11,747 research outputs found

    A Comparative Study on Cybersecurity Act Implemented in the United States and China

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œ์ง€์—ญํ•™์ „๊ณต), 2020. 8. ์‹ ์„ฑํ˜ธ.The past decade in cyberspace witnessed state-mediated attack in pursuance of accomplishing ones political end. Once limited to opportunistic private criminal groups, the concept of cyberattack transformed into a countrys important means to bolster national security and further propagate national stance in cyberspace. Henceforth, cyberspace emerges as compelling security realm. When compared to traditional security environment, judging the situation is convoluted on account of the unique characteristics of cyberspace. Under the amorphous nature of cyberspace, if anything, nations become more nationalized. The nature of cyber realm characterized by innate openness and hyper-connectivity will trigger structural change in cybersecurity landscape. Thus the thesis argues that although nations will actively interact and engage in collective initiatives fueled by the rising voice of forming global governance for cybersecurity, the overriding state sovereignty in the end would breed discord in the cyber era. Every move in cyberspace rests upon a nations political end thereby taking account of geopolitical interests assumes greater importance since invisible borderline matters. Given the nations inclination to utilize cyber capabilities for political ends, what happens in conventional security realm can also occur in cyberspace. The thesis chooses the US and China, allegedly Group of Two (G2), to study how both country take governmental measures vis-ร -vis cybersecurity. Two great powers, with no doubt, are the pioneers in this emerging security realm. Not only both actively engage in building up cyber capabilities but also actively engage in appealing for cooperation to its allies. By conducting a comparative study on Cybersecurity Act of 2015 in the US and Cybersecurity Law of the PRC in 2016, the thesis aims to demonstrate how G2 implement legal regulation to safeguard domestic information infrastructure amidst the rising cyber threats posed by both state and non-state actors. In doing so, the thesis will research how respective country exerts its national interests in cyberspace while cooperate with other countries to defend global security. The thesis will add a new dimension on current cybersecurity studies by filling the gaps in previous literature. The thesis will contribute in understanding Sino-US relation regarding hegemonic competition in cyberspace and further propose the prospects of nations in the cyber era.์ง€๋‚œ ์‹ญ ๋…„์˜ ์‚ฌ์ด๋ฒ„ํ™˜๊ฒฝ์€ ์ •์น˜์  ๋ชฉ์ ์„ ์ด๋ฃจ๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ์œผ๋กœ์จ ๊ตญ๊ฐ€ ์ฃผ๋„์˜ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ์ฃผ๋ฅผ ์ด๋ฃฌ๋‹ค. ํ•œ๋•Œ ๊ธฐํšŒ์ฃผ์˜์  ๋ฒ”์ฃ„์ง‘๋‹จ์— ๊ตญํ•œ๋œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์€ ์ด์ œ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ, ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ์˜ ์ •์น˜์  ์„ ์ „์˜ ์ค‘์š”ํ•œ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉ๋œ๋‹ค. ์ด์— ๋”ฐ๋ผ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์€ ๊ทธ ๊ท€์ถ”๊ฐ€ ์ฃผ๋ชฉ๋˜๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์œผ๋กœ ๊ธ‰๋ถ€์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์ „ํ†ต์  ์•ˆ๋ณด ์˜์—ญ๊ณผ ๋น„๊ตํ–ˆ์„ ๋•Œ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ๋…ํŠนํ•œ ํŠน์„ฑ์œผ๋กœ ๋ง๋ฏธ์•”์•„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ์„ ๊ฐ€๋Š ํ•˜๋Š” ๊ฒƒ์€ ํ›จ์”ฌ ๋ณต์žกํ•˜๋‹ค. ๊ฐœ๋ฐฉ์„ฑ๊ณผ ์ดˆ์—ฐ๊ฒฐ์„ฑ์œผ๋กœ ํŠน์ง•๋˜๋Š” ๋ฌด์ •ํ˜•์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ ์—ญ์„ค์ ์ด๊ฒŒ๋„ ๊ตญ๊ฐ€๋Š” ๋”์šฑ ๊ตญ๊ฐ€์ฃผ์˜์ ์ธ ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ์•ˆ์ „ํ•œ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ ์ˆ˜๋ฆฝ์„ ์œ„ํ•ด ๊ธ€๋กœ๋ฒŒ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ตฌ์ถ•์˜ ํ•„์š”์„ฑ์— ๋”ํ•ด ๊ฐ ๊ตญ๊ฐ€๋“ค์ด ๊ณต๋™์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์œ„ํ•ด ํ˜‘๋ ฅํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋” ์šฐ์„ ์‹œ๋˜๋Š” ์ฃผ๊ถŒ๊ตญ๊ฐ€์˜ ์ด์ต์€ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์—์„œ์˜ ๊ฐˆ๋“ฑ์„ ์ดˆ๋ž˜ํ•  ๊ฒƒ์ด๋‹ค. ์ด๋Š” ๊ถ๊ทน์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์ „๋ง์˜ ๊ตฌ์กฐ์  ๋ณ€ํ™”๋ฅผ ๋ถ€์ถ”๊ธด๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„ ํ•˜์— ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ํ–‰์œ„๊ฐ€ ๊ฒฐ๊ตญ ํŠน์ˆ˜ํ•œ ๋ชฉ์ ์— ๋‹ฌ๋ ค์žˆ์Œ์— ๊ธฐ์ธํ•ด ์ด ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์˜ ์ดํ•ด์— ์•ž์„œ ์ง€์ •ํ•™์  ์ด์ต๊ด€๊ณ„์˜ ์ดํ•ด๊ฐ€ ์š”๊ตฌ๋œ๋‹ค. ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰์„ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ์˜ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉํ•˜๋ ค๋Š” ์ง€๋‚œ ์‹ญ ๋…„์˜ ๊ฒฝํ–ฅ์€ ์ „ํ†ต์  ์•ˆ๋ณด์˜์—ญ ์ฐจ์›์—์„œ ๋ฐœ์ƒํ•˜๋˜ ์ผ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์— ๋˜ํ•œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๋ฏธ๊ตญ๊ณผ ์ค‘๊ตญ์ด ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ด€๋ จ ์–ด๋– ํ•œ ์ •๋ถ€์ฐจ์›์˜ ์กฐ์น˜๋ฅผ ์ทจํ•˜๋Š” ์ง€ ์—ฐ๊ตฌํ•จ์— ๋ชฉ์ ์„ ๋‘”๋‹ค. ์–‘๊ตญ์€ ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰ ๋ฐœ์ „์— ๊ตญ๊ฐ€์  ํˆฌ์ž๋ฅผ ์•„๋ผ์ง€ ์•Š์„ ๋ฟ ์•„๋‹ˆ๋ผ ๋™๋งน๊ตญ๋“ค์—๊ฒŒ๋„ ํ˜‘๋ ฅ์„ ์ด‰๊ตฌํ•˜๋ฉฐ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์— ๊ฐ€์žฅ ์ ๊ทน์„ฑ์„ ๋ ๋Š” ๊ตญ๊ฐ€์ด๋‹ค. ๋ฏธ๊ตญ์˜ 2015๋…„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฒ•๊ณผ ์ค‘๊ตญ์˜ 2016๋…„ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ๋ฒ•์„ ๋น„๊ต ์—ฐ๊ตฌํ•ด ๋ณธ ๋…ผ๋ฌธ์€ ์–‘๊ตญ์ด ๊ตญ๋‚ด์˜ ์ •๋ณด ์ธํ”„๋ผ ๋ณดํ˜ธ๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ๋ฒ•์  ๊ทœ์ œ๋ฅผ ๋งˆ๋ จํ–ˆ๋Š”์ง€ ์‚ดํŽด๋ณด๊ณ ์ž ํ•œ๋‹ค. ๋˜ํ•œ ๊ฐ๊ตญ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ ์–ด๋–ป๊ฒŒ ๊ตญ์ต์„ ํ–‰์‚ฌํ•˜๋ฉฐ ๋™์‹œ์— ๋ฒ”์ง€๊ตฌ์  ์ฐจ์›์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ํ˜‘๋ ฅ ๋งค์ปค๋‹ˆ์ฆ˜์„ ์ถ”๊ตฌํ•˜๋Š”์ง€ ์—ฐ๊ตฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ๋ฏธโˆ™์ค‘ ๊ฒฝ์Ÿ๊ตฌ๋„์˜ ๊ด€์ ์—์„œ ์žฌํ•ด์„ํ•˜๋ฉฐ ๋” ๋‚˜์•„๊ฐ€ ๊ฑฐ์‹œ์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์ „๋งํ•œ๋‹ค๋Š” ์ ์—์„œ ํ˜„์žฌ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์—ฐ๊ตฌ์— ๊ธฐ์—ฌํ•œ๋‹ค.I. Introduction 1 1. Research Background 1 2. Argument Overview 3 3. Significance of the topic 5 4. Methodology 8 II. Literature Review 10 1. Sino-US relation and Cybersecurity 10 2. Previous studies on cybersecurity 16 3. Cybersecurity and relevant legal regulation 25 a. The United States 25 b. China 29 4. Limitations of prior research 32 III. The United States 34 1. An overview of national security and cyberspace 34 a. Cybersecurity environment 34 b. Cybersecurity strategy guideline 37 2. Information security and regulatory regime 41 a. Definition of Critical Information Infrastructure 41 b. The evolution of discussion on information security 45 3. Cybersecurity Act of 2015 48 IV. China 51 1. An overview of national security and network security 51 a. The development process of informatization 51 b. Cybersecurity strategy guideline 54 2. Network security and regulatory regime 57 a. Cybersecurity environment 57 b. Definition of Critical Information Infrastructure and regulatory regime 59 3. Cybersecurity Law of the PRC 62 V. Analysis 64 1. Thesis findings 64 a. The US model of protecting homeland cybersecurity 66 b. Chinese model of controlling mainland network security 68 2. Implications and prospects of nations in the cyber era 69 a. Cybersecurity as a shared problem 69 b. Race to cyber supremacy 72 VI. Conclusion 75 Bibliography 78 Abstract in Korean 91Maste

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Pragmatic, Not Liberal Peace? Examining the State of Research on Brazilโ€™s Engagement in International Peace Operations

    Full text link
    Der Literaturbericht bietet eine Kontextualisierung, Auswertung und kritische Diskussion der akademischen Debatte รผber die Herausbildung eines "brasilianischen Ansatzes der Friedenskonsolidierung". Seit den 2000er Jahren hat Brasilien zunehmend Truppen fรผr UN-Friedensmissionen bereitgestellt, vor allem in Haiti und Sub-Sahara Afrika. Dabei hat Brasilien sich bewusst gegen das vorherrschende liberale Paradigma der Friedenskonsolidierung positioniert und betont einen pragmatischeren, demokratischeren und nachhaltigeren Ansatz, der lokale Eigenverantwortung, nicht-militรคrische Mittel und den Verzicht auf politische Konditionen in den Vordergrund stellt. Das Working Paper untersucht Motivationen, Paradigmen und die Operationalisierung des brasilianischen Engagements und ergrรผndet so, wie weit die Idee eines "brasilianischen Ansatzes" trรคgt und wie zwangsbasiert bzw. zwanglos Brasilien im Vergleich zu traditionellen westlichen Akteuren handelt. Zunรคchst wird der Aufstieg Brasiliens im Rahmen der wissenschaftlichen Debatte รผber sogenannte rising powers kontextualisiert und die historische Entwicklung des brasilianischen Engagements in UN-Friedensmissionen nachgezeichnet. Auf dieser Basis werden die konzeptionellen und normativen Debatten รผber den security-development nexus und die Responsibility to Protect/Responsibility while Protecting nรคher beleuchtet und die Erfolge und Misserfolge des brasilianischen Engagements in zwei konkreten Fรคllen vergleichend analysiert: Haiti und Guinea-Bissau. Mit Blick auf die allgemeine Frage nach einem "brasilianischen Ansatz der Friedenskonsolidierung" ergibt die Analyse kein eindeutiges Bild, da Brasilien durchaus auf zwangsbasierte MaรŸnahmen zurรผckgreift, die seinem friedlicheren Diskurs widersprechen. Nichtsdestotrotz ist die Anerkennung der Friedensbemรผhungen Brasiliens, welche das liberale Paradigma der Friedenskonsolidierung sowohl herausfordern als auch imitieren, entscheidend, um die potenziell transformativen Auswirkungen Brasiliens und weiterer rising powers auf multilaterale Operationen zu messen. Dies erfordert jedoch zunรคchst, dass die Forschung die erheblichen Wissenslรผcken schlieรŸt, die mit Blick auf die konkreten Praktiken und Konsequenzen brasilianischer Friedenssicherungs- und Friedenskonsolidierungsmissionen "on the ground" bestehen.This literature review contextualizes, reviews, and critically discusses the scholarly debate surrounding the emergence of a "Brazilian way of peacebuilding." Since the 2000s, Brazil has increasingly contributed troops to UN-led peacekeeping missions, specifically in Haiti and Sub-Sahara Africa. Opposing the dominant liberal peacebuilding paradigm, Brazil has staged itself as an advocate, promoting a more pragmatic, democratic, and sustainable peacebuilding approach that emphasizes local ownership, non-conditionality, and non-militarization. Investigating, whether portrayals of a "Brazilian way" are substantial, and how coercive Brazil acts in comparison to traditional Western actors, the paper examines motivations, paradigms, and the operationalization of its peacekeeping and peacebuilding endeavors. It first situates Brazil in the larger debate on rising powers and traces the evolution of Brazil's engagement in UN peacekeeping. This then allows to zoom in on conceptual and normative debates surrounding the security-development nexus and Responsibility to Protect vs Responsibility while Protecting, and to comparatively assess the successes and failures of Brazil's engagements in two concrete cases: Haiti and Guinea-Bissau. Overall, the findings are ambiguous, as Brazil does resort to coercion, hence contradicting its exceptionalist, pacifist discourse. Nonetheless, recognition of Brazil's efforts to contest and simultaneously mimic liberal peacebuilding is crucial to measure Brazil's transformative impact on multilateral operations. This, however, requires scholars to fill the substantial gap in empirical research concerning the concrete practices and consequences of Brazilian peacekeeping and peacebuilding missions on the ground

    Full Issue: Spring 2017

    Get PDF

    Ontology in Information Security

    Get PDF
    The past several years we have witnessed that information has become the most precious asset, while protection and security of information is becoming an ever greater challenge due to the large amount of knowledge necessary for organizations to successfully withstand external threats and attacks. This knowledge collected from the domain of information security can be formally described by security ontologies. A large number of researchers during the last decade have dealt with this issue, and in this paper we have tried to identify, analyze and systematize the relevant papers published in scientific journals indexed in selected scientific databases, in period from 2004 to 2014. This paper gives a review of literature in the field of information security ontology and identifies a total of 52 papers systematized in three groups: general security ontologies (12 papers), specific security ontologies (32 papers) and theoretical works (8 papers). The papers were of different quality and level of detail and varied from presentations of simple conceptual ideas to sophisticated frameworks based on ontology

    Nations and Markets

    Full text link
    Economics and security seem increasingly intertwined. Citing national security, states subject foreign investments to new scrutiny, even unwinding mergers like the purchase of Grindr or the creation of TikTok. The provision of 5G has become a diplomatic battleground โ€“ Huawei at its center. Meanwhile, states invoke national security to excuse trade wars. The U.S. invoked the GATT national security exception to impose steel and aluminum tariffs, threatening more on automotive parts. Russia invoked that provision to justify its blockade of Ukraine, as did Saudi Arabia and the UAE to excuse theirs of Qatar. And with the spread of COVID-19, states are invoking national security to scrutinize supply lines. Multiplying daily, such stories lead some observers to dub the era one of geoeconomics.Nonetheless, these developments remain difficult to judge and the relationship between economics and national security confused and slippery. Neither term is self-defining, and the same activities can be defined as either or both. The essay seeks clarity in the deeper logic of these labels, revealing a fundamental choice between the logics of markets and of state. Whether invoked to โ€œsecureโ€ borders, privacy, health, the environment, or jobs, โ€œnational securityโ€ is a claim about the proper location of policymaking. Appeals to economics, with their emphasis on global welfare and global person-to-person relationships, are as well. The logics driving the current economics-national security dynamic represent paradigmatic, competing models for organizing individuals with different normative justifications and concerns. Resolving disputes, this essay argues, requires recognizing these root choices

    Cyber Threat Actors for the Factory of the Future

    Get PDF
    The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is accompanied by a number of security risks that must be considered. This leads to the necessity of relying on risk assessment-based approaches to reach a sufficiently mature cyber security management level. However, the lack of common definitions of cyber threat actors (CTA) poses challenges in untested environments such as the FoF. This paper analyses policy papers and reports from expert organizations to identify common definitions of CTAs. A significant consensus exists only on two common CTAs, while other CTAs are often either ignored or overestimated in their importance. The identified motivations of CTAs are contrasted with the specific characteristics of FoF environments to determine the most likely CTAs targeting FoF environments. Special emphasis is given to corporate competitors, as FoF environments probably provide better opportunities than ever for industrial espionage if they are not sufficiently secured. In this context, the study aims to draw attention to the research gaps in this area

    Privacy\u27s Trust Gap: A Review

    Get PDF

    Power and Arms: The Diffusion of Military Innovations and Technology. A Comparative Historical Analysis of the Spread of Military Power After the Cold War and Consequences for the Norwegian Navy in the NATO Alliance

    Get PDF
    This thesis investigates the extensive puzzle of various influences on the diffusion of military power, meaning the spread of certain innovations, through the international system and the implications for international politics and the NATO alliance. Building on recent contributions to the studies of diffusion of military innovations, this thesis explores how and why certain innovations spread at a faster rate than others, through theoretical accounts of revolution in military affairs and adoption capacity theory, not only for discussing how military power diffuses through the international system as a whole, but also in relation to the case of sea power and modern warship innovations. According to previous literature, military technologies should spread fairly quickly because of structural pressures to emulate and the possibility to free-ride on research and development investments made by other states. Conversely, history offers numerous examples in which major military innovations spread neither quickly nor extensively. In order to explain this puzzle, the study intends to provide useful insights on statesโ€™ financial and organizational capacity to adopt and implement new military innovations, and what this imply for the NATO alliance. Through a comparative historical analysis, the mechanisms at play will be mapped out by applying process tracing and historical accounts, and moreover, empirically tested against the theoretical and analytical framework
    • โ€ฆ
    corecore