Cyber Defence

Defending Smart Grid Infrastructure—A Scenario-Based Analysis of Cybersecurity and Privacy Rules in China, France, Russia, UK, and USA

Abstract:

The digitization of the electric energy grid enlarges its attack surface and makes the infrastructure increasingly vulnerable to digital warfare. Therefore, national legislation is central to defending critical energy infrastructure against terrorist and nation-state attacks in cyberspace. Still, previous studies have found shortcomings in cybersecurity legislation. To support smaller countries in their policymaking, this study describes a normative ideal in the form of a consolidated security policy framework. The framework consists of 25 policies that are based on cybersecurity and privacy rules of five countries with strong cyber defence capabilities; the framework addresses five cyberattack scenarios with a very high consequence potential. This study shows that the consolidated policies provide a holistic cyber defence framework, covering strategic, tactical, and operational levels, including obligations on both authority and industry levels.

Utilisation of the Cyber Security Challenge for Learning within the South African Perspective

Abstract:

Globally, cyber security is one of the fastest growing fields—where the number of cyber warfare and jobs for cyber defense professionals far outpaces the number of available professionals. Industry and government professionals in South Africa who have seen and experienced these gaps are involved in various initiatives to support cyber security education. One such initiative is the annual Cyber Security Challenge, with the main aim to introduce students to the real-world applications of cyber security, to motivate them to consider a career path in this industry, and to expose them to cyber warfare and defence as career options.

Optimal Sensor Placement in the Network Structure from a Defence Point of View

Abstract:

This article presents a method for optimising sensor placement in a general network topology. Sensor placement is calculated by balancing maximised closeness to the monitored nodes with sensor location distribution for protection. The model serves cyber defence planning and critical infrastructure defence. It uses node and link weights as parameters to describe information quantity, data importance to a defender, and criticality to the network operator. General network analysis, together with a penalty factor for describing distributed defence requirements, underpins the methodology. The Sprint operator network in the USA is used as an example to demonstrate the methodology.

Cyber-Physical War Gaming

Abstract:

This  paper  presents  general  strategies  for  cyber  war  gaming  of  Cyber-Physical Systems (CPSs) that are used for cyber security research at the U.S. Army Research Laboratory (ARL). 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com