2,903 research outputs found

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    “Beyond-the-box” thinking on future war: The art and science of unrestricted warfare

    Get PDF
    Tese de Mestrado "Master of Military Operational Art and Science", Air Command And Staff College, Air University Maxwell Air Force Base, AlabamaGlobalization, the technological interconnectedness of societies, and America’s military prowess have created the opportunity and motive for future peer competitors to exploit Unrestricted Warfare (URW) strategies. This holistic approach to warfare employs coherent and integrated multidimensional actions, synchronized in time and space, combining all available means, including military and civilian, violent and non-lethal force, targeting adversary’s wide-spectrum domains, aiming to affect opponent’s will and capabilities during times of real or perceived conflict. Shifting the emphasis from military to political, economic, information, and cultural engagements, future peer competitors will aim to constrain the US’s response within a regional or global sphere of interest, degrading its combat effectiveness, by collapsing government organizations, and disrupting the normal flow of society. Such perspective produces several strategic implications, exposing legal and moral dilemmas, the increasing civilianization of war, and risk society challenges. The fact that warfare is expanding beyond the military domain continues to constrain Western thought, challenging military and political decision-makers. Therefore, it demands a shift of mindset in order to understand that the main strategic differences towards warfare are cultural, and that warfare should be viewed as a holistic endeavor. Hence, the importance of a coherent integration of US’s national security strategy. This involves a three step approach based on renewed strategic thought, the purposeful adaptation leading to a holistic-agency approach, and a people-centric perspective enhancing the education of the national security practitioners

    Emerging Risks in the Marine Transportation System (MTS), 2001- 2021

    Get PDF
    How has maritime security evolved since 2001, and what challenges exist moving forward? This report provides an overview of the current state of maritime security with an emphasis on port security. It examines new risks that have arisen over the last twenty years, the different types of security challenges these risks pose, and how practitioners can better navigate these challenges. Building on interviews with 37 individuals immersed in maritime security protocols, we identify five major challenges in the modern maritime security environment: (1) new domains for exploitation, (2) big data and information processing, (3) attribution challenges, (4) technological innovations, and (5) globalization. We explore how these challenges increase the risk of small-scale, high-probability incidents against an increasingly vulnerable Marine Transportation System (MTS). We conclude by summarizing several measures that can improve resilience-building and mitigate these risks

    Asymmetric Threats: Analyzing the Future of Nuclear Terrorism & Cyber Attacks; The Value of Deterrence Theory for Addressing the Challenges of Nuclear Terrorism in the age of 21st Century Cybersecurity

    Get PDF
    Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional and bureaucratic agencies using content analysis, this study examines whether or not policymakers, congressional or bureaucratic, use deterrence theory when they make policy, suggestions, rules, and guidelines. This thesis asks how U.S. policy regarding nuclear terrorism has changed given a rise in cyberthreats? This thesis also asks a second question: Which federal agency is most capable of dealing with cyberthreats concerning nuclear terrorism? The findings of this research concluded that as cyberthreats continued to develop, policymakers using deterrence theory shifted to using previous waves of deterrence theory, primarily dealing with rivalry and competitive threats. In addition, this research finds that intelligence agencies are the most capable federal agencies in proving guidelines and informing future policymakers
    • …
    corecore