The "triptych of cyber security": A classifi cation of active cyber defence

نویسنده

  • Robert S. Dewar
چکیده

In the fi eld of cyber security, ill-defi ned concepts and inconsistently applied terminology are further complicating an already complex issue1. This causes diffi culties for policy-makers, strategists and academics. Using national cyber security strategies to support current literature, this paper undertakes three tasks with the goal of classifying and defi ning terms to begin the development of a lexicon of cyber security terminology. The fi rst task is to offer for consideration a defi nition of “active cyber defence” (ACD). This defi nition is based upon a number of characteristics identifi ed in current academic and policy literature. ACD is defi ned here as the proactive detection, analysis and mitigation of network security breaches in real-time combined with the use of aggressive countermeasures deployed outside the victim network. Once defi ned, ACD is contextualised alongside two further approaches to cyber defence and security. These are fortifi ed and resilient cyber defence, predicated upon defensive perimeters and ensuring continuity of services respectively. This contextualisation is postulated in order to provide more clarity to non-active cyber defence measures than is offered by the commonly used term “passive cyber defence”. Finally, it is shown that these three approaches to cyber defence and security are neither mutually exclusive nor applied independently of one another. Rather they operate in a complementary triptych of policy approaches to achieving cyber security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Psychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak

The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...

متن کامل

حاکمیت شبکه‌ای در نهادهای پژوهشی امنیت ‌سایبری

Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...

متن کامل

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

EU cyber - defence : a work in progress by Neil

The EU’s cyber defence agenda provides an opportunity to ask questions about what the EU could do in terms of setting security priorities. Furthermore, as a possible area for cooperation, cyber defence shares with military air logistics the peculiarity of being a common capability which does not require explicit war-like conditions to demonstrate its utility. Indeed, the diversity and complexit...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014