6,245 research outputs found

    Responding to cyberattacks: Prospects for the EU Cyber Diplomacy Toolbox. EPC Discussion paper, 18 March 2019

    Get PDF
    Malicious cyber activities have become a growing threat, a fact that has become more visible in recent years through several massive cyberattacks. While the European Union (EU) has been active in the field of cybersecurity for a number of years, it has not yet put in place diplomatic tools to respond to cyberattacks, nor has it attributed cyberattacks. However, EU member states have made progress in the development of a cyber diplomacy toolbox containing a number of measures, from preventive ones to the use of sanctions. This work needs to be finalised, so that the Union’s toolbox can become operational and used when needed

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives

    ‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

    Get PDF
    Submission to 2021–2025 UN Open-Ended Working Group (OEWG) on security of and in the use of information and communications technologies

    Criminal Liabilities of Boko Haram in Nigeria

    Get PDF
    One major problem that has posed a great threat to the Nigerian Nation is Boko Haram or rather the Boko Haram militant group. What this paper intends to do is to analyze the criminal liabilities of the Boko Haram militant group in Nigeria in both domestic and international law. I see this paper primarily as timely because a lot has been said about Boko Haram, in Nigeria, but yet there is much we still do not know about Boko Haram, its criminal liabilities, origin structure, size and method of operation still remains a mirage and a mystery. This dissertation will start with an introduction of the term Boko Haram and the various definitions of terrorism. The subsequent chapter will in detail attempt the Impact of the Boko Haram insurgency as a threat to national security--This chapter would be more of revelations surrounding the Boko Haramites conflict, and its inclinations towards terrorism. Chapter three intends to look at the fascination towards Boko Haram, while chapter five would discuss the Applicable International and Domestic laws against Boko Haram. At the conclusion in chapter six, suggestions and recommendations will be made on how to eradicate the Boko Haram terrorist group as well as enforcing actions against the Boko Haramites to determine their criminal liability or rather their culpability. This dissertation would remain relevant going by the fact that the stability of the Nigerian Nation has been affected drastically by the Boko Haram conflict and I am confident that this work of mine could be a source of inspiration for those in authority as well as policy makers to adequately tackle this horrific crime

    Self-Sovereign Identity and the Decentralized, Consent-Based Model

    Get PDF
    The centralized third-party authentication model for digital identity validation is obsolete in light of newer and more secure means of ensuring accurate digital identification. Governments, private organizations, and citizens should be encouraged to explore the means by which they can maximize the latest in digital developments to protect themselves and their online identities. California should begin to implement the precepts of the decentralized Self-Sovereign Identity (SSI) model, which is superior to its predecessor in its simplicity, as it requires only three things to validate a digital identity: (1) a blockchain which has the information necessary to satisfy the consensus algorithm ensuring adequate replication across the network nodes; (2) verifiable credentials; and (3) decentralized identifiers. Because this system is predicated on a trustless Proof of Work (PoW) model, at present, blockchains are practically immutable, thus making it impossible to falsify or forge information on them. The use of cryptographic hash functions ensures that the security of each block of data is independently secured from one another, and ultimately known only to the controller and owner of the information: the user. California should join other state and national governments in the research and implementation of SSI-compliant models of governance to better protect and support the needs of its citizenry in an increasingly digitized world

    Shifting paradigms in Europe's approach to cyber defence: ambitions to disrupt malicious cyber activity need to protect norms as well as networks

    Full text link
    As high-level European Union (EU) policy documents call for investment in active cyber defence capabilities, the legal and political powers for their use remain ill-defined. To demonstrate their commitment to principles of responsible state behaviour and due diligence, the EU and its member states have a duty to establish the normative foun­dations for the use of active cyber defence measures ahead of their deployment, while carefully managing the risk of a gradual militarisation of the cyber and information domain. (author's abstract

    Cyber Sovereignty: The Way Ahead

    Get PDF
    The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States have sovereign power over their cyber infrastructure and that with that sovereign power comes corresponding responsibility to control that infrastructure and prevent it from being knowingly used to harm other States. This responsibility to prevent external harm extends not only to state actors, but also to non-state actors. This article will review some of the cardinal principles of sovereignty and their application to cyberspace and then consider the corresponding duties and obligations. In each case, the principle of sovereignty will be stated and defined. Its application to cyberspace will then be discussed, including the corresponding duty or obligation that arises from that assertion of sovereignty. Examples of the duty and obligation will be used to help clarify the analysis. Finally, issues that arise from the assertion of that authority and its corresponding duty or obligation will be highlighted

    Think Tank Review Issue 62 December 2018

    Get PDF

    Privacy-Preserving Methods for Sharing Financial Risk Exposures

    Full text link
    Unlike other industries in which intellectual property is patentable, the financial industry relies on trade secrecy to protect its business processes and methods, which can obscure critical financial risk exposures from regulators and the public. We develop methods for sharing and aggregating such risk exposures that protect the privacy of all parties involved and without the need for a trusted third party. Our approach employs secure multi-party computation techniques from cryptography in which multiple parties are able to compute joint functions without revealing their individual inputs. In our framework, individual financial institutions evaluate a protocol on their proprietary data which cannot be inverted, leading to secure computations of real-valued statistics such a concentration indexes, pairwise correlations, and other single- and multi-point statistics. The proposed protocols are computationally tractable on realistic sample sizes. Potential financial applications include: the construction of privacy-preserving real-time indexes of bank capital and leverage ratios; the monitoring of delegated portfolio investments; financial audits; and the publication of new indexes of proprietary trading strategies
    • …
    corecore