习网络流量数据中的特征层次结构,无论是网络流量分类还是异常检测,深度学习(DL)在ids中发挥着越来越重要的作用。在本文中,我们简要回顾了基于sdn的空间系统网络安全的最新发展,并确定了基于sdn的卫星网络的漏洞和威胁。我们进一步讨论了基于dll的IDS检测网络威胁的潜力。最后,我们指出了近期文献中进一步的研究空白,并提出了未来的研究方向。
{"title":"Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems","authors":"Uakomba Uhongora, Ronald Mulinde, Yee Wei Law, J. Slay","doi":"10.34190/eccws.22.1.1085","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1085","url":null,"abstract":"This paper briefly reviews the application of the Software-defined Networking (SDN) architecture to satellite networks. It highlights the prominent cyber threats that SDN-based satellite networks are vulnerable to and proposes relevant defence mechanisms. SDN transforms traditional networking architectures by separating the control plane from the forwarding (data) plane. This separation enhances scalability and centralises management. In comparison, in traditional networks, the control plane and the data plane are usually combined, resulting in complex network management and reduced scalability. Satellite networks can take advantage of these benefits offered by SDN and this supports them as key enablers of critical services, including weather prediction, global broadband Internet coverage, and Internet of Things (IoT) services. Ease of configuration and flexibility are essential for satellites providing critical services to instantly adapt to network changes. These desirable attributes can be realised by applying SDN to satellite networks.  Although SDN offers significant benefits to satellite networks, it is vulnerable to cyber-attacks and particularly due to its centralised architecture. A common attack on SDN is the Distributed Denial of Service (DDoS) attack which could render the entire SDN unavailable. To mitigate such threats, an efficient Intrusion Detection System (IDS) is required to monitor the network and detect any suspicious traffic. However, traditional IDSs produce too many false positives and often fail to detect advanced attacks. For their ability to learn feature hierarchies in network traffic data automatically, whether, for network traffic classification or anomaly detection, deep learning (DL) plays an increasingly important role in IDSs. In this paper, we present a brief review of recent developments in cyber security for SDN-based space systems, and we identify vulnerabilities and threats to an SDN-based satellite network. We further discuss the potential of a DL-based IDS for the detection of cyber threats. Finally, we identify further research gaps in the recent literature and propose future research directions.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131742874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake news as a distortion of media reality: tell-truth strategy in the post-truth era 假新闻是对媒体现实的扭曲:后真相时代的真相战略
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1080
Anastasiia Iufereva
The article deals with fake news which has been considered one of the greatest threats to information security. The expansion of digital technologies and the development of communication networks have contributed to the spreading of misinformation. In particular, the emergence of different sources of information on the Internet, the growing polarization of opinions in the political and socio-economic dimensions, the devaluation of the fact, and the widespread fake news on the Internet (e.g., social media) form the question of revision of the process of collecting, verifying presenting information, methods, and technologies for verifying facts, including methods for countering fake news. Although this issue has been widely investigated in academic discourse, there are still controversial arguments regarding which elements should form a tell-truth strategy. This paper focuses on recent research that reflects trends and patterns in this field and on the author’s empirical survey - interviews with university professors and media experts (N=6), journalists (N=6), and students (N=14) in Russia. In this study, the author describes the key characteristics of fake news and the elements of this tell-truth strategy. It is intended that this paper focuses on both professional journalists and professors who may use the results of this investigation in such courses as political science, sociology, philosophy, and journalism.
这篇文章涉及假新闻,假新闻被认为是对信息安全的最大威胁之一。数字技术的扩展和通信网络的发展助长了错误信息的传播。特别是,互联网上不同信息来源的出现,政治和社会经济层面的观点日益两极分化,事实的贬值,以及互联网(例如社交媒体)上广泛存在的假新闻,形成了对收集,验证呈现信息的过程,验证事实的方法和技术进行修订的问题,包括打击假新闻的方法。尽管这一问题在学术话语中得到了广泛的研究,但关于哪些要素应该构成一个说实话策略,仍然存在争议。本文着重于反映这一领域趋势和模式的最新研究,以及作者的实证调查——对俄罗斯的大学教授和媒体专家(N=6)、记者(N=6)和学生(N=14)的采访。在本研究中,作者描述了假新闻的主要特征以及这种说实话策略的要素。这篇论文的目的是关注专业记者和教授,他们可能会在政治学、社会学、哲学和新闻学等课程中使用这项调查的结果。
{"title":"Fake news as a distortion of media reality: tell-truth strategy in the post-truth era","authors":"Anastasiia Iufereva","doi":"10.34190/eccws.22.1.1080","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1080","url":null,"abstract":"The article deals with fake news which has been considered one of the greatest threats to information security. The expansion of digital technologies and the development of communication networks have contributed to the spreading of misinformation. In particular, the emergence of different sources of information on the Internet, the growing polarization of opinions in the political and socio-economic dimensions, the devaluation of the fact, and the widespread fake news on the Internet (e.g., social media) form the question of revision of the process of collecting, verifying presenting information, methods, and technologies for verifying facts, including methods for countering fake news. Although this issue has been widely investigated in academic discourse, there are still controversial arguments regarding which elements should form a tell-truth strategy. This paper focuses on recent research that reflects trends and patterns in this field and on the author’s empirical survey - interviews with university professors and media experts (N=6), journalists (N=6), and students (N=14) in Russia. In this study, the author describes the key characteristics of fake news and the elements of this tell-truth strategy. It is intended that this paper focuses on both professional journalists and professors who may use the results of this investigation in such courses as political science, sociology, philosophy, and journalism.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan? 《塔林手册2.0》如何揭示网络攻击对台湾的威胁?
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1294
Chih-Hsiang Chang
This paper will identify possible unsettled issues when applying jus ad bellum and jus in bello to case scenarios based on China's cyber operations against Taiwan, pursuant to the rules of international law governing cyber or military operations attributable to States reflected in Tallinn Manual 2.0. This paper will argue that because of Taiwan’s legal international status as a sovereign State, the different responsive actions it may take, should it be faced with any such aggressive cyber or military attack, may be considered controversial.  This paper will then identify the possible legal issues that may pertain under current international law, should any such armed conflict occur between China and Taiwan.
本文将根据《塔林手册2.0》中反映的适用于国家的网络或军事行动的国际法规则,在基于中国对台湾的网络行动的情况下,确定在适用战时法和战时法时可能存在的未解决问题。本文将认为,由于台湾作为一个主权国家的法律国际地位,如果它面临任何这种侵略性的网络或军事攻击,它可能采取的不同反应行动可能被认为是有争议的。然后,本文将确定在现行国际法下可能涉及的法律问题,如果中国和台湾之间发生任何此类武装冲突。
{"title":"How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan?","authors":"Chih-Hsiang Chang","doi":"10.34190/eccws.22.1.1294","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1294","url":null,"abstract":"This paper will identify possible unsettled issues when applying jus ad bellum and jus in bello to case scenarios based on China's cyber operations against Taiwan, pursuant to the rules of international law governing cyber or military operations attributable to States reflected in Tallinn Manual 2.0. This paper will argue that because of Taiwan’s legal international status as a sovereign State, the different responsive actions it may take, should it be faced with any such aggressive cyber or military attack, may be considered controversial.  This paper will then identify the possible legal issues that may pertain under current international law, should any such armed conflict occur between China and Taiwan.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target Audiences’ Characteristics and Prospective in Countering Information Warfare 打击信息战的目标受众特征与前景
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1169
Daniel Ionel Andrei Nistor
NATO Defense Education Enhancement Program defines Information Warfare as an operation run to get cognitive assets over the opponents, by controlling one’s own information space while disrupting the opponents’ one. Not new as a process, continuous technological progress has endowed this phenomenon with speed and instruments to fight cyber and cognitive battles, to attack perceptions, trust, polarise and disrupt societies at large. The all present and undergoing kinetic conflict between Russia and Ukraine doubled by an even stronger cognitive and information war since February 2022 has highlighted even more the need to better understand individuals’ behaviour and characteristics when faced with unconventional attacks, irrespective of a passive or active feedback. By identifying and analysing specific public categories, one can establish which are contextual variables that trigger a social reaction, to be able to then design a set of protective or defensive measures. For a full understanding of the way Information Warfare impacts people’s thinking and decision-making process, to see how a resilience plan can be designed, one should investigate not only the information war instruments but also their effects over people at large. Not knowing the voice of the hostile authors, it Is still important to understand the domestic audience and their reaction to it, so that protective actions be taken for resilience and protection, through education. The domestic public’s identity and its dominant characteristics are brought into attention to understand which is the relation between these and the way Information Warfare can be countered through education, with examples from the Russian’s hostile activity. Values, national identity, stereotypes and generalist psychological profiles will be looked at in this paper, to be put in relation to behaviours, attitude change and resistance in front of types of messages, campaigns and types of media-embedded grey zone threats. The present paper is part of a larger PhD research program that focuses on consolidating a society’s security culture through better institutional strategic communication, therefore all the findings will be used to this end.
北约国防教育增强计划将信息战定义为一种通过控制自己的信息空间同时破坏对手的信息空间来获得对手认知资产的行动。作为一个过程,持续的技术进步赋予了这一现象以速度和工具,以进行网络和认知战争,攻击观念,信任,两极分化和破坏整个社会。自2022年2月以来,一场更加激烈的认知战和信息战使俄罗斯和乌克兰之间当前和正在发生的动态冲突加倍,这更加突显出,在面对非常规攻击时,无论被动反馈还是主动反馈,都需要更好地了解个人的行为和特征。通过识别和分析特定的公共类别,人们可以确定哪些是触发社会反应的上下文变量,然后能够设计一套保护或防御措施。为了充分理解信息战影响人们思维和决策过程的方式,为了了解如何设计弹性计划,人们不仅应该调查信息战工具,还应该调查它们对一般人的影响。在不了解敌对作者的声音的情况下,了解国内读者及其对此的反应仍然很重要,以便通过教育采取保护行动,增强复原力和保护作用。国内公众的身份及其主导特征引起了人们的注意,以了解这些与通过教育应对信息战的方式之间的关系,并以俄罗斯的敌对活动为例。本文将研究价值观、民族认同、刻板印象和通才心理概况,并将其与行为、态度变化和抵抗类型的信息、运动和类型的媒体嵌入的灰色地带威胁联系起来。本论文是一个更大的博士研究项目的一部分,该项目侧重于通过更好的机构战略沟通来巩固社会的安全文化,因此所有的研究结果都将用于此目的。
{"title":"Target Audiences’ Characteristics and Prospective in Countering Information Warfare","authors":"Daniel Ionel Andrei Nistor","doi":"10.34190/eccws.22.1.1169","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1169","url":null,"abstract":"NATO Defense Education Enhancement Program defines Information Warfare as an operation run to get cognitive assets over the opponents, by controlling one’s own information space while disrupting the opponents’ one. Not new as a process, continuous technological progress has endowed this phenomenon with speed and instruments to fight cyber and cognitive battles, to attack perceptions, trust, polarise and disrupt societies at large. The all present and undergoing kinetic conflict between Russia and Ukraine doubled by an even stronger cognitive and information war since February 2022 has highlighted even more the need to better understand individuals’ behaviour and characteristics when faced with unconventional attacks, irrespective of a passive or active feedback. By identifying and analysing specific public categories, one can establish which are contextual variables that trigger a social reaction, to be able to then design a set of protective or defensive measures. For a full understanding of the way Information Warfare impacts people’s thinking and decision-making process, to see how a resilience plan can be designed, one should investigate not only the information war instruments but also their effects over people at large. Not knowing the voice of the hostile authors, it Is still important to understand the domestic audience and their reaction to it, so that protective actions be taken for resilience and protection, through education. The domestic public’s identity and its dominant characteristics are brought into attention to understand which is the relation between these and the way Information Warfare can be countered through education, with examples from the Russian’s hostile activity. Values, national identity, stereotypes and generalist psychological profiles will be looked at in this paper, to be put in relation to behaviours, attitude change and resistance in front of types of messages, campaigns and types of media-embedded grey zone threats. The present paper is part of a larger PhD research program that focuses on consolidating a society’s security culture through better institutional strategic communication, therefore all the findings will be used to this end.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace 网络空间地理和网络地形:制作网络空间通用地图的挑战
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1255
Alexander Grandin
Much in the same way that cyber has become the fifth military domain, cyberspace has also brought forth the research area of Cyberspace Geography. The challenge of producing a universal map of cyberspace however still exists. Cybersecurity specialists, military personnel and researchers still begin with a blank sheet on which the wanted elements of cyberspace are arranged before solving their actual problem. The abundance of elements in cyberspace requires a careful selection of factors to include in one's map, depending on how it will be used. However, a complex and ever-changing environment such as cyberspace could make use of a generally acknowledged starting point, facilitating this work. In previous research cyberspace has been described as a combination of the physical world, the social world and the information world. The multidisciplinary research in Cyberspace Geography has developed models for mapping and displaying cyberspace. This is often done by creating topological maps, much like the map of the New York subway system. Military cybersecurity researchers have through the concept of Cyber Terrain presented similar models of cyberspace for military operations. Research has also been produced on the techniques and methods for mapping cyberspace as well as the different presentations of the mapped information. Graph theory has for instance been used as a mathematical model of cyberspace. It is nonetheless unclear if there is some degree of universality in the elements that the different research presents. Which are e.g. the similar features between the cyberspace maps that are used for military operations, that describe the cyber environment of a country or between the elements used for modelling a cybersecurity system? This paper aims to present a solution to this challenge by systematically reviewing the research on Cyberspace Geography and Cyber Terrain using thematic analysis. The different elements of the maps of cyberspace are reviewed. The research will answer if a universal map, that can be used as a starting point for solving multiple challenges in cyberspace, can at present be prepared.
正如网络空间已成为第五军事领域一样,网络空间也催生了网络空间地理学这一研究领域。然而,制作网络空间通用地图的挑战仍然存在。网络安全专家、军事人员和研究人员在解决实际问题之前,仍然是从一张白纸开始,在上面安排网络空间的通缉元素。网络空间的元素丰富,需要仔细选择包括在地图中的因素,这取决于它将如何被使用。然而,网络空间等复杂多变的环境可以利用一个公认的起点,为这项工作提供便利。在以往的研究中,网络空间被描述为物理世界、社会世界和信息世界的结合。网络空间地理学的多学科研究发展了网络空间的映射和显示模型。这通常是通过创建拓扑地图来完成的,就像纽约地铁系统的地图一样。军事网络安全研究人员通过网络地形的概念提出了类似的军事行动网络空间模型。还研究了绘制网络空间地图的技术和方法以及地图信息的不同表示方式。例如,图论被用作网络空间的数学模型。然而,尚不清楚不同研究所呈现的要素是否存在某种程度的普遍性。例如,用于军事行动的网络空间地图,描述一个国家的网络环境的网络空间地图,或用于网络安全系统建模的元素之间的相似特征是什么?本文旨在通过系统回顾网络空间地理学和网络地形研究的专题分析,提出解决这一挑战的方法。回顾了网络空间地图的不同元素。这项研究将回答目前是否可以准备一个通用地图,作为解决网络空间多重挑战的起点。
{"title":"Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace","authors":"Alexander Grandin","doi":"10.34190/eccws.22.1.1255","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1255","url":null,"abstract":"Much in the same way that cyber has become the fifth military domain, cyberspace has also brought forth the research area of Cyberspace Geography. The challenge of producing a universal map of cyberspace however still exists. Cybersecurity specialists, military personnel and researchers still begin with a blank sheet on which the wanted elements of cyberspace are arranged before solving their actual problem. The abundance of elements in cyberspace requires a careful selection of factors to include in one's map, depending on how it will be used. However, a complex and ever-changing environment such as cyberspace could make use of a generally acknowledged starting point, facilitating this work. In previous research cyberspace has been described as a combination of the physical world, the social world and the information world. The multidisciplinary research in Cyberspace Geography has developed models for mapping and displaying cyberspace. This is often done by creating topological maps, much like the map of the New York subway system. Military cybersecurity researchers have through the concept of Cyber Terrain presented similar models of cyberspace for military operations. Research has also been produced on the techniques and methods for mapping cyberspace as well as the different presentations of the mapped information. Graph theory has for instance been used as a mathematical model of cyberspace. It is nonetheless unclear if there is some degree of universality in the elements that the different research presents. Which are e.g. the similar features between the cyberspace maps that are used for military operations, that describe the cyber environment of a country or between the elements used for modelling a cybersecurity system? This paper aims to present a solution to this challenge by systematically reviewing the research on Cyberspace Geography and Cyber Terrain using thematic analysis. The different elements of the maps of cyberspace are reviewed. The research will answer if a universal map, that can be used as a starting point for solving multiple challenges in cyberspace, can at present be prepared.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NCSS: A global census of national positions on conflict, neutrality and cooperation NCSS:关于冲突、中立和合作的各国立场的全球普查
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1168
Radu Antonio Serrano Iova, Tomoe Watashiba
The ubiquity of ICT and the increase in cyber threats have pushed countries to view cybersecurity from a national perspective and draft appropriate national strategies on the topic. While containing similar terminology, these strategies are tailored to the national contexts and hence, differ across regions, cultures, and political contexts. Previous research of these documents has been focused on comparative analysis of countries that can either be considered well developed on this topic or for specific subtopics of cybersecurity. However, some of the subtopics have not been addressed, only now having become more prevalent due to current international conflicts and national / regional socio-political scuffles that have spilled into cyberspace. In our paper, we investigate all countries that have published a National Cyber Security Strategy - NCSS - (or any similar document under a different nomenclature, e.g., policy, decree, etc.), specifically in reference to their position on war, neutrality, and international cooperation. Countries maintaining an NCSS will first be identified using international databases, upon which further study of the aforementioned topics in the NCSSs will occur. We hypothesize, that while international cooperation will be present in most, if not all NCSSs, armed conflicts and neutrality will not be addressed at all nor in depth, in those that contain any reference to them. The resulting paper will present a near-global case study of these topics, which can then signify potential areas of improvement, capacity building, and strengthening of democratic coalitions, globally.
信息通信技术的无处不在和网络威胁的增加促使各国从国家角度看待网络安全,并就此主题起草适当的国家战略。虽然包含类似的术语,但这些战略是根据国家情况量身定制的,因此在不同区域、文化和政治背景下有所不同。以前对这些文件的研究主要集中在对国家的比较分析上,这些国家要么可以被认为在这个主题上很发达,要么可以被认为在网络安全的特定子主题上很发达。然而,由于当前的国际冲突和国家/地区的社会政治冲突已经蔓延到网络空间,一些子主题尚未得到解决,只是现在变得更加普遍。在我们的论文中,我们调查了所有发布了国家网络安全战略(NCSS)(或任何不同术语下的类似文件,例如政策、法令等)的国家,特别是参考了他们在战争、中立和国际合作方面的立场。将首先利用国际数据库确定维持国家安全保障体系的国家,然后在此基础上进一步研究国家安全保障体系中的上述专题。我们假设,虽然国际合作将出现在大多数(如果不是所有的话)国家中,但在那些提及武装冲突和中立的国家中,它们将根本不会得到解决,也不会得到深入解决。由此产生的论文将展示这些主题的近全球案例研究,然后可以指出全球范围内改进、能力建设和加强民主联盟的潜在领域。
{"title":"NCSS: A global census of national positions on conflict, neutrality and cooperation","authors":"Radu Antonio Serrano Iova, Tomoe Watashiba","doi":"10.34190/eccws.22.1.1168","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1168","url":null,"abstract":"The ubiquity of ICT and the increase in cyber threats have pushed countries to view cybersecurity from a national perspective and draft appropriate national strategies on the topic. While containing similar terminology, these strategies are tailored to the national contexts and hence, differ across regions, cultures, and political contexts. Previous research of these documents has been focused on comparative analysis of countries that can either be considered well developed on this topic or for specific subtopics of cybersecurity. However, some of the subtopics have not been addressed, only now having become more prevalent due to current international conflicts and national / regional socio-political scuffles that have spilled into cyberspace. In our paper, we investigate all countries that have published a National Cyber Security Strategy - NCSS - (or any similar document under a different nomenclature, e.g., policy, decree, etc.), specifically in reference to their position on war, neutrality, and international cooperation. Countries maintaining an NCSS will first be identified using international databases, upon which further study of the aforementioned topics in the NCSSs will occur. We hypothesize, that while international cooperation will be present in most, if not all NCSSs, armed conflicts and neutrality will not be addressed at all nor in depth, in those that contain any reference to them. The resulting paper will present a near-global case study of these topics, which can then signify potential areas of improvement, capacity building, and strengthening of democratic coalitions, globally.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Techno-Economic Coalitions in Future Cyberspace Governance: 'Backcasting' as a Method for Strategic Foresight 技术经济联盟在未来网络空间治理中的作用:作为战略预见方法的“回溯”
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1078
Mari Ristolainen
In an increasingly complex threat landscape, many nations struggle with developing and implementing effective cybersecurity policies for cyberspace governance at a national and international level. Balancing between the demands for establishing national sovereignty and strengthening international collaboration in cyberspace have become a problematic assignment. Collaborating with nations supporting extensively dissimilar ideologies and cybersecurity policies is controversial. Yet, it is almost impossible for a single country to achieve 'self-sufficiency' in cyberspace. Thus, in order to remain competitive, protected, and resilient one must either join or strengthen a developing techno-economic coalition with similar national cybersecurity policies and/or ideological framework. Consequently, this paper argues that techno-economic coalitions serve as an emerging issue or trend for strategic foresight in cyberspace governance in the future. This paper discusses the potential formation of techno-economic coalitions and shows how 'backcasting' can be used in strategic foresight. In this paper, 'backcasting' is not used as a method for creating a traditional strategic map to a future goal, but as a framework for determining what should have happened in order for the techno-economic coalitions to emerge in future cyberspace, i.e. for finding issues or trends that should be followed in strategic foresight today. Firstly, cyberspace governance in relation to national cybersecurity policies is contextualised. Secondly, the concept of techno-economic coalition is defined and the potential emerging techno-economic coalitions are explicated. Thirdly, 'backcasting' as a method for strategic foresight is described. Fourthly, the results of a 'backcasting' experiment in a strategic foresight workshop are presented. And finally, the future formation and role of techno-economic coalitions in cyberspace governance and in cyber defence both at a national and international level are discussed. The role of techno-economic coalitions in future cyberspace governance should be understood and considered today when developing strategic plans and implementing national and international cybersecurity policies.
在日益复杂的威胁形势下,许多国家都在努力制定和实施有效的网络安全政策,以促进国家和国际层面的网络空间治理。在维护国家主权和加强网络空间国际合作之间寻找平衡已经成为一个棘手的课题。与支持完全不同意识形态和网络安全政策的国家合作是有争议的。然而,一个国家在网络空间实现“自给自足”几乎是不可能的。因此,为了保持竞争力,保护和弹性,必须加入或加强具有类似国家网络安全政策和/或意识形态框架的发展中的技术-经济联盟。因此,本文认为技术-经济联盟是未来网络空间治理战略远见的新兴问题或趋势。本文讨论了技术-经济联盟的潜在形成,并展示了“回溯”如何用于战略预见。在本文中,“回溯”不是作为一种创建未来目标的传统战略地图的方法,而是作为一种框架来确定应该发生什么,以便在未来的网络空间中出现技术-经济联盟,即发现今天应该在战略预见中遵循的问题或趋势。首先,与国家网络安全政策相关的网络空间治理是情境化的。其次,界定了技术经济联盟的概念,并对可能出现的技术经济联盟进行了阐述。第三,描述了“回溯法”作为战略预见的一种方法。第四,介绍了在战略前瞻研讨会上进行的“回溯”实验的结果。最后,讨论了国家和国际层面上技术经济联盟在网络空间治理和网络防御中的未来形成和作用。在制定战略计划和实施国家和国际网络安全政策时,应该理解和考虑技术经济联盟在未来网络空间治理中的作用。
{"title":"Role of Techno-Economic Coalitions in Future Cyberspace Governance: 'Backcasting' as a Method for Strategic Foresight","authors":"Mari Ristolainen","doi":"10.34190/eccws.22.1.1078","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1078","url":null,"abstract":"In an increasingly complex threat landscape, many nations struggle with developing and implementing effective cybersecurity policies for cyberspace governance at a national and international level. Balancing between the demands for establishing national sovereignty and strengthening international collaboration in cyberspace have become a problematic assignment. Collaborating with nations supporting extensively dissimilar ideologies and cybersecurity policies is controversial. Yet, it is almost impossible for a single country to achieve 'self-sufficiency' in cyberspace. Thus, in order to remain competitive, protected, and resilient one must either join or strengthen a developing techno-economic coalition with similar national cybersecurity policies and/or ideological framework. Consequently, this paper argues that techno-economic coalitions serve as an emerging issue or trend for strategic foresight in cyberspace governance in the future. This paper discusses the potential formation of techno-economic coalitions and shows how 'backcasting' can be used in strategic foresight. In this paper, 'backcasting' is not used as a method for creating a traditional strategic map to a future goal, but as a framework for determining what should have happened in order for the techno-economic coalitions to emerge in future cyberspace, i.e. for finding issues or trends that should be followed in strategic foresight today. Firstly, cyberspace governance in relation to national cybersecurity policies is contextualised. Secondly, the concept of techno-economic coalition is defined and the potential emerging techno-economic coalitions are explicated. Thirdly, 'backcasting' as a method for strategic foresight is described. Fourthly, the results of a 'backcasting' experiment in a strategic foresight workshop are presented. And finally, the future formation and role of techno-economic coalitions in cyberspace governance and in cyber defence both at a national and international level are discussed. The role of techno-economic coalitions in future cyberspace governance should be understood and considered today when developing strategic plans and implementing national and international cybersecurity policies.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of the MTI Crypto Investment Scam: User Case MTI加密投资骗局分析:用户案例
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1441
J. Botha, Thor Pederson, L. Leenen
Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this industry has grown significantly, so too has the instances of crypto scams. Numerous cryptocurrency scams exist to exploit users. The generally limited understanding of how cryptocurrencies operate has increased the possible number of scams, relying on people’s misplaced sense of trust and desire for making money quickly and easily. As such, investment scams have also been growing in popularity. Mirror Trading International (MTI) has been named South Africa’s biggest crypto scam in 2020, resulting in losses of $1.7 billion. It is also one of the largest reported international crypto investment scams. This paper focuses on a specific aspect of the MTI scam; an analysis on the fund movements on the blockchain from the perpetrators and members who benefited the most from the scam. The authors used various Open-Source Intelligence (OSINT) tools, alongside QLUE, as well as news articles and blockchain explorers. These tools and techniques are used to follow the money-trial on the blockchain, in search of possible mistakes made by the perpetrator. This could include instances where some personal information might have been leaked. With such disclosed personal information, OSINT tools and investigative techniques can be used to identify the criminals. Due to the CEO of MTI having been arrested, and the case currently being dealt with in the court of law in South Africa, this paper also presents investigative processes that could be followed. Thus, the focus of this paper is to follow the money and consequently propose a process for an investigator to investigate crypto crimes and scams on the blockchain. As the adoption of blockchain technologies continues to increase at unprecedented rates, it is imperative to produce investigative toolkits and use cases to help reduce time spent trying to catch bad actors within the generally anonymous realm of cryptocurrencies.
自Covid-19大流行开始以来,区块链和加密货币的采用大幅增加。区块链技术的采用率已经超过了90年代和21世纪初的互联网采用率。随着这个行业的显着增长,加密诈骗的实例也在增加。存在许多加密货币骗局来利用用户。对加密货币如何运作的普遍有限的理解增加了骗局的可能数量,这依赖于人们错误的信任感和快速轻松赚钱的愿望。因此,投资诈骗也越来越受欢迎。Mirror Trading International (MTI)被评为2020年南非最大的加密骗局,造成17亿美元的损失。这也是据报道最大的国际加密投资骗局之一。本文侧重于MTI诈骗的一个具体方面;对从骗局中受益最多的犯罪者和成员在区块链上的资金流动进行分析。作者使用了各种开源智能(OSINT)工具,以及QLUE、新闻文章和区块链探索者。这些工具和技术用于跟踪区块链上的货币试验,以寻找犯罪者可能犯的错误。这可能包括一些个人信息可能已经泄露的情况。有了这些公开的个人信息,OSINT工具和调查技术就可以用来识别罪犯。由于MTI的首席执行官已被逮捕,案件目前正在南非法院处理,本文还提出了可以遵循的调查程序。因此,本文的重点是跟踪资金,从而为调查人员提供一个调查区块链上的加密犯罪和诈骗的流程。随着区块链技术的采用继续以前所未有的速度增长,有必要制作调查工具包和用例,以帮助减少在通常匿名的加密货币领域中捕捉坏人所花费的时间。
{"title":"An Analysis of the MTI Crypto Investment Scam: User Case","authors":"J. Botha, Thor Pederson, L. Leenen","doi":"10.34190/eccws.22.1.1441","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1441","url":null,"abstract":"Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this industry has grown significantly, so too has the instances of crypto scams. Numerous cryptocurrency scams exist to exploit users. The generally limited understanding of how cryptocurrencies operate has increased the possible number of scams, relying on people’s misplaced sense of trust and desire for making money quickly and easily. As such, investment scams have also been growing in popularity. Mirror Trading International (MTI) has been named South Africa’s biggest crypto scam in 2020, resulting in losses of $1.7 billion. It is also one of the largest reported international crypto investment scams. This paper focuses on a specific aspect of the MTI scam; an analysis on the fund movements on the blockchain from the perpetrators and members who benefited the most from the scam. The authors used various Open-Source Intelligence (OSINT) tools, alongside QLUE, as well as news articles and blockchain explorers. These tools and techniques are used to follow the money-trial on the blockchain, in search of possible mistakes made by the perpetrator. This could include instances where some personal information might have been leaked. With such disclosed personal information, OSINT tools and investigative techniques can be used to identify the criminals. Due to the CEO of MTI having been arrested, and the case currently being dealt with in the court of law in South Africa, this paper also presents investigative processes that could be followed. Thus, the focus of this paper is to follow the money and consequently propose a process for an investigator to investigate crypto crimes and scams on the blockchain. As the adoption of blockchain technologies continues to increase at unprecedented rates, it is imperative to produce investigative toolkits and use cases to help reduce time spent trying to catch bad actors within the generally anonymous realm of cryptocurrencies.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117223340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic Readiness Model for Internet Voting 互联网投票的数字取证准备模型
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1186
Edmore Muyambo, Stacey O Baror
Voting is an exercise of choosing a preferred candidate through a process called an election. In many countries, this exercise is a basic human right. In every election process, there are some pre-requisite processes and procedures which must be set up first. These are essential in the pre-vote-casting stage, during vote-casting and post-vote-casting stage. Electoral disagreements amongst stakeholders and parties of interest are usually experienced in each of the above-mentioned voting process stages. The main points of conflict in an election process are vote rigging and vote fraud. Failure to amicably mitigate these issues can result in a criticised/rejected election result. Therefore, this research aims to address the problem of vote rigging and vote fraud allegations in an election process. The resolution thereof is achieved through the introduction of an online based voting system which is supported by a digital forensic readiness mechanism. Online voting system gives citizens the flexibility to use internet-enabled devices such as cell phones and laptops to cast their votes in a safe, secrete and secure protocol. To address the problem of vote rigging and vote fraud, the online voting system is integrated with cyber security and vote protection mechanisms. The cyber security and vote protection mechanism is based on Blockchain algorithms. A Blockchain-based voting process is a peer-to-peer mechanism where a decentralised database is used to store data. Tokens move directly from one peer (voter) to another peer (candidate). The results are tallied by counting the number of tokens paid to each candidate. Each voter is allocated a Bitcoin token and each candidate is allocated a Bitcoin address. During vote casting, the voter transfers their Bitcoin token into the wallet of a registered candidate. At the end of the voting process, the total number of Bitcoin tokens transferred to each candidate is counted and tallied up. The wallet is loaded with only one Bitcoin token, hence there is no possibility of double voting. The model ensures vote security, anonymity, auditability, accountability, accuracy and uniqueness.
投票是通过一个被称为选举的过程来选择一个受欢迎的候选人。在许多国家,这是一项基本人权。在每一个选举过程中,都有一些必须首先建立的先决程序和程序。这些在投票前、投票中和投票后阶段都是必不可少的。在上述投票过程的每个阶段,通常都会遇到利益相关者和利益团体之间的选举分歧。选举过程中的主要冲突点是操纵选举和欺诈选举。如果不能友好地缓和这些问题,选举结果可能会受到批评或拒绝。因此,本研究旨在解决选举过程中操纵选票和投票欺诈指控的问题。该解决方案是通过引入基于在线的投票系统来实现的,该系统由数字取证准备机制支持。网上投票系统使公民能够灵活地使用手机和笔记本电脑等联网设备,以安全、保密和可靠的协议进行投票。为了解决操纵选票和欺诈投票的问题,在线投票系统与网络安全和投票保护机制相结合。网络安全和投票保护机制基于区块链算法。基于区块链的投票过程是一种点对点机制,其中使用分散的数据库来存储数据。令牌直接从一个对等点(选民)移动到另一个对等点(候选人)。通过计算支付给每位候选人的令牌数量来计算结果。每位选民分配一个比特币令牌,每位候选人分配一个比特币地址。在投票过程中,选民将他们的比特币转移到注册候选人的钱包中。在投票过程结束时,将对转移给每位候选人的比特币令牌总数进行统计。钱包只装载了一个比特币令牌,因此不存在双重投票的可能性。该模型保证了投票的安全性、匿名性、可审计性、可问责性、准确性和唯一性。
{"title":"Digital Forensic Readiness Model for Internet Voting","authors":"Edmore Muyambo, Stacey O Baror","doi":"10.34190/eccws.22.1.1186","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1186","url":null,"abstract":"Voting is an exercise of choosing a preferred candidate through a process called an election. In many countries, this exercise is a basic human right. In every election process, there are some pre-requisite processes and procedures which must be set up first. These are essential in the pre-vote-casting stage, during vote-casting and post-vote-casting stage. Electoral disagreements amongst stakeholders and parties of interest are usually experienced in each of the above-mentioned voting process stages. The main points of conflict in an election process are vote rigging and vote fraud. Failure to amicably mitigate these issues can result in a criticised/rejected election result. Therefore, this research aims to address the problem of vote rigging and vote fraud allegations in an election process. The resolution thereof is achieved through the introduction of an online based voting system which is supported by a digital forensic readiness mechanism. Online voting system gives citizens the flexibility to use internet-enabled devices such as cell phones and laptops to cast their votes in a safe, secrete and secure protocol. To address the problem of vote rigging and vote fraud, the online voting system is integrated with cyber security and vote protection mechanisms. The cyber security and vote protection mechanism is based on Blockchain algorithms. A Blockchain-based voting process is a peer-to-peer mechanism where a decentralised database is used to store data. Tokens move directly from one peer (voter) to another peer (candidate). The results are tallied by counting the number of tokens paid to each candidate. Each voter is allocated a Bitcoin token and each candidate is allocated a Bitcoin address. During vote casting, the voter transfers their Bitcoin token into the wallet of a registered candidate. At the end of the voting process, the total number of Bitcoin tokens transferred to each candidate is counted and tallied up. The wallet is loaded with only one Bitcoin token, hence there is no possibility of double voting. The model ensures vote security, anonymity, auditability, accountability, accuracy and uniqueness.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1