Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity DOI
Marcelo Mesquita Leal, Paul Musgrave

Contemporary Security Policy, Год журнала: 2023, Номер 44(3), С. 437 - 461

Опубликована: Май 25, 2023

Zero-day vulnerabilities are software and hardware flaws that unknown to computer vendors. As powerful means of carrying out cyber intrusions, such present a dilemma for governments. Actors develop or procure may retain them future use; alternatively, agencies possessing disclose the affected vendors so they can be patched, thereby denying not only adversaries but also themselves. Previous research has explored ethics implications this dilemma, no study investigated public opinion regarding zero-day exploits. We results from survey experiment testing whether conditions identified as important in literature influence respondents’ support disclosing stockpiling vulnerabilities. Our show respondents overwhelmingly disclosure, conclusion weakly by likelihood an adversary will independently discover vulnerability. findings suggest gap between preferences current U.S. policy.

Язык: Английский

CYBERSECURITY CHALLENGES IN SMART CITIES: A CASE REVIEW OF AFRICAN METROPOLISES DOI Creative Commons

Islam Ahmad,

Anthony Anyanwu,

Shedrack Onwusinkwue

и другие.

Computer Science & IT Research Journal, Год журнала: 2024, Номер 5(2), С. 254 - 269

Опубликована: Фев. 2, 2024

The rapid urbanization and digital transformation of cities across Africa have given rise to the concept Smart Cities, where advanced technologies are integrated enhance efficiency, sustainability, overall quality urban life. However, this paradigm shift towards interconnected technology-driven environments brings forth a host cybersecurity challenges that demand careful consideration. This paper explores in focusing on case review African metropolises. cities, emblematic global trend, embracing City initiatives address foster economic development. While these promise improved services enhanced connectivity, they concurrently expose myriad threats. interconnectedness devices systems Cities creates vast attack surface, making them susceptible cyber-attacks ranging from data breaches infrastructure disruptions. delves into specific instances faced by metropolises their quest for technological advancement. It analyzes vulnerabilities critical infrastructure, such as energy grids, transportation systems, healthcare networks, highlighting potential risks associated with inadequate measures. Moreover, sheds light socio-economic implications cyber threats emphasizing importance resilient frameworks safeguarding citizen functionality. In conclusion, underscores urgent need comprehensive strategies tailored unique Africa. findings aim contribute better understanding intricate relationship between urbanization, technology, cybersecurity, offering insights can inform policy decisions, implementations, collaborative efforts build secure context. Keywords: Cybersecurity, Africa, Metropolis, Review.

Язык: Английский

Процитировано

36

Cyberattacks, Psychological Distress, and Military Escalation: An Internal Meta-Analysis DOI Creative Commons
Ryan Shandler, Michael L. Gross, Daphna Canetti

и другие.

Journal of Global Security Studies, Год журнала: 2022, Номер 8(1)

Опубликована: Дек. 19, 2022

Abstract To what extent can cyberattacks wreak havoc and terrorize modern society? Until now, this question has revolved around the potential of cyber operations to cause physical destruction or other material harm. In paper, we propose a broader interpretation. We submit that assessing cyber-threats through prism obscured human dimension threat. Instead, calculating gravity by measuring psychological distress. This approach recognizes even seemingly inconsequential levy tremendous damage traumatizing civilians, undermining societal cohesion, exacerbating cycles violence. test whether significant individual harm, employ an internal meta-analysis looking at eighteen studies conducted in three countries over 6 years. Across these studies, exposed 6,020 respondents simulated conventional attacks. conclude high levels harm—equal caused political violence terrorism. finding overturns widely accepted view are mere irritant best threat information security worst. Through lens, findings suggest nonphysically destructive trigger consequences constitute legally defined armed attack permits using force self-defense. discussing how onset distress generates pressure support retaliation lead military escalation.

Язык: Английский

Процитировано

48

Introduction: Cyber-conflict – Moving from speculation to investigation DOI
Ryan Shandler, Daphna Canetti

Journal of Peace Research, Год журнала: 2024, Номер 61(1), С. 3 - 9

Опубликована: Янв. 1, 2024

Investigating cyber conflict is enormously difficult. The domain complex, quality data are sparse, international affairs shrouded in secrecy, and despite its seeming ubiquity, power has only recently entered the battlefield. In face of these challenges, we must rise to meet challenges cybersecurity research by deploying creative methods that collect verifiable probatory data, which allow for predictive models behavior. Against this backdrop, our special issue offers a vision embraces culture rigorous inquiry based on theoretically robust, policy relevant investigation. We highlight two key features. First, at intersection political science incorporate human dimension conflict. A security approach places people as primary objects recognizes individual-level analyses can shed light macro-level trends. Second, adopt rigorous, empirical methods. embrace broad tent collection techniques – spanning qualitative quantitative, experimental, observational research. What integral all scholarship abides highest standards replicability falsifiability. articles contained collectively form proof concept expands horizons from substantive viewpoint (adding prevalent military/strategic analyses), methodological perspective (propounding importance scrutiny). Together, 10 pieces affirm there now critical mass substantively diverse empirically field cybersecurity, community capable making bold, grounded, tested claims verify how or not altering nature peace, relations.

Язык: Английский

Процитировано

15

Cyberattacks and public opinion – The effect of uncertainty in guiding preferences DOI
Eric Jardine, Nathaniel D. Porter, Ryan Shandler

и другие.

Journal of Peace Research, Год журнала: 2024, Номер 61(1), С. 103 - 118

Опубликована: Янв. 1, 2024

When it comes to cybersecurity incidents – public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded ambiguity? How people account for uncertainty inherent cyberspace forge preferences following attacks? This article seeks answer these questions by introducing an threshold mechanism predicting level attributional certainty required support economic, diplomatic or military responses cyberattacks. Using a discrete-choice experimental design with 2025 US respondents, we find lower is associated less retaliation, yet this contingent on suspected identity attacker and partisan identity. Diplomatic allies possess reservoir good will amplifies effect uncertainty, while rivals often given benefit doubt. We demonstrate encourages use cognitive schemas overcome ambiguity, fall back upon pre-existing politically guided views about country behind attack. If ambiguity surrounding has typically been discussed as operational strategic concern, shifts focus attention human positions mass forgotten important party during cyber conflict.

Язык: Английский

Процитировано

13

More than malware: unmasking the hidden risk of cybersecurity regulations DOI Creative Commons
Mazaher Kianpour, Shahid Raza

International Cybersecurity Law Review, Год журнала: 2024, Номер 5(1), С. 169 - 212

Опубликована: Фев. 2, 2024

Abstract Cybersecurity investments are made within a complex and ever-evolving environment, where regulatory changes represent significant risk factor. While cybersecurity regulations aim to minimize cyber risks enhance protection, the uncertainty arising from frequent or new can significantly impact organizational response strategies. This paper explores determinants implications of associated with cybersecurity, aiming provide deeper understanding how these influence strategic decision-making. The study delves into suggestion preventive mitigative controls that enable businesses adapt mitigate potential disruptions caused by changes, thereby preserving their established practices. Another key contribution this is introduction stochastic econometric model illustrates uncertainties affect investment behaviors, often prompting “wait-and-see” stance. synthesizes relationship among choices, risks, providing insights dynamic nature research findings offer valuable guidance for management planning in investments. By comprehensively drivers impacts policymakers develop more effective evaluation approaches. essential sustaining strong posture while navigating changing environment.

Язык: Английский

Процитировано

8

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures DOI Creative Commons
Muhammad Uzair-ul-Hassan, Noshina Tariq, Amjad Alsirhani

и другие.

IEEE Access, Год журнала: 2023, Номер 11, С. 62697 - 62720

Опубликована: Янв. 1, 2023

The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate wireless connection between meters in AMI, these infrastructures are considered Low-power Lossy Networks (LLNs). routing protocol an AMI network is crucial for ensuring availability timeliness data transfer. IPv6 Routing Protocol lossy networks (RPL) excellent option communication configuration. However, it highly at risk against many external internal attacks, its effectiveness may be severely diminished by Sybil assault. Different trust-based techniques have been suggested mitigate attacks. existing trust systems high energy consumption issues, which cause a reduction performance LLNs due complex calculations node level. Therefore, this paper presents novel fog-enabled GINI index-based mechanism (GITM) attacks using forwarding behavior legitimate member nodes. Regarding identifying isolating assaults, our approach outperforms state-of-the-art methods. GITM detects isolates more number malicious nodes compared other within similar time frame. By proposed framework, attack detection increases 4.48%, reduces 21%, isolation latency 26.30% (concerning time). Furthermore, end-to-end delay merely 0.30% case, control messages decreases 28%.

Язык: Английский

Процитировано

18

Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election DOI
Jelena Vićić, Erik Gartzke

Journal of Peace Research, Год журнала: 2024, Номер 61(1), С. 10 - 27

Опубликована: Янв. 1, 2024

Russia’s cyber-enabled influence operations (CEIO) have garnered significant public, academic and policy interest. 126 million Americans were reportedly exposed to efforts the 2016 US election on Facebook. Indeed, extent that such shape political outcomes, they may prove far more consequential than other, flamboyant forms of cyber conflict. Importantly, CEIOs highlight human dimension Focused ‘hacking minds’ affecting individuals behind keyboards, as opposed hacking networked systems, represent an emergent form state activity. data for studying are often publicly available. We employ semantic network analysis (SNA) assess seldom analyzed in cybersecurity research – text actual advertisements from a prominent CEIO. examine content, well scope scale Russian-orchestrated social media campaign. While described ‘disinformation,’ our shows information utilized Russian CEIO was generally factually correct. Further, it appears African Americans, not white conservatives, target demographic Russia sought influence. conclude with speculation, based findings, about likely motives

Язык: Английский

Процитировано

7

Trust at Risk: The Effect of Proximity to Cyberattacks DOI Creative Commons
Miguel Alberto Gomez, Ryan Shandler

Journal of Global Security Studies, Год журнала: 2024, Номер 9(2)

Опубликована: Март 12, 2024

Abstract Proximity is a core feature of theories political violence, with the effects attacks rippling outward so that geographically proximate individuals experience more severe than those distant. However, this model proximity and exposure unlikely to recur for cyberattacks. The incorporeality cyber incidents absence physical epicenter constrain mechanism coupling distance harm. To empirically test relationship between cyberattacks, we conducted field study involving 707 German respondents following ransomware attack in Düsseldorf. We find classical “ripple effect” reversed, trust highest among people closer lowest postulate firsthand its effects, distant employ abstract conceptions consequences do not align actual events. Consequently, does confer security, it can even amplify adverse exposure. This finding highlights need governments actively work assuage public fears

Язык: Английский

Процитировано

6

Managing cyber risk, a science in the making DOI Open Access
Michel M. Dacorogna, Marie Kratz

Scandinavian Actuarial Journal, Год журнала: 2023, Номер 2023(10), С. 1000 - 1021

Опубликована: Апрель 25, 2023

Not a day goes by without news about cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties can be transformed into manageable risk. After reviewing the main characteristics risk, we consider three layers space: hardware, software psycho-cognitive layer. We ask ourselves is this risk different from others, modelling has been tackled needs to evolve, what are multi-facetted aspects management. wide exploration pictures science in making points questions solved for building resilient society.

Язык: Английский

Процитировано

13

An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks DOI Creative Commons
Zhen Wang, Anazida Zainal, Maheyzah Md Siraj

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Янв. 14, 2025

The application of artificial neural networks (ANNs) can be found in numerous fields, including image and speech recognition, natural language processing, autonomous vehicles. As well, intrusion detection, the subject this paper, relies heavily on it. Different detection models have been constructed using ANNs. While ANNs are relatively mature to construct models, some challenges remain. Among most notorious these bloated caused by large number parameters, non-interpretability models. Our paper presents Convolutional Kolmogorov-Arnold Networks (CKANs), which designed overcome difficulties provide an interpretable accurate model. (KANs) developed from representation theorem. Meanwhile, CKAN incorporates a convolutional computational mechanism based KAN. model proposed is incorporating attention mechanisms into CKAN's logic. datasets CICIoT2023 CICIoMT2024 were used for training validation. From results evaluating performance indicators experiments, CKANs has attractive prospect. compared with other methods, predict much higher level accuracy significantly fewer parameters. However, it not superior terms memory usage, execution speed energy consumption.

Язык: Английский

Процитировано

0