DocumentCode :
2126786
Title :
Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security
Author :
Kallberg, Jan ; Thuraisingham, Bhavani ; Lakomaa, Erik
Author_Institution :
Erik Jonsson Sch. of Eng. & Comput. Sci., Univ. of Texas at Dallas, Richardson, TX, USA
fYear :
2013
fDate :
12-14 Aug. 2013
Firstpage :
212
Lastpage :
215
Abstract :
The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state. Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value. The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyber defense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the state. The paper presents a case to use societal cyber war theory to create a public sector cyber defense strategy beforehand facing a massive state actor initiated automated systematic cyber attacks to limit the risk for a societal system shock. Societal cyber war theory utilizes a theoretical framework created by political scientist Dwight Waldo for government stability, turns it upside down, and uses the theory to identify cyber targets and aim points. As a theory it can be used in cyber defense and offense as the institutional weaknesses can be either attacked or defended. According to societal cyber war theory the aim points to be targeted by an automated premeditated systematic attack that will cripple the targeted nation is the five pillars that upholds the state - legitimacy, authority, knowledge, control, and confidence. The failure to protect the institutional stability could undermine the state´s ability to avoid submission to foreign power.
Keywords :
government policies; politics; public administration; security of data; anecdotal cyber interchanges; automated premeditated systematic attack; cyber target identification; disruptive power; government activities; information security activities; institutional destabilization; institutional stability; marginal geopolitical value; massive state actor initiated automated systematic cyber attacks; political scientist Dwight Waldo; public sector cyber defense strategy; public sector information security; public trust; societal cyberwar theory; societal system shock; state actor aggression; systematic cyber conflict; welfare state; Educational institutions; Entropy; Government; Knowledge management; Sociology; Statistics; Systematics; cyber operations; cyberdefense; cyberwar; defense; information assurance; information operations; offensive cyber operations; societal cyberwar theory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (EISIC), 2013 European
Conference_Location :
Uppsala
Type :
conf
DOI :
10.1109/EISIC.2013.47
Filename :
6657157
Link To Document :
بازگشت