This research focused on how on the year of 2030 Indonesia will gain better governance in order to countermeasures terrorist threats, fairer human rights in terms of privacy and security in information and technology, also stronger Indonesia's national cyber security. Cases are taken firstly from nowadays Indonesia social conflict which started from the internet as society's first source of information regardless the validity of information and secondly from Indonesia's foreign policies towards private technology deals. By using the concept of cyber power and national security as paradigm, this research described how Indonesia going securely, equally, rapidly forward in line with globalization opportunities and technology dependencies. While minimizing invalid and provocative information as terrorist threat to Indonesia's sovereignty and integrity by improving the security of intellectual and on-field assets by integrating academia, military aspects and people's contribution to accelerate Indonesia's national potential in cyber security.
Protection of military management system, military technologies, modern weapons, aim determining targets and other systems against cyber attacks are studied in the article as one of topical and significant task for preventing influence of cyber attacks. C ; В статье рассматриваются вопросы защиты военных систем управления, военных технологий, современных оружейных комплексов, систем наведения и других систем от кибер атак и сокращения или предотвращения воздействий кибер атак как, одна из актуальных и неотло ; В статье рассматриваются вопросы защиты военных систем управления, военных технологий, современных оружейных комплексов, систем наведения и других систем от кибер атак и сокращения или предотвращения воздействий кибер атак как, одна из актуальных и неотло
Currently, online social networks are essential platforms for political organizations to monitor public opinion, disseminate information, argue with the opposition, and even achieve spin control. However, once such purposeful/aggressive articles flood social sites, it would be more difficult for users to distinguish which messages to read or to trust. In this paper, we aim to address this issue by identifying potential "cyber-armies/professional users" during election campaigns on social platforms. We focus on human-operated accounts who try to influence public discussions, for instance, by publishing hundreds/thousands of comments to show their support or rejection of particular candidates. To achieve our objectives, we collected activity data over six months from a prominent Taiwan-based social forum before the 2018 national election and applied a series of statistical analyses to screen out potential targets. From the results, we successfully identified several accounts according to distinctive characteristics that corresponded to professional users. According to the findings, users and platforms could realize potential information manipulation and increase the transparency of the online society.
Currently, online social networks are essential platforms for political organizations to monitor public opinion, disseminate information, argue with the opposition, and even achieve spin control. However, once such purposeful/aggressive articles flood social sites, it would be more difficult for users to distinguish which messages to read or to trust. In this paper, we aim to address this issue by identifying potential &ldquo ; cyber-armies/professional users&rdquo ; during election campaigns on social platforms. We focus on human-operated accounts who try to influence public discussions, for instance, by publishing hundreds/thousands of comments to show their support or rejection of particular candidates. To achieve our objectives, we collected activity data over six months from a prominent Taiwan-based social forum before the 2018 national election and applied a series of statistical analyses to screen out potential targets. From the results, we successfully identified several accounts according to distinctive characteristics that corresponded to professional users. According to the findings, users and platforms could realize potential information manipulation and increase the transparency of the online society.
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 1, Heft 3, S. 70-80
One of the reasons offered for gaps in organizations' cyber security is the lack of a "cyber security culture." This article defines and explores the concept of cyber security culture within the context of the U.S. Army. It concludes that the Army would benefit from the creation and adoption of a cyber security culture, though it would not be a security panacea. The article concludes by identifying and describing important elements of such a culture and practical advice for approaching culture change. These include: the development of policies that can be understood, adhered to, and enforced; change management efforts that unfreeze current culture, seek change, then refreeze/institutionalize changes; a structure that offers incentives for desired behaviors but also identifies and enforces compliance; and change efforts that emphasize change in knowledge/awareness and in attitude.
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation's mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions? ; "May 2013." ; Includes bibliographical references. ; 1. Introduction / Tarek Saadawi, Louis H. Jordan, Jr., and Vincent Boudreau -- Part I: Economics and social aspects of cyber security. 2. Exploring the economics of the malicious software market / Thomas J. Holt -- 3. The emergence of the civilian cyber warrior / Max Kilger -- Part II: Law and cybercrime. 4. Changing the game : social and justice models for enhanced cyber security / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- 5. An institutional and developmental analysis of the data breach disclosure laws / Melissa Dark -- 6. Cyber security and identity : solutions for critical infrastructure that protect civil liberties and enhance security / Joshua Gruenspecht -- 7. Exploring the utility of open source data to predict malicious software creation / George W. Burruss, Thomas J. Holt, and Adam M. Bossler -- Part III: Cyber infrastructure. 8. ISP grade threat monitoring / Abhrajit Ghosh -- 9. The challenges associated with assessing cyber issues / Stuart H. Starr. ; Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation's mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions? ; Mode of access: Internet.
Former NPS students and U.S. Army War College Fellows Army Lt. Cols. Robert Schultz and Patrick Duggan earned first-place honors while competing in the 2015 Chairman of the Joint Chiefs of Staff National Defense and Military Strategy Essay Competition. But while the accolades were appreciated, the ideas espoused by Schultz and Duggan may linger long after the applause has faded.
"RAND Arroyo Center was asked by U.S. Army Cyber Command's G35 office to develop and document an Army strategy for providing cyber support to corps and below, which is synonymous with tactical cyber operations. This report describes how the Army should use available resources to achieve the mission objectives inherent to tactical cyber operations. Cyber operations are increasingly important to the Army and other services' ability to seamlessly incorporate actions in cyberspace with activities in traditional warfighting domains (land, air, maritime, and space). This report proposes a strategy for tactical Army cyber operations, enumerating overarching goals, objectives, and associated activities. As part of this strategy, the authors describe what the Army, as an institution, needs to do to realize a vision for tactical cyber operations. In addition, this report discusses the incorporation and use of offensive cyber operations, specifically at the tactical level."--Publisher's description
Kecemasan terhadap cyber crime telah menjadi perhatian dunia, namun tidak semua negara di dunia ini memberikan perhatian yang lebih besar terhadap masalah cyber crime dan memiliki peraturannya kecuali negara-negara maju dan beberapa negara berkembang. Tujuan penelitian ini adalah dalam rangka menemukan, mengkaji dan menganalisa upaya pemerintah Indonesia dalam perlindungan terhadap data informasi rahasia negara dan meneliti tentang bentuk-bentuk perlawanan pemerintahan Indonesia terhadap cyber war. Menemukan rekonstruksi pembentukan national cyber defense atau cyber army dalam upaya mempertahankan kedaulatan negara. Dalam UU No. 3 Tahun 2002 tentang Pertahanan Negara, telah ditetapkan bahwa ancaman dalam sistem pertahanan negara terdiri dari ancaman militer dan ancaman non militer, termasuk diantaranya ancaman siber. Salah satu efek samping negatif dari perkembangan dunia siber melalui internet antara lain adalah kejahatan dalam bentuk pelanggaran hukum atau cyber crime, di mana bila eskalasinya lebih meluas dapat mengancam kedaulatan negara, keutuhan wilayah maupun keselamatan bangsa. Sebagai upaya penanggulangan terhadap serangan-serangan di dunia maya ini, diperlukanlah sebuah lembaga yang bertugas menjadi benteng pertahanan dunia siber atau cyber defense.Anxiety against cybercrime has become the world's attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country's defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country's sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world's bulwark cyber or cyber defense.