Query Result Set
Skip Navigation Links
   ActiveUsers:1551Hits:18335115Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER SECURITY (184) answer(s).
 
12345678910Next
SrlItem
1
ID:   119953


Analogical reasoning and cyber security / Betz, David J; Stevens, Tim   Journal Article
Betz, David J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract This article is an attempt to interrogate some of the predominant forms of analogical reasoning within current cyber-security discourse, with a view to clarifying their unstated premises, major strengths and, vitally, points of conceptual failure. It seeks to improve dialogue between and across the various epistemic communities involved with cyber-security policy. As we seek to adapt to the new security realities of the information age, it is incumbent upon scholars and strategists to address the benefits of connectivity, in all its dimensions, as much as the threats it presents. Current cyber-security discourse channels us into a winner-takes-all modality that is neither desirable nor necessary in the current strategic reality.
Key Words Violence  Security  International Security  Cyber Security  Cyberspace  Cyberwar 
Six Day War 
        Export Export
2
ID:   164632


Arms race “in cyberspace” – A case study of Iran and Israel / Netolická, Veronika   Journal Article
Netolická, Veronika Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The article focuses on the area of cyber security, specifically on the theory of arms race in cyberspace, which is applied to case study of Iran and Israel. The first part describes the evolution of arms race in conventional environment with link to cyberspace. In the second part, the article focuses on description of selected indicators that prove/disprove the arms race in cyberspace in the relationship between selected dyad. In conclusion, the summary presents not only the selected states but also debates the overall usability of the concept of arms race in cyberspace in its general use for further research.
        Export Export
3
ID:   140494


Asian defence review 2014-2015 / Patney, Vinod (ed.) 2015  Book
Patney, Vinod (ed.) Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, KW Publishers Pvt Ltd, 2015.
Description vii, 240p.hbk
Standard Number 9789383649648
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058273355.03305/PAT 058273MainOn ShelfGeneral 
4
ID:   142909


Assessing India’s cyber resilience: institutional stability matters / Kallberg, Jan   Article
Kallberg, Jan Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In this commentary, I will use strategic cyberwar theory1 to explain why India has a higher level of cyber resilience than several of its potential adversaries. Even if India has challenges in its government-led cyber defence,2 there are cyber resilience benefits to be drawn from the way Indian society operates, functions and is constitutionally designed and accepted by its constituents, independently of any cyber defence efforts. First, the concept of strategic cyberwar. A strategic cyberwar is a major conflict relying on heavy utilisation of digital means, a form of conflict that we have not yet seen but that is likely to be a potential threat a few decades into the future. Even if technological breakthroughs, adaptations and software development are accelerating at an increasingly high rate, the delay is not a technical issue. Technical evolutions in the software and services sphere are single lines of development. The complexity of cyber war increases with the time factor when cyber conflicts are likely thought at computational speeds. This require an acceptance of cyber as a form of war by itself because it operates in a battle space untangled from other forms of war fighting. Therefore, cyber cannot be seen as only an enabler in traditional defence.
        Export Export
5
ID:   130048


Astropolitics and the "exopolitics" of unacknowledged activitie / Salla, Michael E   Journal Article
Salla, Michael E Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The role of unacknowledged classified programs remains an enigma for fully understanding activities in space and the study of astropolitics. Classified programs by law are not publicly announced, and remain inaccessible to all except those with valid security clearances to be briefed about them. In the United States, waived Unacknowledged Special Access Programs are the most highly classified programs conducted by the military and intelligence community. The same classification protocols are also required of private contractors working with U.S. military departments and intelligence agencies on classified programs. As space continues to grow in its national security significance, the number of these unacknowledged programs pertaining to space is likely to grow significantly from its current number. This requires adopting the necessary conceptual tools and methodological flexibility for investigating unacknowledged activities in space. This also extends to evidence concerning unidentified flying objects and extraterrestrial life. This article suggests that "exopolitics" is a unique multidisciplinary approach to extraterrestrial life that offers a helpful set of conceptual tools for studying unacknowledged space activities, and complements the field of astropolitics.
        Export Export
6
ID:   137241


Attributing cyber attacks / Rid, Thomas; Buchanan, Ben   Article
Rid, Thomas Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
        Export Export
7
ID:   156959


Autonomous weapon systems and strategic stability / Altmann, Jürgen ; Sauer, Frank   Journal Article
Sauer, Frank Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Autonomous weapon systems are prone to proliferation, and are likely to lead to increased crisis instability and escalation risks.
        Export Export
8
ID:   190905


Better angels of our digital nature? offensive cyber capabilities and state violence / Egloff, Florian J; Shires, James   Journal Article
Egloff, Florian J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Transformations in state violence are intimately associated with technological capacity. Like previous era-defining technologies, global digital networks have changed state violence. Offensive cyber capabilities (OCCs) appear to constitute a major technological development that offers the potential for reducing state violence. This article asks: are OCCs really the better angels of our digital nature? Current scholarship in strategic studies, adopting a narrow definition of violence, conceives of OCCs as largely non-violent. This ignores how technology has given rise to new forms of harm to individuals and communities, particularly in the context of violent state repression. We propose using an expanded definition of violence, including affective and community harms, and argue that OCCs relocate, rather than reduce, state violence towards non-bodily harms. Even though their lethal effects are limited, OCCs are not, as is supposed, a non-violent addition to state arsenals. This conclusion has important implications for international affairs, including re-orienting defensive cybersecurity efforts and altering calculations around the perception of OCCs by adversaries.
        Export Export
9
ID:   188865


Bilateral Cyber Confidence Building Measures in Northeast Asia / Yoo, In Tae   Journal Article
Yoo, In Tae Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Under what conditions do countries form confidence building measures (CBMs) in the cyber domain? How do those conditions affect the frequency and type of cyber CBMs (CCBMs)? The extant literature surveys existing CCBMs, providing fragmented pictures of them at either the global, regional, or bilateral levels. Thus, there is a lack of systematically comparative perspectives between multiple efforts for states’ cyber confidence–building. This deficiency implies that little to no research has been dedicated to analytical examinations of the development of CCBMs. The present article offers a framework to assess the development and theoretical arguments to understand its underlying causes. It argues that the willingness of political leaders affected by the international strategic–security context is a necessary condition, in addition to the cost-benefit calculation of policymakers, affecting the frequency and type of CCBMs. To examine the arguments, the present article overviews the global development of the discussion of CCBMs at the UNGGE and OEWG. Then it presents the networks of CCBMs in Northeast Asia where the staunchest alliances as well as fierce strategic–security competitions have taken hold in the emergence of the new cyber domain. Lastly, the article investigates the processes of bilateral CCBMs formation in three dyads between the United States and each of three states, namely, Russia, China, and Japan. The empirical findings support the theoretical arguments
        Export Export
10
ID:   149004


Biometrics in cyber security / Kour, Jaspreet ; Hanmandlu, M; Ansari, A Q   Journal Article
Jaspreet Kour, M. Hanmandlu, A.Q. Ansari Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM.
        Export Export
11
ID:   127600


Brazilian soft power tradition / Saraiva, Miriam Gomes   Journal Article
Saraiva, Miriam Gomes Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Over the past decade, amid growing international fragmentation and declining US hegemony, Brazil has assertively expanded its participation in multilateral forums as part of a diplomatic strategy that envisions a reformulation of international institutions. At the same time, Brazil has also worked on building a leadership role within South America. These global and regional aims continue to shape the country's use of soft power. Indeed, soft power-defined by the political scientist Joseph S. Nye Jr. as influencing the behavior of others via attraction or persuasion rather than coercion or payment-is nothing new in Brazil's international dealings. Since the early 1900s, the nation has used such a strategy under different labels in conjunction with two beliefs central to its foreign policy: the need to build and assure Brazil's autonomy in its development strategy and foreign policy choices, and the desire to raise its global political profile
        Export Export
12
ID:   168005


Brexit and Cyber Security / Stevens, Tim; O'Brien, Kevin   Journal Article
O'Brien, Kevin Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Brexit is likely to have an effect on UK–EU cyber security cooperation. While there are ongoing reasons to be positive about the state of UK–EU cyber security, Tim Stevens and Kevin O’Brien show how Brexit will have negative impacts on cybercrime policing and cyber threat intelligence sharing, particularly in a ‘no-deal’ scenario, and argue that the absence of a negotiated settlement will damage the cyber security of the UK and the EU.
Key Words Cyber Security  Brexit 
        Export Export
13
ID:   132128


Case for net neutrality: what's wrong with Obama's internal policy / Ammori, Marvin   Journal Article
Ammori, Marvin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract For all the withering criticism leveled at the White House for its botched rollout of HealthCare.gov, that debacle is not the biggest technology-related failure of Barack Obama's presidency. That inauspicious distinction belongs to his administration's incompetence in another area: reneging on Obama's signature pledge to ensure "net neutrality," the straightforward but powerful idea that Internet service providers (ISPs) should treat all traffic that goes through their networks the same. Net neutrality holds that ISPs shouldn't offer preferential treatment to some websites over others or charge some companies arbitrary fees to reach users. By this logic, AT&T, for example, shouldn't be allowed to grant iTunes Radio a special "fast lane" for its data while forcing Spotify to make do with choppier service.
        Export Export
14
ID:   137234


CBMs for cyberspace beyond the traditional security environment: focusing on features for CBMs for cyberspace in Northeast Asia / Geun-hye, Kim; Kyung-bok, Lee ; Jong-in, Lim   Article
Geun-hye, Kim Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper aims to analyze confidence-building measures (CBMs) for cyberspace taking place in Northeast Asia. Accordingly, it explores features of cyber security in the Northeast Asian region and concepts of CBMs for cyberspace. Then, it studies networks of CBMs for cyberspace that took place on the government level in the region from 2009 through the first half of 2014 by using the network analysis method, which is useful for studying current social relations. This study analyzes the structure of CBMs networks used in the region for the past six years and the actors. Conclusions of this study are as follows: First, CBMs for cyberspace in Northeast Asia are focused on the United States. Second, the CBMs in the region have similar features to those of traditional security cooperation. Thirdly, they are strongly based on realism. From the perspective of networks, this study is meaningful in that it used a macro approach to analyze CBMs, which was difficult to perform by using conventional methods.
        Export Export
15
ID:   140311


Challenges and prospects of cyber security in the Indian context / Kohli, Nitin Kumar   Article
Kohli, Nitin Kumar Article
0 Rating(s) & 0 Review(s)
        Export Export
16
ID:   146558


Challenges of cyber security to nuclear infrastructure / Dilipraj, E   Journal Article
Dilipraj, E Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
17
ID:   105460


China’s cyber warfare capability and India’s concerns / Sharma, Deepak   Journal Article
Sharma, Deepak Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract The Chinese cyber warfare department's multiple agencies and individuals are seriously working towards the overall objective of instantly disrupting or at least weakening the adversary's computer networks so as to paralyse his decision making capability at the very commencement of hostilities. It is very difficult to protect networks from such attacks. The weakest link in cyber security measures are the persons operating the system who often, knowingly or unknowingly, default on cyber security measures. It is possible for defence to have an exclusive secure network with air gap from civil and public networks which ensures that the adversary is not allowed to even access its periphery.
Key Words Cyber Security  China  India  Chinese Cyber Warfare 
        Export Export
18
ID:   145002


China's cyber power / Inkster, Nigel 2016  Book
Inkster, Nigel Book
0 Rating(s) & 0 Review(s)
Publication London, IISS, 2016.
Description 155p.pbk
Series Adelphi Series; no. 456
Standard Number 9781138211162
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058653303.48830951/INK 058653MainOn ShelfGeneral 
058755303.48830951/INK 058755MainOn ShelfGeneral 
19
ID:   142454


China's cyber security policy : an organisational assessment / Sharma, M K   Article
Sharma, M K Article
0 Rating(s) & 0 Review(s)
        Export Export
20
ID:   170611


Combining cyber with air force operations / Rai, Ramesh   Journal Article
Rai, Ramesh Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
12345678910Next