Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 191 - 200 of 350 references
2023 - Nori Katagiri - Informa UK Limited

I explore reasons why existing defense has failed to prevent cyber attacks on critical infrastructure. I study one of the least studied notions of cyberspace behavior known as target distinction. Drawn from customary international law, the principle posits that states should tell their wartime targets between combatants and noncombatants and use force only toward military objects. States should not target critical infrastructure, like gas pipelines, because to do so harms civilian populations who use it. I investigate four issues that keeps the principle from preventing attacks on critical infrastructure. The first is its inability to capture the networked nature of critical infrastructure beyond the simple dual-use (military and cyber) purposes. The second defect is the interpretive confusion that the principle generates over the rules of engagement. The third problem is the omission from its coverage of actors other than nation states. By design, the principle condones cyber attacks by nonstate actors on infrastructure, or by those whose linkage to state sponsors cannot be legally established. Finally, the principle is prone to fail when hackers lack proper understanding of what it does and does not allow. © 2023 Informa UK Limited, trading as Taylor & Francis Group.

Cybersecurity and defense
2020 - Jeff Tully, Jordan Selzer, James P. Phillips, Patrick O'Connor, Christian Dameff - Mary Ann Liebert Inc

As a result of the extensive integration of technology into the healthcare system, cybersecurity incidents have become an increasing challenge for the healthcare industry. Recent examples include WannaCry, a nontargeted ransomware attack on more than 150 countries worldwide that temporarily crippled parts of the National Health Service in the United Kingdom, and the 2016 ransomware attack on Los Angeles's Hollywood Presbyterian Medical Center. The attacks cost millions of dollars in lost revenue and fines, as well as significant reputational damage. Efforts are needed to devise tools that allow experts to more accurately quantify the actual impact of such events on both individual patients and healthcare systems as a whole. While the United States has robust disaster preparedness and response systems integrated throughout the healthcare and government sectors, the rapidly evolving cybersecurity threat against healthcare entities is outpacing existing countermeasures and challenges in the "all-hazards" disaster preparedness paradigm. Further epidemiologic research of clinical cybersecurity attacks and their effects on patient care and clinical outcomes is necessary to prevent and mitigate future attacks. © Copyright 2020, Mary Ann Liebert, Inc., publishers.

2021 - Academic Conferences International Ltd

This research seeks to provide new a better understanding of OCO and their impact on civilian organizations. To highlight this domain, the case of the threat actor Advanced Persistent Threat 1 (APT1) is presented, and its impact on three civilian organizations discussed. Semi-structured interviews were used to research how the threats from OCO and state-sponsored actors are perceived by civilian organizations. First, a computational literature review was used to get an overview of related work and establish question themes. Next, the question themes were used to develop questions for the interview guide, followed by separate interviews with five security professionals working in civilian organizations. The interviews were analysed using thematic coding and the identified themes summarized as the result of this research.

Civilian cybersecurity
2023 - Douglas W. Hubbard, Richard Seiersen - Wiley

why cybersecurity needs better measurement for risks, evolving the model of cybersecurtity risk

Cybersecurity and defense
2023 - NATO

Emerging scientific frontiers in genome editing and brain - computer interfaces (BCIs) promise unparalleled advancements in human health and cognitive capacities. Genome editing, with its potential to modify genetic sequences, might one day enhance traits including cognitive function. Concurrently, BCIs, enabling direct brain-device interplay, present prospects in cognitive enhancement such as amplified memory or learning rates. Yet, as the horizons of these technologies expand, so too do the ethical quagmires, chiefly, the dual-use dilemma in cognitive warfare. There is potential for these technologies to uplift society, offering enhanced cognitive abilities and a new echelon of human capability.

Dual-use cybersecurity
2019 - C. Krasznay, B. P. Hámornik - University of Defence

In this paper, we introduce some ways of how cybersecurity incidents are managed in the military environment; in addition, we describe the main requirements towards humans in milCERTs and how these requirements differentiate from civilian CERTs. Further on, we highlight the institutional background of Hungary’s cybersecurity training, specifically underlining the role of National University of Public Service in it, which is responsible for the education of all public servants, including cadets. The paper also focuses on the major challenges and some suggestions from Academia how to respond to them by building successful teams for the protection of national cyberspace.

Civilian cybersecurity
2021 - Tashfiq Rahman, Prasert Kanthamanon, Rohani Rohan, Debajyoti Pal - ACM

Humans are often considered to be the weakest link in the cybersecurity chain. However, traditionally the Computer Science (CS) researchers have investigated the technical aspects of cybersecurity, focusing on the encryption and network security mechanisms. The human aspect although very important is often neglected. In this work we carry out a scoping review to investigate the take of the CS community on the human-centric cybersecurity paradigm by considering the top conferences on network and computer security for the past six years.

Civilian cybersecurity
2020 - Marian Merritt - National Institute of Standards and Technology

Recommendations from the workshop discussion included concrete suggestions both for the military and for the private sector to do more to streamline a warfighter’s experience from before entering the service all the way through to transitioning to a new civilian cybersecurity
career.

Civilian cybersecurity
2020 - fordham

This project investigates civilians’ vulnerabilities through four
cyber-attacks: (1) the Anthem health insurer cyber-attack in the United States, (2) WannaCry ransomware on the National Health Service in the United Kingdom, (3) the Jasmine Revolution cyber-attacks in Tunisia, and (4) the 2010 Natanz uranium enrichment facility cyber-attacks in
Iran.

Civilian cybersecurity
2017 - K.P. Vijayalakshmi - SAGE Publications

India–US relationship oscillated unevenly due to the politics of the Cold War. Post-Cold War, both countries have taken gradual, positive steps towards each other. While President Bill Clinton established a tilt towards India during his second term, George Bush ushered a transformational shift in the relationship that led to the Next Steps in Strategic Partnership and eventually to the path-breaking Civil Nuclear Cooperation Agreement. Since then relations have been steadily improving with the Obama presidency moving in the same direction. The joint incentives for New Delhi and Washington have ranged from counterterrorism, defence cooperation, cyber security, trade and economics, agriculture, education and science and technology cooperation. Apart from the interest of mutual gains, the relationship was further influenced by the enormous geopolitical changes unfolding in the region. The mutual concern over the ‘peaceful rise’ of China followed by its aggressive foreign policy and active military presence especially in the India Ocean region has created fresh opportunities to both. However, irrespective of the strategic potential of the relationship and the strong political will at both ends, Indo-US ties have their own share of irritants in several spheres. Recognizing the complex narrative of converging and diverging interests functioning under the ambit of strategic partnership, this article examines the constraints and imperatives, and the main determinants that drive the relationship in the post-9/11 era. Various triggers and catalysts in US’ internal policy process apart from the geopolitical factors that led to the growing engagement with India are examined. © 2018 Jawaharlal Nehru University.

Cybersecurity and defense
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.