首页 > 最新文献

The Oxford Handbook of Cyber Security最新文献

英文 中文
Global Trade and Cybersecurity 全球贸易与网络安全
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.32
Franz-Stefan Gady, Greg Austin
Trade in information and communications technologies (ICTs) is a new currency of international power. On the one hand, this commerce boosts national prosperity and the global economy. On the other hand, it puts capabilities for harm into the hands of potential malicious actors or political adversaries. States are scrambling to introduce new security control mechanisms through a variety of laws, regulations, and policies. These practices will have mixed results, not least because some of the more threatening elements of the trade relate to software products and even the results of basic scientific research that cannot be tracked as easily as physical goods. Enforcement of trade restrictions in this area will remain problematic. Even so, states are looking to undertake economic sanctions in this area to retaliate for the malicious behaviour in cyberspace of other states (or of criminals operating with impunity from the territory of other states). The corporate sector has emerged as an independent actor in these interstate controversies, and they have been joined by scientists and civil society activists, all pressing for a more liberal and open approach. While the unilateralist trend seems to have the upper hand for now, common interests and the imperatives of trade may force new collaborative behaviours among states.
信息和通信技术(ict)贸易是一种新的国际权力货币。一方面,这种贸易促进了国家繁荣和全球经济。另一方面,它将造成伤害的能力交到潜在的恶意行为者或政治对手手中。各国正争先恐后地通过各种法律、法规和政策引入新的安全控制机制。这些做法将产生好坏参半的结果,尤其是因为贸易中一些更具威胁性的因素与软件产品有关,甚至与基础科学研究的结果有关,这些结果不像实物产品那样容易追踪。在这一领域执行贸易限制仍有问题。即便如此,各国仍在寻求在这一领域实施经济制裁,以报复其他国家(或在其他国家领土上逍遥法外的犯罪分子)在网络空间的恶意行为。在这些州际争议中,企业部门已经成为一个独立的参与者,科学家和民间社会活动家也加入了他们的行列,他们都迫切要求采取更自由、更开放的方式。虽然单边主义趋势目前似乎占了上风,但共同利益和贸易的必要性可能会迫使国家之间采取新的合作行为。
{"title":"Global Trade and Cybersecurity","authors":"Franz-Stefan Gady, Greg Austin","doi":"10.1093/oxfordhb/9780198800682.013.32","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.32","url":null,"abstract":"Trade in information and communications technologies (ICTs) is a new currency of international power. On the one hand, this commerce boosts national prosperity and the global economy. On the other hand, it puts capabilities for harm into the hands of potential malicious actors or political adversaries. States are scrambling to introduce new security control mechanisms through a variety of laws, regulations, and policies. These practices will have mixed results, not least because some of the more threatening elements of the trade relate to software products and even the results of basic scientific research that cannot be tracked as easily as physical goods. Enforcement of trade restrictions in this area will remain problematic. Even so, states are looking to undertake economic sanctions in this area to retaliate for the malicious behaviour in cyberspace of other states (or of criminals operating with impunity from the territory of other states). The corporate sector has emerged as an independent actor in these interstate controversies, and they have been joined by scientists and civil society activists, all pressing for a more liberal and open approach. While the unilateralist trend seems to have the upper hand for now, common interests and the imperatives of trade may force new collaborative behaviours among states.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Information Sharing 网络安全信息共享
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.55
Stuart Murdoch
This chapter considers the impact on cyber security of a shift from voluntary coordination to mandatory incident reporting. It traces the efforts to organize collaboration for cyber security incident response back to its voluntary beginnings with the establishment of CERT/CC by DARPA in response to the Morris Worm in 1988, via the establishment of ISACs then ISAOs under successive US presidents, to the CiSP in the UK following the London 2012 Olympics. Recognizing efforts to standardize and automate information sharing, the discussion touches on how information sharing has come to form the basis of national cyber strategies, forming a foundational element of internationally recognized maturity models for those strategies, and it goes on to consider the increasing move towards more mandatory incident reporting, especially in Critical National Infrastructure sectors across the globe, from the Defence Industrial Base in the United States to the NISD throughout the European Union. It considers the impact of mandating reporting on levels of collaboration overall, concluding that regulators must be careful not to create sector-specific silos or undermine existing levels of voluntary sharing through their enforcement of such mandatory schemes.
本章考虑从自愿协调到强制性事件报告的转变对网络安全的影响。它将组织网络安全事件响应合作的努力追溯到DARPA在1988年莫里斯蠕虫事件后自愿建立的CERT/CC,通过在历届美国总统领导下建立isac和ISAOs,到2012年伦敦奥运会后在英国建立的CiSP。认识到信息共享标准化和自动化的努力,讨论涉及信息共享如何形成国家网络战略的基础,形成国际公认的成熟度模型的基本要素,并继续考虑越来越多的强制性事件报告,特别是在全球关键的国家基础设施部门。从美国的国防工业基地到整个欧盟的NISD。它考虑了强制报告对整体合作水平的影响,得出的结论是,监管机构必须小心,不要通过执行此类强制性计划来创建特定行业的孤岛或破坏现有的自愿共享水平。
{"title":"Cybersecurity Information Sharing","authors":"Stuart Murdoch","doi":"10.1093/oxfordhb/9780198800682.013.55","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.55","url":null,"abstract":"This chapter considers the impact on cyber security of a shift from voluntary coordination to mandatory incident reporting. It traces the efforts to organize collaboration for cyber security incident response back to its voluntary beginnings with the establishment of CERT/CC by DARPA in response to the Morris Worm in 1988, via the establishment of ISACs then ISAOs under successive US presidents, to the CiSP in the UK following the London 2012 Olympics. Recognizing efforts to standardize and automate information sharing, the discussion touches on how information sharing has come to form the basis of national cyber strategies, forming a foundational element of internationally recognized maturity models for those strategies, and it goes on to consider the increasing move towards more mandatory incident reporting, especially in Critical National Infrastructure sectors across the globe, from the Defence Industrial Base in the United States to the NISD throughout the European Union. It considers the impact of mandating reporting on levels of collaboration overall, concluding that regulators must be careful not to create sector-specific silos or undermine existing levels of voluntary sharing through their enforcement of such mandatory schemes.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130465876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Deterrence and Prevention of Cyber Conflict 网络冲突的威慑和预防
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.16
P. Cornish
For all its apparent complexity, deterrence is built upon a relatively straightforward premise: that fear of adverse consequences can serve to prevent unacceptable behaviour. In traditional deterrence theory, particularly that which matured during the Cold War, prevention could be achieved both by fear of punishment and by fear of failure: by punitive measures that would be undertaken in response to a transgression and intended to inflict some pain, damage, or loss upon the transgressor; or by a denial posture intended to impress upon an adversary that the complexities of the defences will be technologically insurmountable and/or the costs of doing so unbearably high. Fresh thinking is required to make deterrence relevant to the cyber era. The challenges of cyber warfare are described here as the ‘four zeros’: ‘zero day’ vulnerability to novel malware; ‘zero source’ or non-attribution of an attack; ‘zero effect’ or covert, non-detectable attack; and ‘zero intent’ or lack of clarity as to an adversary’s intentions. These challenges can be met by allowing deterrence to function in different ways as circumstances allow or require: punitive, constructive, and protective deterrence.
尽管威慑看起来很复杂,但它建立在一个相对简单的前提之上:对不利后果的恐惧可以防止不可接受的行为。在传统的威慑理论中,特别是在冷战期间成熟的威慑理论中,预防可以通过害怕惩罚和害怕失败来实现:通过对违法行为作出反应而采取的惩罚性措施,旨在对违法者造成一些痛苦、损害或损失;或者采取一种拒绝的姿态,目的是让对手意识到,防御的复杂性在技术上是无法克服的,或者这样做的成本高得令人难以忍受。网络时代的威慑力需要新的思维。网络战的挑战在这里被描述为“四个零”:“零日”漏洞对新型恶意软件;“零源”或不归因攻击;“零效应”或隐蔽的、无法察觉的攻击;“零意图”或对对手的意图缺乏明确。这些挑战可以通过允许威慑在环境允许或需要的情况下以不同的方式发挥作用来应对:惩罚性威慑、建设性威慑和保护性威慑。
{"title":"The Deterrence and Prevention of Cyber Conflict","authors":"P. Cornish","doi":"10.1093/oxfordhb/9780198800682.013.16","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.16","url":null,"abstract":"For all its apparent complexity, deterrence is built upon a relatively straightforward premise: that fear of adverse consequences can serve to prevent unacceptable behaviour. In traditional deterrence theory, particularly that which matured during the Cold War, prevention could be achieved both by fear of punishment and by fear of failure: by punitive measures that would be undertaken in response to a transgression and intended to inflict some pain, damage, or loss upon the transgressor; or by a denial posture intended to impress upon an adversary that the complexities of the defences will be technologically insurmountable and/or the costs of doing so unbearably high. Fresh thinking is required to make deterrence relevant to the cyber era. The challenges of cyber warfare are described here as the ‘four zeros’: ‘zero day’ vulnerability to novel malware; ‘zero source’ or non-attribution of an attack; ‘zero effect’ or covert, non-detectable attack; and ‘zero intent’ or lack of clarity as to an adversary’s intentions. These challenges can be met by allowing deterrence to function in different ways as circumstances allow or require: punitive, constructive, and protective deterrence.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace 网络犯罪:网络空间中的小偷、骗子、强盗和私掠者
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.5
R. Broadhurst
This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software and other contraband such as illicit drugs, stolen credit cards and personal identification, firearms, and criminal services. Different cybercrime types and methods are described, including the widespread use of ‘social engineering’ or deception in computer misuse and identity theft. The challenges facing law enforcement in the suppression of cybercrime and the important role of private and public partnerships, as well as cross-national cooperation in the suppression of cybercrime is illustrated.
本章描述了网络犯罪的定义和范围,包括黑客的历史概述,以及犯罪网络和市场在传播恶意软件和其他违禁品(如非法毒品、被盗信用卡和个人身份证件、枪支和犯罪服务)方面的作用。书中描述了不同的网络犯罪类型和方法,包括广泛使用的“社会工程”或在计算机滥用和身份盗窃中的欺骗。报告说明了执法部门在打击网络犯罪方面面临的挑战,以及私营和公共伙伴关系以及跨国合作在打击网络犯罪方面的重要作用。
{"title":"Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace","authors":"R. Broadhurst","doi":"10.1093/oxfordhb/9780198800682.013.5","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.5","url":null,"abstract":"This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software and other contraband such as illicit drugs, stolen credit cards and personal identification, firearms, and criminal services. Different cybercrime types and methods are described, including the widespread use of ‘social engineering’ or deception in computer misuse and identity theft. The challenges facing law enforcement in the suppression of cybercrime and the important role of private and public partnerships, as well as cross-national cooperation in the suppression of cybercrime is illustrated.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Russian Federation’s Approach to Cybersecurity 俄罗斯联邦对网络安全的态度
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.44
Anton Shingarev, Anastasiya Kazakova
This chapter discusses the approach of the Russian Federation in the use of information and communication technologies (ICTs) in the context of international security and peace. After analysing the conceptual framework and definitions, as well as key distinguishing features in Russia’s approach, it gives an overview of Russia’s regulatory landscape and main legislative acts concerning cybersecurity and international security broadly. It also provides an analysis of Russian foreign policy on cybersecurity.
本章讨论了俄罗斯联邦在国际安全与和平背景下使用信息通信技术(ict)的做法。在分析了概念框架和定义,以及俄罗斯方法的主要特点之后,本文概述了俄罗斯在网络安全和国际安全方面的监管格局和主要立法行为。它还提供了对俄罗斯网络安全外交政策的分析。
{"title":"The Russian Federation’s Approach to Cybersecurity","authors":"Anton Shingarev, Anastasiya Kazakova","doi":"10.1093/oxfordhb/9780198800682.013.44","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.44","url":null,"abstract":"This chapter discusses the approach of the Russian Federation in the use of information and communication technologies (ICTs) in the context of international security and peace. After analysing the conceptual framework and definitions, as well as key distinguishing features in Russia’s approach, it gives an overview of Russia’s regulatory landscape and main legislative acts concerning cybersecurity and international security broadly. It also provides an analysis of Russian foreign policy on cybersecurity.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Law for Cyberspace 网络空间国际法
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.37
T. Wingfield, Harry Wingo
This chapter describes the role of international law in cyberspace and in addressing the legality of cyber-related actions taken by countries, companies, associations, and citizens on the world stage. Cyberspace has been described as a new ‘domain’ that is radically different from the land and sea upon which international law developed, but such law either covers or is evolving to cover issues that have been under development for hundreds of years. Such coverage includes the international law principles of sovereignty, due diligence, jurisdiction, and state responsibility. International law also covers numerous specialized regimes: human rights, diplomatic and consular law, law of the sea, air law, space law, and international telecommunications law. Another developing area of international law and cyberspace concerns international peace and security with respect to cyber activities, but those issues lead right up to the threshold of conflict. The once theoretical and purely academic literature of cybercrime, cyber espionage, and, especially, cyberwar must now be applied to real-world cases, and law and policy for the future of cybersecurity must be formulated with an understanding of these broadly accepted international norms.
本章描述了国际法在网络空间中的作用,以及在解决国家、公司、协会和公民在世界舞台上采取的与网络有关的行动的合法性方面的作用。网络空间被描述为一个新的“领域”,它与国际法赖以发展的陆地和海洋截然不同,但这种法律要么涵盖,要么正在演变,以涵盖已经发展了数百年的问题。这些内容包括主权、尽职调查、管辖权和国家责任等国际法原则。国际法还包括许多专门的制度:人权、外交和领事法、海洋法、航空法、空间法和国际电信法。国际法和网络空间的另一个发展领域涉及网络活动方面的国际和平与安全,但这些问题直接导致冲突。曾经关于网络犯罪、网络间谍,尤其是网络战争的理论和纯学术文献,现在必须应用于现实世界的案例,未来网络安全的法律和政策必须在理解这些被广泛接受的国际规范的基础上制定。
{"title":"International Law for Cyberspace","authors":"T. Wingfield, Harry Wingo","doi":"10.1093/oxfordhb/9780198800682.013.37","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.37","url":null,"abstract":"This chapter describes the role of international law in cyberspace and in addressing the legality of cyber-related actions taken by countries, companies, associations, and citizens on the world stage. Cyberspace has been described as a new ‘domain’ that is radically different from the land and sea upon which international law developed, but such law either covers or is evolving to cover issues that have been under development for hundreds of years. Such coverage includes the international law principles of sovereignty, due diligence, jurisdiction, and state responsibility. International law also covers numerous specialized regimes: human rights, diplomatic and consular law, law of the sea, air law, space law, and international telecommunications law. Another developing area of international law and cyberspace concerns international peace and security with respect to cyber activities, but those issues lead right up to the threshold of conflict. The once theoretical and purely academic literature of cybercrime, cyber espionage, and, especially, cyberwar must now be applied to real-world cases, and law and policy for the future of cybersecurity must be formulated with an understanding of these broadly accepted international norms.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intentions and Cyberterrorism 意图与网络恐怖主义
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.10
Florian J. Egloff
This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.
本章主要讨论意图和网络恐怖分子。在将网络恐怖主义定义为利用或威胁使用网络空间,通过破坏或破坏数字数据来实施暴力时,本章捕捉到了潜在的新奇行为。它强调了情报官员关于恐怖分子利用网络空间的意图的说法。然后,它会询问这在多大程度上符合恐怖分子动机和意图的文献,以及网络空间是否是实施恐怖袭击的有吸引力的手段。发现简单的成本效益分析并不支持将网络空间作为实施恐怖主义行为的手段,本章从评估的意图和能力两方面对变革的载体进行了询问。文章最后分析了一个符合网络恐怖定义的假想案例:一个受宗教启发的阿什利·麦迪逊(Ashley Madison)黑客事件。
{"title":"Intentions and Cyberterrorism","authors":"Florian J. Egloff","doi":"10.1093/oxfordhb/9780198800682.013.10","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.10","url":null,"abstract":"This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1048 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusion 结论
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.51
P. Cornish
Cyberspace offers immense benefits and opportunities as well as considerable threats and hazards. It is routinely exploited by a variety of adversaries, aggressors, and predators: hostile states; political extremists and terrorists; businesses practising commercial espionage and theft; individuals and criminal organizations undertaking financial fraud and trafficking in people, armaments, and narcotics; and individual so-called ‘nuisance’ hackers. The efficient and effective response to these threats and hazards is what cybersecurity is all about. The idea that cybersecurity could also have a larger, more comprehensive, and progressive goal might seem to some to be fanciful: an unrealistic and other-worldly response to the very real possibility of encountering substantial harm in and from cyberspace. Yet, the threat/response dynamic, compelling though it is, is surely not all there is to say about cybersecurity: it should be possible for cybersecurity to have a larger goal than the endless pursuit of (defensive) advantage over an adversary. If cyberspace can be valued as much as feared, then the broader purpose of cybersecurity could be not only to disable threats as they arise but also to enable the positive opportunities offered by the information revolution. Cybersecurity must also address the ordering (i.e. safety, security, and governance) of nothing less than a global digital ecosystem that is taking shape rapidly and beneficially, at every level and in every field of human activity. It is both possible and necessary to combine both perspectives—protection from and progress towards—in one account, as this Handbook of Cybersecurity has shown.
网络空间带来了巨大的利益和机遇,也带来了相当大的威胁和危害。它经常被各种各样的对手、侵略者和掠夺者利用:敌对国家;政治极端分子和恐怖分子;从事商业间谍、商业盗窃活动的;从事金融欺诈和贩运人口、武器和毒品的个人和犯罪组织;以及个别所谓的“讨厌”黑客。对这些威胁和危害的高效和有效的响应是网络安全的全部内容。网络安全也可以有一个更大、更全面、更进步的目标的想法,在一些人看来可能是异想天开:这是对在网络空间中遭受重大伤害的现实可能性的一种不切实际的、超凡脱俗的反应。然而,威胁/响应动态虽然引人注目,但肯定不是网络安全的全部内容:网络安全应该有一个更大的目标,而不是无休止地追求对手的(防御)优势。如果网络空间的价值能与恐惧一样大,那么网络安全的更广泛目的可能不仅是在威胁出现时消除威胁,而且还能使信息革命提供的积极机会成为可能。网络安全还必须解决全球数字生态系统的秩序问题(即安全、保障和治理),这个生态系统正在人类活动的各个层面和各个领域迅速形成,并从中受益。正如本《网络安全手册》所展示的那样,将保护和进步这两种观点结合在一起是可能的,也是必要的。
{"title":"Conclusion","authors":"P. Cornish","doi":"10.1093/oxfordhb/9780198800682.013.51","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.51","url":null,"abstract":"Cyberspace offers immense benefits and opportunities as well as considerable threats and hazards. It is routinely exploited by a variety of adversaries, aggressors, and predators: hostile states; political extremists and terrorists; businesses practising commercial espionage and theft; individuals and criminal organizations undertaking financial fraud and trafficking in people, armaments, and narcotics; and individual so-called ‘nuisance’ hackers. The efficient and effective response to these threats and hazards is what cybersecurity is all about. The idea that cybersecurity could also have a larger, more comprehensive, and progressive goal might seem to some to be fanciful: an unrealistic and other-worldly response to the very real possibility of encountering substantial harm in and from cyberspace. Yet, the threat/response dynamic, compelling though it is, is surely not all there is to say about cybersecurity: it should be possible for cybersecurity to have a larger goal than the endless pursuit of (defensive) advantage over an adversary. If cyberspace can be valued as much as feared, then the broader purpose of cybersecurity could be not only to disable threats as they arise but also to enable the positive opportunities offered by the information revolution. Cybersecurity must also address the ordering (i.e. safety, security, and governance) of nothing less than a global digital ecosystem that is taking shape rapidly and beneficially, at every level and in every field of human activity. It is both possible and necessary to combine both perspectives—protection from and progress towards—in one account, as this Handbook of Cybersecurity has shown.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opportunity, Threat, and Dependency in the Social Infosphere 社会信息圈中的机会、威胁和依赖
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.2
Greg Austin
The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.
前一章概述的技术革命引发了一场社会剧变。如果一套机器在全球和国家的社会秩序以及我们的个人生活中变得如此重要,这对我们的安全有何影响?请记住,我们只是在网络时代的黎明,未来会是什么样子?本章概述了信息革命对人类福利的深刻影响,无论是好是坏,从个人和社区层面到国家和国际层面。本章一开始就深入探讨了哲学家们是如何看待这些问题的。然后研究主要参与者如何应对机遇和威胁。本章最重要的主题是依赖问题,这可以说是信息时代最被忽视的安全方面。
{"title":"Opportunity, Threat, and Dependency in the Social Infosphere","authors":"Greg Austin","doi":"10.1093/oxfordhb/9780198800682.013.2","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.2","url":null,"abstract":"The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129867396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity, Global Commerce, and International Organizations 网络安全,全球商业和国际组织
Pub Date : 2021-11-04 DOI: 10.1093/oxfordhb/9780198800682.013.31
D. Fidler
As private-sector enterprises became dependent on Internet-enabled technologies, cybersecurity threats developed into serious problems in international political economy. This chapter analyses how states use international organizations to address these threats. The chapter explains why international organizations were not prominent in the Internet’s emergence and impact on transnational trade and investment. It examines the main threats companies face, including cybercrime, economic cyber espionage, government surveillance and hacking, innovation in digital technologies, and poor corporate cyber defences. International organizations have been most involved in fighting cybercrime, but these efforts have not been successful. International organizations do not play significant roles in countering other cybersecurity threats in global commerce. The chapter argues that international organizations are unlikely to become more important in the future because geopolitics and shifts in domestic politics in democracies will make collective action on cybersecurity in global commerce more difficult.
随着私营企业对互联网技术的依赖,网络安全威胁已成为国际政治经济中的严重问题。本章分析各国如何利用国际组织来应对这些威胁。这一章解释了为什么国际组织在互联网的出现和对跨国贸易和投资的影响中并不突出。报告研究了企业面临的主要威胁,包括网络犯罪、经济网络间谍活动、政府监控和黑客攻击、数字技术创新以及企业网络防御不力。国际组织一直是打击网络犯罪的主要力量,但这些努力并没有取得成功。国际组织在应对全球商业中的其他网络安全威胁方面没有发挥重要作用。本章认为,国际组织在未来不太可能变得更重要,因为地缘政治和民主国家国内政治的变化将使在全球商业网络安全方面采取集体行动变得更加困难。
{"title":"Cybersecurity, Global Commerce, and International Organizations","authors":"D. Fidler","doi":"10.1093/oxfordhb/9780198800682.013.31","DOIUrl":"https://doi.org/10.1093/oxfordhb/9780198800682.013.31","url":null,"abstract":"As private-sector enterprises became dependent on Internet-enabled technologies, cybersecurity threats developed into serious problems in international political economy. This chapter analyses how states use international organizations to address these threats. The chapter explains why international organizations were not prominent in the Internet’s emergence and impact on transnational trade and investment. It examines the main threats companies face, including cybercrime, economic cyber espionage, government surveillance and hacking, innovation in digital technologies, and poor corporate cyber defences. International organizations have been most involved in fighting cybercrime, but these efforts have not been successful. International organizations do not play significant roles in countering other cybersecurity threats in global commerce. The chapter argues that international organizations are unlikely to become more important in the future because geopolitics and shifts in domestic politics in democracies will make collective action on cybersecurity in global commerce more difficult.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Oxford Handbook of Cyber Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1