Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity DOI
Marcelo Mesquita Leal, Paul Musgrave

Contemporary Security Policy, Journal Year: 2023, Volume and Issue: 44(3), P. 437 - 461

Published: May 25, 2023

Zero-day vulnerabilities are software and hardware flaws that unknown to computer vendors. As powerful means of carrying out cyber intrusions, such present a dilemma for governments. Actors develop or procure may retain them future use; alternatively, agencies possessing disclose the affected vendors so they can be patched, thereby denying not only adversaries but also themselves. Previous research has explored ethics implications this dilemma, no study investigated public opinion regarding zero-day exploits. We results from survey experiment testing whether conditions identified as important in literature influence respondents’ support disclosing stockpiling vulnerabilities. Our show respondents overwhelmingly disclosure, conclusion weakly by likelihood an adversary will independently discover vulnerability. findings suggest gap between preferences current U.S. policy.

Language: Английский

CYBERSECURITY CHALLENGES IN SMART CITIES: A CASE REVIEW OF AFRICAN METROPOLISES DOI Creative Commons

Islam Ahmad,

Anthony Anyanwu,

Shedrack Onwusinkwue

et al.

Computer Science & IT Research Journal, Journal Year: 2024, Volume and Issue: 5(2), P. 254 - 269

Published: Feb. 2, 2024

The rapid urbanization and digital transformation of cities across Africa have given rise to the concept Smart Cities, where advanced technologies are integrated enhance efficiency, sustainability, overall quality urban life. However, this paradigm shift towards interconnected technology-driven environments brings forth a host cybersecurity challenges that demand careful consideration. This paper explores in focusing on case review African metropolises. cities, emblematic global trend, embracing City initiatives address foster economic development. While these promise improved services enhanced connectivity, they concurrently expose myriad threats. interconnectedness devices systems Cities creates vast attack surface, making them susceptible cyber-attacks ranging from data breaches infrastructure disruptions. delves into specific instances faced by metropolises their quest for technological advancement. It analyzes vulnerabilities critical infrastructure, such as energy grids, transportation systems, healthcare networks, highlighting potential risks associated with inadequate measures. Moreover, sheds light socio-economic implications cyber threats emphasizing importance resilient frameworks safeguarding citizen functionality. In conclusion, underscores urgent need comprehensive strategies tailored unique Africa. findings aim contribute better understanding intricate relationship between urbanization, technology, cybersecurity, offering insights can inform policy decisions, implementations, collaborative efforts build secure context. Keywords: Cybersecurity, Africa, Metropolis, Review.

Language: Английский

Citations

36

Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis DOI Creative Commons
Ryan Shandler, Michael L. Gross, Daphna Canetti

et al.

Journal of Global Security Studies, Journal Year: 2022, Volume and Issue: 8(1)

Published: Dec. 19, 2022

Abstract To what extent can cyberattacks wreak havoc and terrorize modern society? Until now, this question has revolved around the potential of cyber operations to cause physical destruction or other material harm. In paper, we propose a broader interpretation. We submit that assessing cyber-threats through prism obscured human dimension threat. Instead, calculating gravity by measuring psychological distress. This approach recognizes even seemingly inconsequential levy tremendous damage traumatizing civilians, undermining societal cohesion, exacerbating cycles violence. test whether significant individual harm, employ an internal meta-analysis looking at eighteen studies conducted in three countries over 6 years. Across these studies, exposed 6,020 respondents simulated conventional attacks. conclude high levels harm—equal caused political violence terrorism. finding overturns widely accepted view are mere irritant best threat information security worst. Through lens, findings suggest nonphysically destructive trigger consequences constitute legally defined armed attack permits using force self-defense. discussing how onset distress generates pressure support retaliation lead military escalation.

Language: Английский

Citations

48

Introduction: Cyber-conflict – Moving from speculation to investigation DOI
Ryan Shandler, Daphna Canetti

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 3 - 9

Published: Jan. 1, 2024

Investigating cyber conflict is enormously difficult. The domain complex, quality data are sparse, international affairs shrouded in secrecy, and despite its seeming ubiquity, power has only recently entered the battlefield. In face of these challenges, we must rise to meet challenges cybersecurity research by deploying creative methods that collect verifiable probatory data, which allow for predictive models behavior. Against this backdrop, our special issue offers a vision embraces culture rigorous inquiry based on theoretically robust, policy relevant investigation. We highlight two key features. First, at intersection political science incorporate human dimension conflict. A security approach places people as primary objects recognizes individual-level analyses can shed light macro-level trends. Second, adopt rigorous, empirical methods. embrace broad tent collection techniques – spanning qualitative quantitative, experimental, observational research. What integral all scholarship abides highest standards replicability falsifiability. articles contained collectively form proof concept expands horizons from substantive viewpoint (adding prevalent military/strategic analyses), methodological perspective (propounding importance scrutiny). Together, 10 pieces affirm there now critical mass substantively diverse empirically field cybersecurity, community capable making bold, grounded, tested claims verify how or not altering nature peace, relations.

Language: Английский

Citations

15

Cyberattacks and public opinion – The effect of uncertainty in guiding preferences DOI
Eric Jardine, Nathaniel D. Porter, Ryan Shandler

et al.

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 103 - 118

Published: Jan. 1, 2024

When it comes to cybersecurity incidents – public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded ambiguity? How people account for uncertainty inherent cyberspace forge preferences following attacks? This article seeks answer these questions by introducing an threshold mechanism predicting level attributional certainty required support economic, diplomatic or military responses cyberattacks. Using a discrete-choice experimental design with 2025 US respondents, we find lower is associated less retaliation, yet this contingent on suspected identity attacker and partisan identity. Diplomatic allies possess reservoir good will amplifies effect uncertainty, while rivals often given benefit doubt. We demonstrate encourages use cognitive schemas overcome ambiguity, fall back upon pre-existing politically guided views about country behind attack. If ambiguity surrounding has typically been discussed as operational strategic concern, shifts focus attention human positions mass forgotten important party during cyber conflict.

Language: Английский

Citations

13

More than malware: unmasking the hidden risk of cybersecurity regulations DOI Creative Commons
Mazaher Kianpour, Shahid Raza

International Cybersecurity Law Review, Journal Year: 2024, Volume and Issue: 5(1), P. 169 - 212

Published: Feb. 2, 2024

Abstract Cybersecurity investments are made within a complex and ever-evolving environment, where regulatory changes represent significant risk factor. While cybersecurity regulations aim to minimize cyber risks enhance protection, the uncertainty arising from frequent or new can significantly impact organizational response strategies. This paper explores determinants implications of associated with cybersecurity, aiming provide deeper understanding how these influence strategic decision-making. The study delves into suggestion preventive mitigative controls that enable businesses adapt mitigate potential disruptions caused by changes, thereby preserving their established practices. Another key contribution this is introduction stochastic econometric model illustrates uncertainties affect investment behaviors, often prompting “wait-and-see” stance. synthesizes relationship among choices, risks, providing insights dynamic nature research findings offer valuable guidance for management planning in investments. By comprehensively drivers impacts policymakers develop more effective evaluation approaches. essential sustaining strong posture while navigating changing environment.

Language: Английский

Citations

8

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures DOI Creative Commons
Muhammad Uzair-ul-Hassan, Noshina Tariq, Amjad Alsirhani

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 62697 - 62720

Published: Jan. 1, 2023

The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate wireless connection between meters in AMI, these infrastructures are considered Low-power Lossy Networks (LLNs). routing protocol an AMI network is crucial for ensuring availability timeliness data transfer. IPv6 Routing Protocol lossy networks (RPL) excellent option communication configuration. However, it highly at risk against many external internal attacks, its effectiveness may be severely diminished by Sybil assault. Different trust-based techniques have been suggested mitigate attacks. existing trust systems high energy consumption issues, which cause a reduction performance LLNs due complex calculations node level. Therefore, this paper presents novel fog-enabled GINI index-based mechanism (GITM) attacks using forwarding behavior legitimate member nodes. Regarding identifying isolating assaults, our approach outperforms state-of-the-art methods. GITM detects isolates more number malicious nodes compared other within similar time frame. By proposed framework, attack detection increases 4.48%, reduces 21%, isolation latency 26.30% (concerning time). Furthermore, end-to-end delay merely 0.30% case, control messages decreases 28%.

Language: Английский

Citations

18

Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election DOI
Jelena Vićić, Erik Gartzke

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 10 - 27

Published: Jan. 1, 2024

Russia’s cyber-enabled influence operations (CEIO) have garnered significant public, academic and policy interest. 126 million Americans were reportedly exposed to efforts the 2016 US election on Facebook. Indeed, extent that such shape political outcomes, they may prove far more consequential than other, flamboyant forms of cyber conflict. Importantly, CEIOs highlight human dimension Focused ‘hacking minds’ affecting individuals behind keyboards, as opposed hacking networked systems, represent an emergent form state activity. data for studying are often publicly available. We employ semantic network analysis (SNA) assess seldom analyzed in cybersecurity research – text actual advertisements from a prominent CEIO. examine content, well scope scale Russian-orchestrated social media campaign. While described ‘disinformation,’ our shows information utilized Russian CEIO was generally factually correct. Further, it appears African Americans, not white conservatives, target demographic Russia sought influence. conclude with speculation, based findings, about likely motives

Language: Английский

Citations

7

Trust at Risk: The Effect of Proximity to Cyberattacks DOI Creative Commons
Miguel Alberto Gomez, Ryan Shandler

Journal of Global Security Studies, Journal Year: 2024, Volume and Issue: 9(2)

Published: March 12, 2024

Abstract Proximity is a core feature of theories political violence, with the effects attacks rippling outward so that geographically proximate individuals experience more severe than those distant. However, this model proximity and exposure unlikely to recur for cyberattacks. The incorporeality cyber incidents absence physical epicenter constrain mechanism coupling distance harm. To empirically test relationship between cyberattacks, we conducted field study involving 707 German respondents following ransomware attack in Düsseldorf. We find classical “ripple effect” reversed, trust highest among people closer lowest postulate firsthand its effects, distant employ abstract conceptions consequences do not align actual events. Consequently, does confer security, it can even amplify adverse exposure. This finding highlights need governments actively work assuage public fears

Language: Английский

Citations

6

Managing cyber risk, a science in the making DOI Open Access
Michel M. Dacorogna, Marie Kratz

Scandinavian Actuarial Journal, Journal Year: 2023, Volume and Issue: 2023(10), P. 1000 - 1021

Published: April 25, 2023

Not a day goes by without news about cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties can be transformed into manageable risk. After reviewing the main characteristics risk, we consider three layers space: hardware, software psycho-cognitive layer. We ask ourselves is this risk different from others, modelling has been tackled needs to evolve, what are multi-facetted aspects management. wide exploration pictures science in making points questions solved for building resilient society.

Language: Английский

Citations

13

An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks DOI Creative Commons
Zhen Wang, Anazida Zainal, Maheyzah Md Siraj

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: Jan. 14, 2025

The application of artificial neural networks (ANNs) can be found in numerous fields, including image and speech recognition, natural language processing, autonomous vehicles. As well, intrusion detection, the subject this paper, relies heavily on it. Different detection models have been constructed using ANNs. While ANNs are relatively mature to construct models, some challenges remain. Among most notorious these bloated caused by large number parameters, non-interpretability models. Our paper presents Convolutional Kolmogorov-Arnold Networks (CKANs), which designed overcome difficulties provide an interpretable accurate model. (KANs) developed from representation theorem. Meanwhile, CKAN incorporates a convolutional computational mechanism based KAN. model proposed is incorporating attention mechanisms into CKAN's logic. datasets CICIoT2023 CICIoMT2024 were used for training validation. From results evaluating performance indicators experiments, CKANs has attractive prospect. compared with other methods, predict much higher level accuracy significantly fewer parameters. However, it not superior terms memory usage, execution speed energy consumption.

Language: Английский

Citations

0