1,514 research outputs found

    A Healthy Game-Theoretic Evaluation of NATO and Indonesia's Policies in the Context of International Law

    Get PDF
    This study examines the policies of two prominent actors, the North Atlantic Treaty Organization (NATO) and Indonesia while considering their adherence to international law. The analysis is conducted through the lens of game theory, which provides a framework for evaluating strategic interactions in the cyber domain. This study aims to explore how game theory can be applied to assess the policies of NATO and Indonesia in combating and to establish the link between game-theoretic evaluation and conflict resolution in Indonesia's cyber landscape. By understanding strategic interactions and motivations of various actors, this study seeks to provide insights into fostering international cooperation, promoting responsible state behavior, and enhancing cybersecurity. This study employs a qualitative research design, relying on literature reviews, policy analyses, and case studies to examine the cybersecurity policies of NATO and Indonesia. Game theory serves as the primary analytical framework to model cyber conflicts and interactions between different actors. The policies of NATO and Indonesia are evaluated concerning cooperation, competition, and compliance with international law. The analysis reveals that both NATO and Indonesia employ distinct approaches to combating. NATO's collective response emphasizes coordination, information sharing, and cooperative defense strategies, reinforcing international cybersecurity efforts. On the other hand, Indonesia's response is shaped by its unique challenges and priorities, leading to tailored policies and collaborations. Game-theoretic evaluation establishes the importance of cooperation, deterrence, and adherence to international law in resolving conflicts arising from cyber threats in Indonesia. This research highlights the significance of international partnerships, capacity building, and context-specific best practices for a more secure digital environment in Indonesia and beyond. Ultimately, game-theoretic evaluation proves instrumental in shaping effective cybersecurity strategies and promoting responsible behavior in the ever-evolving cyber landscape

    Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics

    Get PDF
    Attacks on cyber-physical systems (CPS) continue to grow in frequency. However, cybersecurity academics and practitioners have so far focused primarily on computer systems and networks rather than CPS. Given the alarming frequency with which cybercriminals attack CPS and the unique cyber-physical relationship in CPS, we propose that CPS security needs go beyond what purely computer and network security requires. Thus, we require more focused research on cybersecurity based on the cyber-physical relationship between various CPS components. In this paper, we stock of the current state of CPS security and identify research opportunities for information systems (IS) academics

    In the Eye of a Storm: Governance of Emerging Technologies in UK Ports Post Brexit

    Get PDF
    As the UK looks to a future of changing relations with its trading partners there is a clear need to invest in its port infrastructure. As part of its strategic response the UK is looking to follow other countries, especially in the EU and Asia, in investing in developing smart ports which incorporate advanced digital technologies. However, the UK is faced with the challenge of resolving many decisions regarding where to invest, what to invest in, the consequence(s) of those decisions, and how to regulate a future sector that is increasingly becoming dependent on digital information and communication technology (ICT) infrastructure. Smart ports can bring benefits locally, nationally and globally from reducing greenhouse gas emissions, improving air quality, creating efficient supply chains, and secure and safer working environments. Yet, embedding emerging technologies, like the Internet of Things (IoT) into critical infrastructure like ports introduces new security risks and vulnerabilities that existing governance mechanisms are often unable to address. This paper firstly examines the growth in digitalisation of seaports drawing on initiatives in Rotterdam and Singapore. Potential security risks and vulnerabilities emerging are then discussed using some case studies before turning to review existing cybersecurity governance measures for ports. The lessons the UK can learn from smart port leaders like Rotterdam and Singapore as it looks to implement the innovation and digitalisation element of its new Maritime Strategy are then highlighted with recommendations on ways forward

    Cyber Threat Intelligence based Holistic Risk Quantification and Management

    Get PDF

    Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE – A Cyberthreat Language

    Get PDF
    Cybersecurity information sharing (CIS) is envisioned to protect organizations more effectively from advanced cyberattacks. However, a completely automated CIS platform is not widely adopted. The major challenges are: (1) the absence of advanced data analytics capabilities and (2) the absence of a robust cyberthreat language (CTL). This work introduces Cybersecurity Information Exchange with Privacy (CYBEX-P), as a CIS framework, to tackle these challenges. CYBEX-P allows organizations to share heterogeneous data from various sources. It correlates the data to automatically generate intuitive reports and defensive rules. To achieve such versatility, we have developed TAHOE - a graph-based CTL. TAHOE is a structure for storing, sharing, and analyzing threat data. It also intrinsically correlates the data. We have further developed a universal Threat Data Query Language (TDQL). In this work, we propose the system architecture for CYBEX-P. We then discuss its scalability along with a protocol to correlate attributes of threat data. We further introduce TAHOE & TDQL as better alternatives to existing CTLs and formulate ThreatRank - an algorithm to detect new malicious events.We have developed CYBEX-P as a complete CIS platform for not only data sharing but also for advanced threat data analysis. To that end, we have developed two frameworks that use CYBEX-P infrastructure as a service (IaaS). The first work is a phishing URL detector that uses machine learning to detect new phishing URLs. This real-time system adapts to the ever-changing landscape of phishing URLs and maintains an accuracy of 86%. The second work models attacker behavior in a botnet. It combines heterogeneous threat data and analyses them together to predict the behavior of an attacker in a host infected by a bot malware. We have achieved a prediction accuracy of 85-97% using our methodology. These two frameworks establish the feasibility of CYBEX-P for advanced threat data analysis for future researchers

    Simulation for Cybersecurity: State of the Art and Future Directions

    Get PDF
    In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts. The overview of cybersecurity provides readers with a foundational perspective of cybersecurity in the light of targets, threats, and preventive measures. The simulation research section details the current role that simulation plays in cybersecurity, which mainly falls on representative environment building; test, evaluate, and explore; training and exercises; risk analysis and assessment; and humans in cybersecurity research. The proposed way forward section posits that the advancement of collecting and accessing sociotechnological data to inform models, the creation of new theoretical constructs, and the integration and improvement of behavioral models are needed to advance cybersecurity efforts
    • …
    corecore