R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon
{"title":"对国防和安全的网络威胁分类","authors":"R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon","doi":"10.1109/ICIC54025.2021.9632932","DOIUrl":null,"url":null,"abstract":"The pendulum of threats to national defense has shifted to the cyber realm. War no longer uses a conventional approach based on physical attacks but has shifted to a virtual activity in cyberspace. The occurrence of cyber wars between various countries shows how serious this phenomenon is in the modern age. This research focuses on studying various cross-border cyber-attacks that have occurred with the aim of categorizing them based on their common characteristics. The methodology used is a literature study of various case studies that occurred in the past. Approximately thirty publications containing case reports related to the main data in the study. The results show that there are nine types of cyber threat categories to state land and national security.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Taxonomy of Cyber Threats to National Defense and Security\",\"authors\":\"R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon\",\"doi\":\"10.1109/ICIC54025.2021.9632932\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The pendulum of threats to national defense has shifted to the cyber realm. War no longer uses a conventional approach based on physical attacks but has shifted to a virtual activity in cyberspace. The occurrence of cyber wars between various countries shows how serious this phenomenon is in the modern age. This research focuses on studying various cross-border cyber-attacks that have occurred with the aim of categorizing them based on their common characteristics. The methodology used is a literature study of various case studies that occurred in the past. Approximately thirty publications containing case reports related to the main data in the study. The results show that there are nine types of cyber threat categories to state land and national security.\",\"PeriodicalId\":189541,\"journal\":{\"name\":\"2021 Sixth International Conference on Informatics and Computing (ICIC)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Sixth International Conference on Informatics and Computing (ICIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIC54025.2021.9632932\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Sixth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC54025.2021.9632932","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Taxonomy of Cyber Threats to National Defense and Security
The pendulum of threats to national defense has shifted to the cyber realm. War no longer uses a conventional approach based on physical attacks but has shifted to a virtual activity in cyberspace. The occurrence of cyber wars between various countries shows how serious this phenomenon is in the modern age. This research focuses on studying various cross-border cyber-attacks that have occurred with the aim of categorizing them based on their common characteristics. The methodology used is a literature study of various case studies that occurred in the past. Approximately thirty publications containing case reports related to the main data in the study. The results show that there are nine types of cyber threat categories to state land and national security.