"Governing the “Digital Shadows”: Public Policy
and Information Communication Technology
(ICT) Acquisition and Utilization in Africa. Article by Ebenezer Olatunji Olugbenga, Open Access Library
Journal, https://doi.org/10.4236/oalib.1103564, 23 pages
eConflicts is a blog written by Daniel Ventre, about cyberconflicts, cyberwar, cybersecurity / cyberdefense, information warfare, cybercrime, political science and international relations
Total Pageviews
Friday, April 28, 2017
Remarks by OSCE Secretary General Lamberto Zannier
Remarks by OSCE Secretary General Lamberto Zannier, 6th Moscow Conference on International Security, 26 April 2017, 4 pages.
"The norms and principles that underpinned the
international order for decades are being contested. Some tools have become obsolete, and we
are struggling to develop policies to address new challenges like cyber-threats. In this regard,
we have some measures in place to prevent conflict stemming from cyber-threats, but
implementation is lacking."
Thursday, April 27, 2017
Attacks with Exploits: from everyday threats to targeted campaigns - Kaspersky Lab Report
"Attacks with Exploits: from everyday threats to targeted campaigns" - Kaspersky Lab Report, April 2017, 28 pages.
"An ‘exploit’ is a computer program created to take advantage of a security vulnerability in
another software program. Exploits provide malicious actors with a way of installing
additional malware on a system". According to the conclusions of the report, "in 2016 the number of attacks with exploits increased 24.54%, to 702,026,084
attempts to launch an exploit." but "4,347,966 users were attacked with exploits in 2016 which is 20.85% less than in the
previous year."
The "Smart" Fourth Amendment - by Andrew Guthrie Ferguson
"The "Smart" Fourth Amendment", article by Andrew Guthrie Ferguson, Cornell Law Review, Vol.102, pp.547-632, 2017. "This Article addresses the question of how the Fourth
Amendment should protect “smart data.” It exposes the growing
danger of sensor surveillance and the weakness of current
Fourth Amendment doctrine. The Article then suggests a new
theory of “informational curtilage” to protect the data trails
emerging from smart devices and reclaims the principle of
“informational security” as the organizing framework for a
digital Fourth Amendment."
Cybersecurity: Critical Infrastructure Authoritative Reports and Resources - CRS Report
"Cybersecurity: Critical Infrastructure Authoritative Reports and Resources", by Rita Tehan - CRS Report. April 21, 2017, 43 pages. This document provides a lot of information about critical infrastructures in the U.S (through a sectorial presentation: energy, financial industry, health, telecommunications, transports), and their vulnerabilities to cyber operations (for instance, let's notice that "U.S. critical infrastructure systems experienced a 20% increase in
attempted cybersecurity breaches in FY2015, ICS-CERT responded
to 295 cybersecurity incidents involving critical infrastructure,
compared with 245 in fiscal 2014").
Symantec - Internet Security Threat Report. Vol. 22
Symantec - Internet Security Threat Report. Vol. 22, April 2017, 77 pages.
"The Symantec Global Intelligence Network
tracks over 700,000 global adversaries and records
events from 98 million attack sensors worldwide.
This network monitors threat activities in over 157
countries and territories through a combination
of Symantec products, technologies, and services,
including Symantec Endpoint Protection™, Symantec
DeepSight™ Intelligence, Symantec Managed
Security Services™, Norton™ consumer products,
and other third-party data sources, generating
more than nine trillion rows of security data... " Download the report.
Hacking Back – Offense/Defense in Enterprise IT Security
"Hacking Back – Offense/Defense in Enterprise IT Security", by Edgar Hurtado Jr, East Carolina University ICTN-4040: Enterprise Information Security, April 2017, 9 pages.
IISS Cyber Report: 13 to 19 April, 2017
"IISS Cyber Report: 13 to 19 April", 2017. This online report is a weekly digest of the world's cyber security news.
A Tech Accord to protect people in cyberspace
"A Tech Accord to protect people in cyberspace", Microsoft Policy Papers, April 2017.
"People need to trust technology, the makers of technology, and cyberspace itself" [...] "The government and the technology industry must partner on cybersecurity".
Microsoft suggests to share responsibilities in the governance of cybersecurity between private and state actors.
A Digital Geneva Convention to protect cyberspace
"A Digital Geneva Convention to protect cyberspace", Microsoft Policy Papers, April 2017.
"Governments continue to invest in greater offensive capabilities in cyberspace, and nation-state attacks
on civilians are on the rise" [...] "A Digital Geneva Convention would create a legally binding framework to govern states’ behavior in
cyberspace".
An attribution organization to strengthen trust online
"An attribution organization to strengthen trust online", Microsoft Policy Papers, April 2017.
"The world needs a new form of cyber defense. An organization that could receive and analyze the
evidence related to a suspected state-backed cyberattack, and that could then credibly and publicly
identify perpetrators, would make a major difference to the trust in the digital world." [...] "The expertise of private sector technology firms should be the basis of this non-political, technicallyfocused
attribution organization."
But should the privatization of such attribution function guarantee transparency, efficiency, and politically-neutral analysis and interpretation of facts and data?
Wednesday, April 26, 2017
Cybersecurity in the Defense Acquisition System
"Cybersecurity in the Defense Acquisition System", DAU, USA, April 2017, 27 pages. Download.
UK - Cyber security breaches survey 2017
"Cyber security breaches survey 2017", Main Report, April 2017, 66 pages, UK.
"This report details the findings from a quantitative and qualitative survey with UK businesses on cyber
security. The Department for Culture, Media and Sport (DCMS) commissioned the survey as part of the
National Cyber Security Programme, following a previous comparable study by the Department
published in 2016.
1
It was carried out by Ipsos MORI, in partnership with the Institute for Criminal Justice
Studies at the University of Portsmouth, and comprised:
▪ a telephone survey of 1,523 UK businesses from 24 October 2016 to 11 January 20172
▪ 30 in-depth interviews undertaken in January and February 2017 to follow up businesses that
participated in the survey...."
Telstra Cyber Security Report 2017
"Telstra Cyber Security Report 2017", 2017, 52 pages. Download. "Telstra engaged a research firm, Frost
& Sullivan, to interview professionals
responsible for making IT security
decisions within their organisation
to obtain a number of key insights on
a range of security topics. The report
also draws on analysis of security
information and data gathered from
Telstra infrastructure, security products
and our third-party security partners.
The research firm’s online surveys
obtained 360 responses. 58 per cent
of these responses were from Asia and
the remaining 42 per cent were from
respondents based in Australia...."
Cyber Security in Canada
"Cyber Security in Canada: Practical Solutions to a Growing Problem", The Canadian Chamber of Commerce, April 2017, 44 pages.
Subscribe to:
Comments (Atom)