Journal: CSS Cyberdefense Trend Analyses

Loading...

Abbreviation

Publisher

Center for Security Studies (CSS), ETH Zürich

Journal Volumes

ISSN

Description

Search Results

Publications1 - 7 of 7
  • Baezner, Marie; Robin, Patrice (2018)
    CSS Cyberdefense Trend Analyses
    This Cyber Defense Trend Analysis argues that while cyber sovereignty is regularly referenced in political, economic and legal discussions, the concept has no fixed definition. In response to this, as well as to highlight why using the term in the same way as strategic autonomy is a misnomer, our authors analyze references to cyber sovereignty in national cybersecurity strategies, current academic discussion and debates on sovereignty in other domains. Baezner and Robin also explore the similarly ill-defined concept of data sovereignty, outlining why control over data depends more on how it is stored than where.
  • Cybersecurity at Big Events
    Item type: Report
    Crelier, Alice (2019)
    CSS Cyberdefense Trend Analyses
    High-profile events, such as the G20 Summits and the Olympic Games, are increasingly influenced by globalization, geopolitical developments and digitalization. Alice Crelier writes that these elements open the door for the proliferation of nefarious cyber activities. Due to their costs, political implications, reach through media and reputational significance, such events cannot neglect cybersecurity. In response, Crelier here defines an approach to big events and addresses key issues regarding cybersecurity organizational processes and incidents. To do so, she also uses the G20 Leaders’ Summits and recent Olympic Games as case studies
  • Crelier, Alice (2019)
    CSS Cyberdefense Trend Analyses
    This analysis argues that the Internet of Things (IoT) is regularly referenced in technical, economic and legal discussions, yet the concept has no fixed definition. Moreover, research within this field has shown that the number of unsecured or obsolete connected devices has increased to such an extent that it now poses safety and security concerns in all societal sectors. In response, and to highlight how the IoT challenges society, this report looks at 1) the economics of the IoT and the overreaching trend of the market’s trade-off between costs and security; 2) IoT-related incidents; 3) the IoT regulation landscape and 4) IoT-related challenges in the defense sector.
  • Dewar, Robert (2017)
    CSS Cyberdefense Trend Analyses
    The number of cyberincidents occurring globally is increasing. These incidents range from hacktivist defacement of websites and cyber-theft to large-scale ransomware attacks and state-sponsored network intrusions. One of the most important aspects to be considered when devising policy solutions and responses to these incidents is understanding the tools that have been used to carry them out. Some of the most high profile cyberincidents of the last decade have involved the deployment of cyberweapons, a highly sophisticated set of tools specifically designed to cause harm or damage. The impact of these cyberweapons – ranging from digital to physical damage – has elevated them to the level of national policy discussions. What constitutes a “cyberweapon” is still a matter of debate, however. By examining the tools used to carry out certain high-profile cyber incidents, this Trend Analysis examines and clarifies the nature of cyberweapons. Crucial to this clarification is the recognition that not all cybertools are weapons. To effectively designate a cybertool as a cyberweapon the context of a particular tool’s use must be considered. That context must include an examination of the capability of the tool to cause damage or harm and, most importantly, the intention of the tool’s user.
  • Cordey, Sean (2019)
    CSS Cyberdefense Trend Analyses
    This trends analysis reviews the historical, operational, organizational and cultural background of the Israeli 8200 Unit, a signals intelligence unit (SIGINT). It also provides an assessment of the unit’s core strengths and weaknesses. In addition to outlining some evidence of its prolific activities (e.g. operation Orchard or Stuxnet), the report finds that the Unit’s core strengths include its human and financial resources, institutional capabilities and know-how, internal culture, branding, selection process and close cooperation with the private sector. Meanwhile, Unit 8200 suffers from various political controversies, some bureaucratic encroachment, elitist tendencies, difficulties with former members and increased political scrutiny.
  • Active Cyber Defense
    Item type: Report
    Dewar, Robert S. (2017)
    CSS Cyberdefense Trend Analyses
    Active cyber defense (ACD) is an important but ill-defined concept in cyber security. This Trend Analysis (TA) aims to provide some conceptual clarity for the benefit of practitioners, scholars and policy-makers. It examines a series of techniques commonly associated with ACD and contextualizes them with resilient and fortification-based approaches to cyber defense. The TA also conducts an empirical, qualitative analysis of national cyber security strategies which demonstrates that ACD is not deployed in isolation, but as an important component in a wider, strategic approach to national cyber defense. The combination of conceptual clarity and policy-based analysis in the TA shows that a goal-oriented approach to strategic cyber defense is the best approach in this constantly shifting security field, as it allows for the most appropriate and effective tools to be selected depending on circumstances.
  • Soesanto, Stefan (2019)
    CSS Cyberdefense Trend Analyses
    This trend analysis provides a historical overview of the evolutionary path US cyber defense strategy has taken since 1988. Largely, the analysis utilizes a deterrence-focused approach, rather than one driven by the intelligence community, legal sentiments, or private sector concerns. As such, it primarily looks at cyber-related events relevant to strategic developments within the US Department of Defense (DoD). Section one explains the DoD’s evolution in cyberspace between 1988 and 2008, which was almost exclusively focused on experimentation and adaptation after every incident that hit DoD networks. Section two dives into the policy discrepancies and emerging internal conflicts during the Obama administration on offensive capabilities and cyber deterrence mechanisms. Section three then explores the changes during the first three years of the Trump administration and the introduction of persistent engagement. Section four highlights issues that currently remain unresolved, and section five provides a summary conclusion and several lessons learned.
Publications1 - 7 of 7