Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 241 - 250 of 350 references
2015 - Sarah Backman - Procon, Ltd.

this paper seeks to identify if the national cybersecurity centres appear to be successful

Civilian cybersecurity
2024 - Faheem Ahmed Shaikh, Mikko Siponen - Springer Science and Business Media LLC

IS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches influences subsequent investment decisions. Using firm-level data on 722 firms in the UK, we find that higher breach costs are more likely to elicit increases in cybersecurity investments. This relationship is further strengthened if a third party identifies the breach instead of the focal firm. We contribute to the literature on cybersecurity investments and incident response.

Civilian cybersecurity
2016 - Kieran Green, Tufts University - University of South Florida Libraries

over the past two decades, China has adopted a policy of augmenting its information warfare (IW) capabilities by leveraging the civilian sector (notably private institutions, academia, and civilian government institutions). This paper provides a broad survey of China’s cyber auxiliary capabilities and assesses how China uses its civilian economy as a “strategic reserve” in all four areas of the Information Domain.

Civilian cybersecurity
2021 - Stylianos Karagiannis, Luís Campos, Christoforos Ntantogian, Luís L. Ribeiro, Emmanouil Magkos - MDPI AG

In this paper, we present PocketCTF, an extensible and fully independent CTF platform, open to educators to run realistic virtual labs to host cybersecurity exercises in their classrooms. PocketCTF is based on containerization technologies to minimize the deployment effort and to utilize less system resources.

Civilian cybersecurity
2018 - Cedric Sabbah - IEEE

Over the last few years, the international community has devoted much attention to the topic of "international cyber norms". However, there appears to be a fundamental tension between these norm-development efforts and their real-world application as effective tools to reduce cyber risk and deter or prevent malicious state and non-state actors. Furthermore, in the current geopolitical climate, a broad agreement on global cyber norms seems improbable, as suggested by the lack of consensus in the course of the UN GGE 2017 process. In the meantime, government officials tasked with developing and deploying cybersecurity policy and law face day-to-day challenges and are operating on a different track. Questions continuously arise with respect to the role of the state in formulating cybersecurity standards, information sharing, active defense and privacy protection. These questions are dealt with mostly in the "civilian" cybersecurity sphere and are occurring largely under the radar of the global "international cyber norms" community. Against this backdrop, the paper suggests a shift in the approach to cyber norms. Its central thesis is that, at this juncture, rather than attempting to create a set of pre-defined aspirational norms aimed at achieving global stability, the international community should pay greater attention to discussions that are already occurring between cybersecurity regulators/authorities and should proactively support such discussions.

Civilian cybersecurity
2022 - Yuriy Danyk, Serhii Vdovenko, Serhii Voloshko - Research Institute for Intelligent Computer Systems

In hybrid conflicts of any intensity, hostilities (operations) are an element of other (non-force) actions mutually coordinated according to a single plan, mainly economic, political, diplomatic, informational, psychological, cyber, cognitive, etc. This creates destabilizing internal and external processes in the state that is the object of aggression (concern and discontent of the population, migration, acts of civil disobedience, etc.). The article examines the effective organizational and technical countermeasures against hybrid threats, national cyber defense systems in the developed countries. The article also presents the results of the investigations into the effects of the information hybrid threats through cyberspace on social, technical, socio and technical systems. The composition of the system of early efficient detection of the above hybrids is proposed. The results of the structural and parametric synthesis of the system are described. The recommendations related to the system implementation are given. A number of sufficient components for the effective design and development of the national cyber defense system of the state are proposed. © 2022. All Rights Reserved.

Cybersecurity and defense
2021 - Dennis Broeders - Oxford University Press (OUP)

Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands

Cybersecurity and defense
2009 - Forrest B Hare - Walter de Gruyter GmbH

The National Cyber Security Division (NCSD), under the US Department of Homeland Security oversees the nation-wide effort of securing and ensuring unimpeded use of the cyberspace domain. The NCSD hosts the Cyber Storm series of national cyber security exercises as an important component of the public-private cyber security partnership. This paper uses a case study approach to explore the motivations of private sector actors to contribute to the national cyber security regime by analyzing their participation in Cyber Storm II. This research tests the assumption that the private sector actors can be motivated to participate in the cooperative national security measures by empowering them to contribute to the development of the measures. It contains a literature review of cyber security challenges and current theories on self-regulation that are applicable to this partnership.

Civilian cybersecurity
2017 - proquest

The purpose of this capstone was research a proactive cybersecurity that used an active cyber defense and about the role of integrating proactive and active strategies into an organization’s enterprise. There is a need to establish cybersecurity techniques that effective in preventing organizations from losing billions of dollars in digital assets. Proactive active cyber defense requires a lot of planning and management involvement to transform an organization’s cybersecurity approach to into one that utilizes active cyber defense.

Cybersecurity and defense
2019 - Marco Roscini - Routledge

The proportionality calculation in a cyber operation that shuts down a dual-use power station, will have to factor in both the loss of the civilian function performed by the installation, with consequent negative repercussions on its civilian users, and the fact that the malware might infect other computer systems. Cyber operations present both opportunities and dangers for the principle of proportionality in attack.

Dual-use cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.