Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 221 - 230 of 350 references
2017 - Marco Roscini - Springer International Publishing

This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks. It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War.

Dual-use cybersecurity
2018 - Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng - Institution of Engineering and Technology (IET)

In recent years, both academia and industry in cyber security have tried to develop innovative defense technologies, expecting that to change the rules of the game between attackers and defenders. The authors start by analysing the root causes of security problems in cyberspace: (i) vulnerabilities in cyber systems are universal; (ii) current cyber systems are static, predictable and monoculture which allows adversaries to plan and launch attacks effectively; (iii) existing techniques cannot detect and eliminates attacks employing unknown vulnerabilities. Based on their analysis, they develop a novel defense framework, mimic defense (MD), that employs ‘dynamic, heterogeneity, redundancy (DHR)’ mechanism to defense cyber attacks.

Cybersecurity and defense
2019 - TalTech

In term of operation based cyber-security exercise these teams include in general:
1. White team: A team that creates or generates a cyber-security exercise environment.
2. Red team: A team that attacks the cyber-security exercise environment.
3. Blue team: A team that defends the cyber-security exercise environment

Cybersecurity and defense
2023 - Siena Anstis, Niamh Leonard, Jonathon W. Penney - Elsevier BV

Yet, despite this emphatic recognition of the importance of transparency, the activities of government and private sector actors involved in the development, sale, and export of Offensive Cyber Capabilities (OCC) remain cloaked in secrecy regardless of the sector’s role in facilitating human rights abuses. In this article, we tackle this broader challenge of secrecy via a case study on the export of dual-use technologies. We theorize why secrecy has been so prevalent in the OCC sector. We consider the role of different forms of secrecy—such as commercial secrecy and opportunistic secrecy by governments—in facilitating this situation.

Dual-use cybersecurity
2018 - Masoud Khosravi-Farmad, Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi - IEEE

One of the main security concerns of enterprise-level organizations which provide network-based services is combating with complex cybersecurity attacks like advanced persistent threats (APTs). The main features of these attacks are being multilevel, multi-step, long-term and persistent. Also they use an intrusion kill chain (IKC) model to proceed the attack steps and reach their goals on targets. Traditional security solutions like firewalls and intrusion detection and prevention systems (IDPSs) are not able to prevent APT attack strategies and block them. Recently, deception techniques are proposed to defend network assets against malicious activities during IKC progression. One of the most promising approaches against APT attacks is Moving Target Defense (MTD). MTD techniques can be applied to attack steps of any abstraction levels in a networked infrastructure (application, host, and network) dynamically for disruption of successful execution of any on the fly IKCs.

Cybersecurity and defense
2019 - ethz

In 2018, Switzerland released its second national cybersecurity strategy. To put the Swiss approach into perspective, this CSS study compares the strategies, policies and governmental structures of Germany, Finland, France, Israel, Italy and the Netherland to highlight similarities and differences and to discuss the relevant challenges and further implications for Switzerland. The results show that, despite their national idiosyncrasies in terms of structures, all states underline the need for a holistic and integrated approach to cybersecurity focused on developing capabilities, awareness and education, while fostering international and public-private cooperation. In addition, they all face challenges that are inherently crosscutting, ranging from issues of policy integration and coordination to crisis management and legislative harmonization

Civilian cybersecurity
2022 - JSTOR

Cybersecurity has become as crucial as conventional security, thereby shifting the realm of the security environment. Rogue actors have
boosted their capabilities, and the costs of such resources owned by attackers are threatening security on both sides of the Atlantic. NATO must put forward recommendations and implement the securitization agenda in order to create an interconnected approach within different sectors. NATO will need to continue building the forcemultiplying functions of its cyber capabilities, improve effective command and decision-making structures in cyber crisis and conflicts, and enhance the interoperability between allies and partners in cyberspace. The security challenges of today require quick responses, necessitating flexible policy frameworks that allow for coercive reactions from networked actors.

Cybersecurity and defense
2014 - International Relations Council of Turkey

Westphalian state system has been deeply affected from the civilianization of the cyber space. It is possible to see the traces of nuclear war and its competition in this new post-Cold War period. The contemporary threats against the cyber space and their vague boundaries could clearly be seen in the examples. Cyber attacks in this new security environment towards long lasting alliance NATO and its members are giving important clues for the future. In this article, one discussed defensive measures of NATO for these new threats and the process, which determined the cyber security strategies. Upon this cyber defense strategy, NATO tries to level the cyber capabilities of its members and takes the necessary steps to achieve this goal. The Lisbon summit endorsed the preparation of a new strategy that includes cyber defense and protection of the critical information infrastructure.

Cybersecurity and defense
2025 - weforum

Cybersecurity faces rising challenges from advanced threats, geopolitical tensions, and technological complexities. The 2024 CrowdStrike glitch and shifting internet policies highlight the urgency of resilience, risk management, and global strategies. Here’s what experts say about the cybersecurity trends that will shape economies and societies in the near future.

Civilian cybersecurity
2022 - William Toledo, Sushil J Louis, Shamik Sengupta - IEEE

This Innovate Practice Full Paper presents a new game for cybersecurity learning. Cybersecurity education is critical to personal media consumption, privacy protection, and national infrastructure. We live in a world that is increasingly connected; the majority of people, particularly young people, engage with technology and social media for multiple hours per day, using the internet as a source of news, entertainment, and connection to the outside world. However, threats on the internet, including misinformation, disinformation, phishing, and multiple other cybersecurity threats grow each year. Because of this, cybersecurity is an essential skill for K-12 and all undergraduate students to learn in public schools. In this study, we asked K-12 teachers to analyze a specific game, NetDefense, designed to teach students basic cybersecurity concepts related to networking.

Cybersecurity and defense
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.