Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 291 - 300 of 350 references
2018 - Martin Schallbruch, Isabel Skierka - Springer International Publishing

This chapter traces the evolution of German cybersecurity strategy throughout the past two and a half decades. During this period, the German approach to cybersecurity strategy has developed from a civilian preventive one to a more comprehensive one, which today includes strategic military aspects. In following, this chapter illustrates the development of cybersecurity strategy in three phases. The first phase (1991 to 2011) marks the emergence of cybersecurity as a strategic issue in the context of critical information infrastructure protection. In the second phase (2011 to 2016), the government consolidated existing policies after adopting its first national cybersecurity strategy in 2011. The Snowden revelations in 2013 lifted cybersecurity sharply up the political agenda. In the third phase, from 2016 to early 2018, Germany adopted its second national cybersecurity strategy that outlines a comprehensive approach to cybersecurity, as well as a national defence strategy, which for the first time emphasised the strategic military dimension of cybersecurity within a hybrid warfare context.

Civilian cybersecurity
2022 - iaeme

Security Information and Event Management (SIEM) systems contribute immensely to maintaining a business’ cybersecurity posture. SIEM solutions gather and analyze huge amounts of data from different sources, including users, software, information sources, cloud workloads, endpoints, etc. within a business’s IT infrastructure. SIEM systems centralize and correlate the gathered information to provide comprehensive visibility into the business’ cybersecurity status. With the increasingly evolving cybersecurity world and dynamics of the threat landscape, the role played by security experts and security solutions to secure data systems is changing. With the growing complexity of threats, novel approaches are gaining prominence to counter the effects of cyber-attacks.

Cybersecurity and defense
2017 - proquest

The purpose of this capstone project was to identify how changes in federal cybersecurity policy affect businesses and organizations, both public and private. Additional emphasis was placed on how changes in federal cybersecurity policy affected the cybersecurity readiness of these organizations. This study focused on federal legislation, passed by congress and the executive branch, and how this legislation shaped cybersecurity policy through enforcement, regulation, and partnership. The literature examined included regulations that govern specific sectors as well as executive orders classifying industries and sectors as national critical infrastructures

Civilian cybersecurity
2018 - Jessica Dawson, Robert Thomson - Frontiers Media SA

This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.

Civilian cybersecurity
2024 - K&C Ltd, Liu Chunlin, Rohan Gunaratna, Nanyang University - UNISCI

The article focuses on the recent Israel-Hamas conflict and its implications for global stability and security. The article highlights how the threat is likely to evolve from a regional conflict in Middle East into a global conflict. The US, British and European support for Israel and increasing civilian death toll have sparked off endless debate. The world leaders should develop a far-reaching approach to countering the terrorist threats and protecting civilian rights. In addition, the article highlights the paramount importance of cybersecurity in responding to threats. © UNISCI, 2024.

Cybersecurity and defense
2016 - Edwin Vattapparamban, Ismail Guvenc, Ali I. Yurekli, Kemal Akkaya, Selcuk Uluagac - IEEE

Drones, while can be used for the betterment of the society, can also be used by malicious entities to conduct physical and cyber attacks, and threaten the society. The goal of this survey paper is to review various aspects of drones in future smart cities, relating to cybersecurity, privacy, and public safety. We will also provide representative results on cyber attacks using drones.

Civilian cybersecurity
2024 - Cornel University

This paper examines the dual-use challenges of foundation models and the consequent risks they pose for international security. As artificial intelligence (AI) models are increasingly tested and deployed across both civilian and military sectors, distinguishing between these uses becomes more complex, potentially leading to misunderstandings and unintended escalations among states. The broad capabilities of foundation models lower the cost of repurposing civilian models for military uses, making it difficult to discern another state's intentions behind developing and deploying these models. As military capabilities are increasingly augmented by AI, this discernment is crucial in evaluating the extent to which a state poses a military threat. Consequently, the ability to distinguish between military and civilian applications of these models is key to averting potential military escalations. T

Dual-use cybersecurity
2015 - Julie L. Marble, Ranjeev Mittu, W. F. Lawless, Joseph Coyne, Ciara Sibley, Myriam Abramson - Springer International Publishing

we review the pervasiveness of cyber threats and the roles of both attackers and cyber users (i.e. the targets of the attackers); the lack of awareness of cyber-threats by users; the complexity of the new cyber environment, including cyber risks; engineering approaches and tools to mitigate cyber threats; and current research to identify proactive steps that users and groups can take to reduce cyber-threats. In addition, we review the research needed on the psychology of users that poses risks to users from cyber-attacks. For the latter, we review the available theory at the individual and group levels that may help individual users, groups and organizations take actions against cyber threats. We end with future research needs and conclusions.

Civilian cybersecurity
2022 - Meraj Farheen Ansari, Bibhu Dash, Pawankumar Sharma, Nikhitha Yathiraju - Tejass Publishers

Artificial intelligence is opening up new avenues for value generation in enterprises, industries, communities, and society as a whole. Technology has been researched to be relevant in many aspects of the world. This factor has made it to be included mainly in different businesses and industries. The applications of AI are endless to discuss. The research below examines the applications of artificial intelligence (AI) in cybersecurity. Cybersecurity has also been a growing concept in the technological industry. Many companies have included information technology in their businesses. This factor has required companies and organizations to demand more security measures. The attempt to protect the available data and information has resulted in the growth of cybersecurity, and AI has been seen to influence cybersecurity heavily on a large scale. This factor has made machine learning to be significantly induced in recent technologies supporting cybersecurity. The research paper performs a literature review and examines the overall impacts of artificial intelligence on cybersecurity

Cybersecurity and defense
2014 - Jon R. Lindsay - MIT Press - Journals

Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative Chinese cyber threat, there are also considerable Chinese vulnerabilities and Western advantages. China has inadvertently degraded the economic efficiency of its networks and exposed them to foreign infiltration by prioritizing political information control over technical cyber defense. Although China also actively infiltrates foreign targets, its ability to absorb stolen data is questionable, especially at the most competitive end of the value chain, where the United States dominates. Similarly, China's military cyber capacity cannot live up to its aggressive doctrinal aspirations, even as its efforts to guide national information technology development create vulnerabilities that more experienced U.S. cyber operators can attack.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.