47 research outputs found

    The First Space-Cyber War and the Need for New Regimes and Policies

    Get PDF
    Many dubbed the Gulf War of 1991 the "first space war" due to the US Armed Forces' extensive use of satellites. The cyberwar in Ukraine, although it is mostly playing out in the shadows, may be remembered as the first space-cyber war.This policy brief makes the case that states should adopt national policies to defend against threats to space-based assets and applications, such as communications satellites, that are both vital to national security and economic security and increasingly vulnerable to cyberattacks.It is time to explore and identify principles for responsible space-cyber behaviour that would represent a broad multilateral consensus. Identifying these principles may not prevent space-cyber hostilities but could provide "rules of the game."States would also benefit from encouraging a space-cyber security industry that, beyond protecting against space-cyber threats, has the potential to be a significant growth engine

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics

    Horizontal and Vertical Analysis of Privacy and Cyber-Security Markets

    Full text link
    Deliverable 4.2 (\u201cHorizontal and Vertical Analysis of Privacy and Cyber-Security Markets\u201d) provides an in-depth discussion of economic incentives, stakeholder engagement and market opportunities in privacy and cyber-security. This report first introduces the reader to the horizontal market analysis, which covers firms active at the same stage of the production chain in the privacy and cyber-security industry and present key market segmentations.The report also presents the vertical analysis of players at different stages of the production chain in the PACS industry. These relations are covered as security in the supply chain is of utmost importance: only secure inputs ensure a secure product as final output. The report also covers engagement and assessment of stakeholders in the privacy and security chain and their relation to PACS in the ICT sector. The report gives several case studies on vertical relations and includes an empirical analysis of incentive schemes. The proposed innovation value chain connects inputs and outputs in the production of PACS goods and services and their relation to economic incentives.Finally, a preliminary scheme on mapping privacy and personal data product and service markets is proposed. Firms active in these markets can be categorized according to their generic value chain, where some use the identification of the user as key input and others do not. The report provides economic incentive templates that enable market players and regulators to potentially better map the markets.The following scheme outlines in brief the relation of the two deliverables D4.1 and D4.2 to the developed Privacy and Cyber-Security Market Scheme. It enables the reader to see what is covered in the different deliverables and to what deliverable he/she needs to turn in order to find the information of interest

    A Commission on a Cyber Mission

    Get PDF

    Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups’ Business Models

    Get PDF
    As the number of security incidents increases, a market is emerging for established and new providers of security measures. However, we lack an idea of the business models of cyber security start-ups, which are seen as innovation and security drivers, to protect the economy from existence-threatening incidents. Due to the intangible nature of the cyber threats that security solutions aim to address, previous research on business models cannot be fully transferred. We address this research gap by developing a taxonomy following Nickerson et al. (2013) based on 90 cyber security start-ups and performing a cluster analysis to understand the business activities of cyber security start-ups concerning the protection of critical infrastructures. Our taxonomy will benefit interested decision-makers such as CISOs who want to identify custom-fit cyber security solutions for their organizations. Furthermore, investors and cyber security providers understand the market holistically and can identify innovative product approaches to adopt themselves
    corecore