Military Cyber Affairs最新文献

筛选
英文 中文
Trouble on the High “C’s” – China, Cyber, and the Trading System 高“C”的麻烦——中国、网络和贸易系统
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1059
R. Fisher
{"title":"Trouble on the High “C’s” – China, Cyber, and the Trading System","authors":"R. Fisher","doi":"10.5038/2378-0789.3.2.1059","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1059","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130179551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Countering "Made in China 2025": Strategy for Western Powers in a Cybered World 对抗“中国制造2025”:西方大国在网络世界的战略
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1055
David Mussington
{"title":"Countering \"Made in China 2025\": Strategy for Western Powers in a Cybered World","authors":"David Mussington","doi":"10.5038/2378-0789.3.2.1055","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1055","url":null,"abstract":": Cyber capabilities have diffused disruptive potential to new actors and locations around the world. The engine for diffusion, however, is the economy, not politics. Interactions in trade, global product development systems and digital services spreads patterns of mutual dependence – and vulnerability – worldwide. Access to this global economy equates to participation in wealth creation and technological progress. Denial of access creates disadvantages and imposes costs. For nation-states, this environment is full of both risk and opportunity. Confronting a Chinese government strategy that targets Western economic advantages, the democracies face a series of questions: what is the best strategy for successful protection of assets and infrastructures of value? What should be done about authoritarian states that both participate in the cybered world, yet oppose the open, transparent and democratic norms of cyberspace’s originators?","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"76 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regaining the Technological Edge: Authoritarians, Democracies, IT Innovation’s Future 重获技术优势:专制、民主、信息技术创新的未来
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1057
A. Limbago, Virtru
{"title":"Regaining the Technological Edge: Authoritarians, Democracies, IT Innovation’s Future","authors":"A. Limbago, Virtru","doi":"10.5038/2378-0789.3.2.1057","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1057","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to MCA Issue, “Systemic Cyber Defense" MCA议题“系统网络防御”简介
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1053
C. Demchak
{"title":"Introduction to MCA Issue, “Systemic Cyber Defense\"","authors":"C. Demchak","doi":"10.5038/2378-0789.3.2.1053","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1053","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128825684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Financial Sector’s Vulnerabilities, Villains, and Options for Defense 金融部门的脆弱性、弊端和防御选择
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1062
J. Harvey
{"title":"The Financial Sector’s Vulnerabilities, Villains, and Options for Defense","authors":"J. Harvey","doi":"10.5038/2378-0789.3.2.1062","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1062","url":null,"abstract":"The consequences of cyber attacks on the financial sector go well beyond those suffered by the individuals and firms directly involved and may even lead to the destabilization of the system itself. The concern is all the greater given that banks and similar institutions play a much more critical role than most people realize and the nature of their operation already invites risk taking at the best of times. Bad actors hoping to sow chaos surely understand the trouble they could cause by targeting the financial underpinning of our economy. This paper will argue that while the cyber defense of the financial sector should be assigned a high priority, a wide net need not be cast since the greatest threat comes not from national actors but terrorist groups and the like. This suggests a very different strategy than one might adopt in defense of military assets or technology, an indirect approach that aims at disrupting bad actors’ ability to accumulate resources, design offensive tools, and reconnoiter for possible weaknesses. Their greatest challenge is in creating sufficient time and space to plan operations with any more significance than random vandalism and DDOS attacks. Our goal should be to deny them this. 1 Harvey, John T., “The Financial Sector’s Vulnerabilities, Villains, and Options for Defense,” in Demchak, Chris C. and Benjamin Schechter, eds. Military Cyber Affairs: Systemic Cyber Defense 3, no. 2 (2018). 2 Professor of Economics, Texas Christian University 1 Harvey: The Financial Sector’s Vulnerabilities, Villains, and Options Published by Scholar Commons, 2018 2 A great deal has been written about cyber security issues in the financial sector. Not only is this industry heavily dependent on the internet, but the potential rewards are very high. It is therefore not surprising to find that the bulk of cyber crime involves finance in one manner or another. Indeed, confirmed data losses in the financial industry outnumber those in the next closest competitor by more than three to one (Kopp, Kaffenberger, and Jenkinson 2017: 3). Annual costs are estimated to rise from $400 billion in 2014 to $6 trillion by 2021 (Boer and Vazquez 2017: 1). The consequences go well beyond those suffered by the individuals and firms directly involved and may even lead to the destabilization of the financial system itself. The concern is all the greater given that banks and similar institutions play a much more critical role than most people realize. Worse yet, the nature of their operation invites risk taking at the best of times. Bad actors hoping to sow chaos surely understand the trouble they could cause by targeting the financial underpinning of our economy. That said, the potential for retaliation and collateral damage is such that it rapidly limits the type of attackers we could reasonably expect. In general, globalization and interdependence mean that national powers would gain little by interrupting the flow of funding and commerce on which they rely as ","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Systemic Cyber Risks and Defense: Valuation, Innovation and Strategic Implications 系统性网络风险和防御:评估、创新和战略意义
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1060
P. Petratos
{"title":"Systemic Cyber Risks and Defense: Valuation, Innovation and Strategic Implications","authors":"P. Petratos","doi":"10.5038/2378-0789.3.2.1060","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1060","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike? 干涸的河流,可怕的陌生人:金融危机和网络危机一样吗?
Military Cyber Affairs Pub Date : 2018-12-01 DOI: 10.5038/2378-0789.3.2.1061
Claudia Biancotti, P. Ciocca, Consob
{"title":"Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?","authors":"Claudia Biancotti, P. Ciocca, Consob","doi":"10.5038/2378-0789.3.2.1061","DOIUrl":"https://doi.org/10.5038/2378-0789.3.2.1061","url":null,"abstract":"The internet and the financial system show crucial affinities: both are tightly interconnected global networks whose orderly functioning is a prerequisite for economic prosperity. In financial and cyber crises alike, vulnerabilities are a consequence of distorted economic incentives, contagion is fast, and the most serious risk is loss of trust. Lessons learned from financial meltdowns translate to the cybersecurity world: stability cannot be achieved until policies are in place to address all of these issues. Steps have been taken to rectify incentives, as exemplified by recent European Union legislation. Data that helps identify weak nodes are still scarce, notwithstanding recent efforts. The preservation of trust is the hardest challenge: in the financial system, a global governance framework was put in place to help maintain and rebuild confidence at critical junctions, but conflicting national interests make it difficult to establish a cyber equivalent. 1 Please cite as: Biancotti, Claudia and Paolo Ciocca, “Dry Rivers, Scary Strangers: Are Financial and Cyber Crises Alike?,” in Demchak, Chris C. and Benjamin Schechter, eds. Military Cyber Affairs: Systemic Cyber Defense 3, no. 2 (2018). 2 Senior Economist at the Bank of Italy, the Italian central bank. The views here expressed are those of the authors and should not be attributed to the Bank of Italy. 3 Commissioner at Consob, the Italian Securities and Exchange Commission. The views here expressed are those of the authors and should not be attributed to Consob. 1 Biancotti and Ciocca: Are Financial And Cyber Crises Alike? Published by Scholar Commons, 2018 2 Advanced economies are immersed in cyberspace. In 2016, 95 percent of businesses in OECD countries had a broadband internet connection; 77 percent had a web presence. More than half of the adult population had purchased a product or service online, compared to 36 per cent in 2010. As digitalization progresses, a growing share of production and consumption activities depend on connectivity. From an economist’s point of view, there are evident analogies between the internet and the global financial system: both are tightly interconnected networks that provide lifeblood to the real economy, via transfers of information and funding, respectively. Indeed, a financial crisis and a cyber crisis look alike in three key dimensions: (i) vulnerabilities accumulate because of excessive risk-taking on the part of some agents, which eventually translates to systemic risk on account of interdependencies; (ii) disruption can start at a single weak point and spread to the whole system in a matter of days or even hours; (iii) the ultimate casualty is trust: once it is lost, transactions – and the whole economy – can grind to a halt as counterparties disconnect from each other. Policy responses can be deployed to address these problems so that crises can be prevented or at least managed effectively. In the financial system, safeguards have been establish","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sticking to their Guns: The Missing RMA for Cybersecurity 坚持他们的枪:网络安全缺失的军事革命
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1039
Lior Tabansky
{"title":"Sticking to their Guns: The Missing RMA for Cybersecurity","authors":"Lior Tabansky","doi":"10.5038/2378-0789.3.1.1039","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1039","url":null,"abstract":": Why has cybered conflict disrupted the security of the most developed nations? A foreign adversary contemplating an attack on a developed nation's heartland certainly faces multiple state-run military-grade lines of defense on land, sea and air. A foreign adversary launching a direct cyber-attack on a non-military homeland target will meet none. Armed forces do not shield a society from cyber-attacks originated by foreign adversaries, no longer provide a buffer between the enemy and homeland, nor can they identify the attacker after an attack occurred. Adversaries succeed in waging cybered conflict against the U.S. and its allies. Having repeatedly inflicted economic and social harm while evading retaliation, adversaries become brazen. To prevail in cybered conflict, we need to return to the very foundations of our defense. However, profound defense adaptation is especially problematic for dominant militaries. To develop my argument, I turn to analyze a Stuxnet-like scenario using the Revolution in Military Affairs (RMA) concept of Security Studies and the paradigm shift concept of philosophy of science. Security Studies theory, philosophy of science and empirical evidence all suggest that profound defense adaptation demands pressure from outside the expert organization. I argue that Security Studies theory and empirical evidence, including Israel’s defense adaptation following short-range rocket threat, suggest that civilian outsiders coalescing with military partners can successfully drive defense adaptation. To secure the Western world order, the U.S. and its allies need to rearrange their security forces, leveraging the experience accumulated through centuries.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127403086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking 中国格言——没有一个接入点不被利用:中国电信BGP劫持的隐藏故事
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1050
C. Demchak, Y. Shavitt
{"title":"China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking","authors":"C. Demchak, Y. Shavitt","doi":"10.5038/2378-0789.3.1.1050","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1050","url":null,"abstract":"","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124327081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Three Futures for a Post-Western Cybered World 后西方网络世界的三个未来
Military Cyber Affairs Pub Date : 2018-06-01 DOI: 10.5038/2378-0789.3.1.1044
C. Demchak
{"title":"Three Futures for a Post-Western Cybered World","authors":"C. Demchak","doi":"10.5038/2378-0789.3.1.1044","DOIUrl":"https://doi.org/10.5038/2378-0789.3.1.1044","url":null,"abstract":": West faces a different security dilemma due to the shoddy cyberspace substrate it built and spread globally. Cyberspace created a new form of ‘cybered conflict’ with five advantages for offense previously – scale of organization, proximity, precision, deception and tools, and opaqueness in origins. It also accelerated massive wealth transfers to rising near peer and now peer adversaries, who were expected to simply fold into the western-built international system. In the process, the basic well-being of the economies of the consolidated civil society democracies have become non-kinetic fields of conflict among state and nonstate actors. The past twenty-five years of evolution of cyberspace have changes the currently likely futures of the democratic state and a rising post-western, authoritarian world. Today in the emerging cybered conflict world, there are three plausible and distinctive futures for the international system, as well as for the relative influence and well-being of the minority of states that today are civil society democracies. Two of the three offer relatively grim prospects over time, leading to a creeping enfeeblement as individually weak cyber powers in a state of modern digital subordination to a much larger, globally omnipresent, authoritarian cyber and economic hegemon. There is a possible third option: an operationalized structure for sharing cyber security and defense. This third future needs to be actively built as was the shoddy internet that has made it necessary. And it needs to be built now before the full consolidated development of the global Cyber Westphalian system.","PeriodicalId":345606,"journal":{"name":"Military Cyber Affairs","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信