俄罗斯入侵乌克兰与国家网络安全战略:定量比较

Olesya Vinhas de Souza
{"title":"俄罗斯入侵乌克兰与国家网络安全战略:定量比较","authors":"Olesya Vinhas de Souza","doi":"10.60097/acig/190346","DOIUrl":null,"url":null,"abstract":"Shared understanding of the operational environment\nin the cyber domain is the key enabler of NATO’s cyber posture.\nHowever, there have been no attempts to evaluate empirically the\nimpact of the war in Ukraine on intra-Alliance coherence. This study\napplies a novel methodology based on computation text analysis\nto evaluate the trends within the recently adopted national cyber\nstrategies with regards to the description of threats, risks, and\nactors involved in carrying out these threats – in particular, Italy,\nLatvia, the United Kingdom, and the United States. The analysis\nshows that before the large-scale invasion, the congruence was low\nbetween the two continental European states vis-a-vis the UK and\nthe US on threat and risk assessment. After the invasion, these dif-\nferences became smaller and the language of the updated National\nCyber Security Strategies became more homogeneous as mea-\nsured by the cosine similarity scores. There are still differences in\nthe discussion of relevant actors in cyberspace. The methodology\napplied here can be extended to measure the cohesiveness of the\nAlliance’s cyber posture along other dimensions.","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":" 13","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Russia’s Invasion of Ukraine and National Cyber Security Strategies: Quantitative Compar-ison\",\"authors\":\"Olesya Vinhas de Souza\",\"doi\":\"10.60097/acig/190346\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Shared understanding of the operational environment\\nin the cyber domain is the key enabler of NATO’s cyber posture.\\nHowever, there have been no attempts to evaluate empirically the\\nimpact of the war in Ukraine on intra-Alliance coherence. This study\\napplies a novel methodology based on computation text analysis\\nto evaluate the trends within the recently adopted national cyber\\nstrategies with regards to the description of threats, risks, and\\nactors involved in carrying out these threats – in particular, Italy,\\nLatvia, the United Kingdom, and the United States. The analysis\\nshows that before the large-scale invasion, the congruence was low\\nbetween the two continental European states vis-a-vis the UK and\\nthe US on threat and risk assessment. After the invasion, these dif-\\nferences became smaller and the language of the updated National\\nCyber Security Strategies became more homogeneous as mea-\\nsured by the cosine similarity scores. There are still differences in\\nthe discussion of relevant actors in cyberspace. The methodology\\napplied here can be extended to measure the cohesiveness of the\\nAlliance’s cyber posture along other dimensions.\",\"PeriodicalId\":123092,\"journal\":{\"name\":\"Applied Cybersecurity & Internet Governance\",\"volume\":\" 13\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Applied Cybersecurity & Internet Governance\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.60097/acig/190346\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Cybersecurity & Internet Governance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.60097/acig/190346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

对网络领域作战环境的共同理解是北约网络态势的关键推动因素。然而,一直以来都没有尝试对乌克兰战争对联盟内部一致性的影响进行实证评估。本研究采用了一种基于计算文本分析的新方法,以评估最近通过的国家网络战略在描述威胁、风险和参与实施这些威胁的行动者方面的趋势,尤其是意大利、拉脱维亚、英国和美国。分析表明,在大规模入侵之前,欧洲大陆两个国家与英国和美国在威胁和风险评估方面的一致性较低。入侵发生后,这些差异变得越来越小,更新后的国家网络安全战略的措辞也变得更加一致,余弦相似度得分也证明了这一点。在讨论网络空间中的相关行为者时仍存在差异。这里应用的方法可扩展用于衡量联盟在其他方面的网络态势的凝聚力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Russia’s Invasion of Ukraine and National Cyber Security Strategies: Quantitative Compar-ison
Shared understanding of the operational environment in the cyber domain is the key enabler of NATO’s cyber posture. However, there have been no attempts to evaluate empirically the impact of the war in Ukraine on intra-Alliance coherence. This study applies a novel methodology based on computation text analysis to evaluate the trends within the recently adopted national cyber strategies with regards to the description of threats, risks, and actors involved in carrying out these threats – in particular, Italy, Latvia, the United Kingdom, and the United States. The analysis shows that before the large-scale invasion, the congruence was low between the two continental European states vis-a-vis the UK and the US on threat and risk assessment. After the invasion, these dif- ferences became smaller and the language of the updated National Cyber Security Strategies became more homogeneous as mea- sured by the cosine similarity scores. There are still differences in the discussion of relevant actors in cyberspace. The methodology applied here can be extended to measure the cohesiveness of the Alliance’s cyber posture along other dimensions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Assessing Power and Hierarchy in Cyberspace: An Approach of Power Transition Theory Introduction to Special Issue on The Russian-Ukrainian War: Effects on Global Cybersecurity and Digital Infrastructure Stronger together? EU Support for Ukrainian Local Authorities Facing Cyber Attacks (2022-2023) Post-Truth and Information Warfare in their Technological Context Investment in Cybersecurity Companies in Times of Political and Economic Instability
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1