Search GSSD

Cyber Security – Threat Scenarios, Policy Framework and Cyber Wargames

Abstract: 
" Securing digital assets is an extremely difficult and strategic challenge worldwide that requires technology, cooperation between the public and private sector, military and civilian education and training, and a legal and policy framework. Unfortunately, cyber-crime and cyber–terrorism are on the rise and the perpetrators operate from shadows without boundaries. The technology that is developed to enhance our capabilities has the capacity to inflict harm by way of misusing information, pilfering financial assets, jeopardizing safety, security and integrity of our critical infra-structure. The nature of the technology and our growing reliance on its reliability and security opens vulnerability on a personal to national scale. A cyber-attack by small groups or individuals capable of large consequence is now a reality. Nation states and significant sub national actors are developing skills to promote political motives into the cyberspace with cyber crime as the noise that obfuscates the methods and tactics of cyberwar. Cyber-wars are always ongoing, however events such as a “Cyber-9/11” or the “Cyber Pearl Harbor”, though possible cannot be predicted. Cyber-war has escalated in a pervasive manner with advanced persistent threats infiltrating our national security and defense industrial base systems. Urgency exists worldwide to define a national cyber policy to enhance resiliency in the cyber domain. This requires examining consequence and probability while exploring methods for escalation of response to be considered. Defining what indicators and warnings will engage a national response to the cyber event is a representation of the national capability and priorities. At what point do nations collaborate with national partners to respond as a region. Each national policy will mirror the will of the society and government adopting those tenets but some basic parameters help to lead the development of the policy. The policy must be tested and processes developed and exercised to ensure resiliency. A critical element of national policy and regional collaboration must be the development of national and regional cyber exercises and war-games that hone response and refine capability. Finally, cooperation across multiple nations requires the development of trust initially to create the legal framework for sharing information and resources. "
Author: 
Ashok Vaseashta, Philip Susmann, and Eric Braman
Institution: 
IASC/ICWI; Norwich University Applied Research Institutes
Year: 
2014
Domains-Issue Area: 
Dimensions-Problem/Solution: 
Region(s): 
Industry Focus: 
Internet & Cyberspace
Country: 
United States of America
Datatype(s): 
Indicators
Models