Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security

Jan Kallberg, B. Thuraisingham, Erik Lakomaa
{"title":"Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security","authors":"Jan Kallberg, B. Thuraisingham, Erik Lakomaa","doi":"10.1109/EISIC.2013.47","DOIUrl":null,"url":null,"abstract":"The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state. Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value. The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyber defense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the state. The paper presents a case to use societal cyber war theory to create a public sector cyber defense strategy beforehand facing a massive state actor initiated automated systematic cyber attacks to limit the risk for a societal system shock. Societal cyber war theory utilizes a theoretical framework created by political scientist Dwight Waldo for government stability, turns it upside down, and uses the theory to identify cyber targets and aim points. As a theory it can be used in cyber defense and offense as the institutional weaknesses can be either attacked or defended. According to societal cyber war theory the aim points to be targeted by an automated premeditated systematic attack that will cripple the targeted nation is the five pillars that upholds the state - legitimacy, authority, knowledge, control, and confidence. The failure to protect the institutional stability could undermine the state's ability to avoid submission to foreign power.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"85 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 European Intelligence and Security Informatics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC.2013.47","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state. Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value. The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyber defense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the state. The paper presents a case to use societal cyber war theory to create a public sector cyber defense strategy beforehand facing a massive state actor initiated automated systematic cyber attacks to limit the risk for a societal system shock. Societal cyber war theory utilizes a theoretical framework created by political scientist Dwight Waldo for government stability, turns it upside down, and uses the theory to identify cyber targets and aim points. As a theory it can be used in cyber defense and offense as the institutional weaknesses can be either attacked or defended. According to societal cyber war theory the aim points to be targeted by an automated premeditated systematic attack that will cripple the targeted nation is the five pillars that upholds the state - legitimacy, authority, knowledge, control, and confidence. The failure to protect the institutional stability could undermine the state's ability to avoid submission to foreign power.
社会网络战理论的应用:国家行为者侵略对公共部门信息安全的破坏性力量
现代福利国家面临着重大挑战,无法维持一场系统性的网络冲突,这种冲突旨在破坏目标国家的制度稳定。这些发达民主国家的网络防御是有限的、非结构化的,并且专注于具有边际地缘政治价值的零星网络交换。一旦发生冲突,政府活动的实际影响范围很可能微乎其微。因此,信息安全活动和导致网络防御努力的评估必须在国家内部进行战略上的事前协调。这种协调应该遵循一个确保机构稳定、公众信任和限制对国家挑战的框架。本文提出了一个案例,利用社会网络战理论,在面对大规模国家行为者发起的自动系统网络攻击之前,制定公共部门网络防御战略,以限制社会系统冲击的风险。社会网络战理论利用政治学家德怀特·沃尔多(Dwight Waldo)为政府稳定创造的理论框架,将其颠倒过来,并利用该理论识别网络目标和瞄准点。作为一种理论,它可以用于网络防御和进攻,因为制度弱点既可以攻击也可以防御。根据社会网络战理论,有预谋的自动系统攻击的目标是削弱目标国家的五大支柱——合法性、权威、知识、控制和信心。如果不能维护制度稳定,可能会削弱该国避免屈服于外国势力的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信