"Hacking Back – Offense/Defense in Enterprise IT Security", by Edgar Hurtado Jr, East Carolina University ICTN-4040: Enterprise Information Security, April 2017, 9 pages.
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Thursday, April 27, 2017
IISS Cyber Report: 13 to 19 April, 2017
"IISS Cyber Report: 13 to 19 April", 2017. This online report is a weekly digest of the world's cyber security news.
A Tech Accord to protect people in cyberspace
"A Tech Accord to protect people in cyberspace", Microsoft Policy Papers, April 2017.
"People need to trust technology, the makers of technology, and cyberspace itself" [...] "The government and the technology industry must partner on cybersecurity".
Microsoft suggests to share responsibilities in the governance of cybersecurity between private and state actors.
A Digital Geneva Convention to protect cyberspace
"A Digital Geneva Convention to protect cyberspace", Microsoft Policy Papers, April 2017.
"Governments continue to invest in greater offensive capabilities in cyberspace, and nation-state attacks
on civilians are on the rise" [...] "A Digital Geneva Convention would create a legally binding framework to govern states’ behavior in
cyberspace".
An attribution organization to strengthen trust online
"An attribution organization to strengthen trust online", Microsoft Policy Papers, April 2017.
"The world needs a new form of cyber defense. An organization that could receive and analyze the
evidence related to a suspected state-backed cyberattack, and that could then credibly and publicly
identify perpetrators, would make a major difference to the trust in the digital world." [...] "The expertise of private sector technology firms should be the basis of this non-political, technicallyfocused
attribution organization."
But should the privatization of such attribution function guarantee transparency, efficiency, and politically-neutral analysis and interpretation of facts and data?
Wednesday, April 26, 2017
Cybersecurity in the Defense Acquisition System
"Cybersecurity in the Defense Acquisition System", DAU, USA, April 2017, 27 pages. Download.
UK - Cyber security breaches survey 2017
"Cyber security breaches survey 2017", Main Report, April 2017, 66 pages, UK.
"This report details the findings from a quantitative and qualitative survey with UK businesses on cyber
security. The Department for Culture, Media and Sport (DCMS) commissioned the survey as part of the
National Cyber Security Programme, following a previous comparable study by the Department
published in 2016.
1
It was carried out by Ipsos MORI, in partnership with the Institute for Criminal Justice
Studies at the University of Portsmouth, and comprised:
▪ a telephone survey of 1,523 UK businesses from 24 October 2016 to 11 January 20172
▪ 30 in-depth interviews undertaken in January and February 2017 to follow up businesses that
participated in the survey...."
Telstra Cyber Security Report 2017
"Telstra Cyber Security Report 2017", 2017, 52 pages. Download. "Telstra engaged a research firm, Frost
& Sullivan, to interview professionals
responsible for making IT security
decisions within their organisation
to obtain a number of key insights on
a range of security topics. The report
also draws on analysis of security
information and data gathered from
Telstra infrastructure, security products
and our third-party security partners.
The research firm’s online surveys
obtained 360 responses. 58 per cent
of these responses were from Asia and
the remaining 42 per cent were from
respondents based in Australia...."
Cyber Security in Canada
"Cyber Security in Canada: Practical Solutions to a Growing Problem", The Canadian Chamber of Commerce, April 2017, 44 pages.
UNODA - Developments in the field of information and telecommunications in the context of international security
UNODA - "Developments in the field of information and telecommunications in the context of international security", Fact Sheet, April 2017, 2 pages.
G7 Declaration on responsible states behavior in cyberspace
"G7 Declaration on responsible states behavior in cyberspace". Lucca, 11 April 2017. 5 pages. Download the document.
Getting beyond Norms When Violating the Agreement Becomes Customary Practice
"Getting beyond Norms When Violating the Agreement Becomes Customary Practice", Melissa Hathaway, CIGI Papers No. 127 — April 2017, 16 pages.
About Cyber-Routine Activities Theory
"Capable Guardianship and CRISIS of IdentityTheft in the United States: ExpandingCyber-Routine Activities Theory", Back Sinchul, Sung Yongeun, Cruz Erik, International journal of crisis & safety, 2017 2(1) 16-24.
Fair Use and IP Infringement on Instagram, Pinterest and Other Social Media
"Fair Use and IP Infringement on Instagram, Pinterest and Other Social Media. Policing and Protecting Licenses, Copyright and Trademark Rights
", April 26, 2017, Strafford. Presenting a live 90-minute webinar with interactive Q&A. The online program provides a copy of "Copyright Fair Use", Excerpted from Chapter 4 (Copyright Protection in Cyberspace) of
E-Commerce and Internet Law: A Legal Treatise With Forms, Second Edition,
a 5-volume legal treatise by Ian C. Ballon (Thomson/West Publishing 2017).
Cybercrime Coordination and Partnership Exercise
"Cybercrime Coordination and Partnership Exercise", 24-28 April 2017, Tbilisi, Georgia, Provided under iPROCEEDS and Cybercrime@EAP III projects. More information...
Tuesday, April 25, 2017
Summer School on Cybercrime
"Summer School on Cybercrime", Milan, Italy, 3 – 6 July 2017. More information...
Monday, April 24, 2017
Theorizing cyber coercion: The 2014 North Korean operation against Sony
"Theorizing cyber coercion: The 2014 North Korean operation against Sony" by Trevis Sharp, Journal of Strategic Studies, Pages 1-29 | Published online: 11 April 2017. Abstract...
Thursday, April 20, 2017
Cyber Security: strategies, policies...
- "Cyber Security: Collaboration. Antigua and Barbuda". ITU, 23 March 2017, 30 pages. Download.
- "The UK’s National Cyber Security Strategy 2016 – 2021", UK Government, April 2017. Download.
- "CyberSecurity Strategy 2017-2019. State of Illinois", Department of Innovation and Technology, State of Illinois, 24 pages. Download.
- "National Security and Emergency Preparedness Department 2017 Cybersecurity Policy Priorities (Select Examples) ". US Chamber of Commerce. March 2017. 4 pages. Download.
Safety of data - The risks of cyber security in the maritime sector
"Safety of data - The risks of cyber security in the maritime sector", Netherlands Maritime Technology, April 2017, 22 pages. Download the document.
Ce type de documents est le produit d'une tendance de plus en plus affirmée dans le monde: des lectures sectorielles de la cybersécurité. Une lecture comparative de ces multiples approches sectorielles permettra (peut-être) de mettre en lumière des particularités.
Australia's Cyber Security Strategy - 2017
"Australia's Cyber Security Strategy - Enabling innovation, growth & prosperity".First ANnual Update, 2017. 29 pages, Download the document.
Saturday, April 15, 2017
Big Data Analytics
CSI Communications (India) published a special issue on "Big Data Analysis". Volume No. 41 | Issue No. 1 | April 2017, 52 pages. Among the topics covered in this issue: Role of Hadoop in Big Data Analytics, Data Lake: A Next Generation Data Storage System in Big Data Analytics, Sentiment and Emotion Analysis of Tweets Regarding Demonetisation, Enhanced Protection for Big Data using Intrusion Kill Chain and Data Science. Let's mention the more military-focused paper on "MiDeSH: Missile Decision Support System". Download the issue.
China Publishes Draft Measures Restricting Outbound Data Transfers
"China Publishes Draft Measures Restricting Outbound Data Transfers"', Latham & Watkins Data Privacy, Security & Cybercrime Practice, 14 April 2017 | Number 2119, "The Cyberspace Administration of China (CAC) has published a draft law that places wide-ranging
restrictions on companies seeking to transfer personal information and critical data, as defined below,
(collectively, Relevant Data) out of China..." Download the document.
Friday, April 14, 2017
Chinese Political and Military Thinking Regarding Taiwan and East and South China Seas
"Chinese Political and Military Thinking Regarding Taiwan and East and South China Seas", Testimony presented before the U.S.-China Economic and Security Review Commission on April 13, 2017. Download the report.
Tuesday, April 11, 2017
APCERT 2016 Report
"The Asia Pacific Computer Emergency Response Team (APCERT) is a coalition of
Computer Emergency Response Teams (CERTs) and Computer Security Incident
Response Teams (CSIRTs) within the Asia Pacific region. The organisation was
established in February 2003 with the objective of encouraging and supporting the
activities of CERTs/CSIRTs in the region".
Subscribe to:
Posts (Atom)