Volume 10, Issue 3

Volume 10, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2011

Welcome to the third issue of JIW for 2011 and the 30th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to security and risk within the broad frame of Information Warfare.

American Perspectives on Cyber and Security: Coining the Linguistic Tradition

ABSTRACT

Politicians can no longer escape commenting on cyber issues, which has made cyber discourse part of everyday politics. This article approaches political statements on 'cyber' and analyzes cyber discourse in the context of information operations. The empiricism of the article consists of language analysis, which covers both structural and semantic aspects of political cyber discourse. The results show that cyber is a synonym to threat: The U.S. has the identity of the vulnerable and technologically outdated, while the enemy is skilled and resourceful. This normalization of threat has become part of cyber discourse and legitimizes the exceptional security measures.

Does Traditional Security Risk Assessment have a Future in Information Security?

ABSTRACT

The current information security standards still advocate the use of risk assessment in the prioritisation of security investments. However, prior research on the use of risk assessment methodologies in organisational security has shown that the use of the traditional monolithic risk assessment process described in the current risk management standard is simply not practical at the organisational level. This paper first examines the problems in performing a systematic risk assessment and then discusses the limitations of a traditional risk assessment. To address these limitations, this paper proposes splitting up the current monolithic risk assessment process. The result is an information security assessment framework that puts greater emphasis on situational awareness and allows for better decision making on the prioritization of security investments.

Single and Double Power Laws for Cyber-Crimes

ABSTRACT

Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover whether or not they obey some form of power law relationship. Evidence is adduced for the existence of both single and double power laws, and their characteristic exponents are determined, together with various statistical and probabilistic reliability measures. The findings are interpreted in terms of the modus operandi of cyber-criminals as revealed in the CSI survey data. In particular, a distinction between opportunistic cyber-crime and serious organized cyber-crime is found at cyber-heists with an average magnitude of circa US$2.86M.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com