PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cyberwarfare against Critical Infrastructures: Russia and Iran in the Gray Zone

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The holistic nature of security in a hyper-connected world has increased the relevance of cyber environment. One of the most relevant threats identified are the attacks against energy infrastructures. This article presents a comparative study of the actions launched by Russia and Iran in the cyber environment against energy supply. Both States are specialized in asymmetric strategies and tactics in which cyber has a core role. The research analyzes the main actions against energy supply infrastructures, studying the pursued objectives and identifying their potential political results. The document is structured by a first theoretical approach to the use asymmetric gray zone and hybrid strategies, focusing on the use of cyber by Rogue States. From this approach, the analysis reflects the political visions of Russia and Iran, linking it with the Russian actions in Ukraine, as well as the Iranian cyber offensives against western targets. Conclusions reflects about the effectiveness of these strategies to the general strategy of both States.
Słowa kluczowe
Rocznik
Strony
1--19
Opis fizyczny
Bibliogr. 39 poz.
Twórcy
  • Department of Political Science and Public Administration, University of Granada, Spain,
  • Center of Political Studies, National Autonomous University, Mexico
  • Department of Political Science and Public Administration, University of Granada, Spain,
Bibliografia
  • 1. A. Pinedo Lapeña, “Ciberseguridad, geopolítica y energía,” in Energía y Geoestrategia, Spanish Ministry of Defense, Madrid: Spanish Institute for Strategic Studies, 2022, pp. 159 – 196.
  • 2. K. Melligan, “The Vulnerability of the United States Electrical Power Grid,” Journal of Applied Business and Economics, vol. 22, no. 7, pp. 155 – 163, 2020, doi: 10.33423/jabe.v22i7.3259.
  • 3. Z. Zhang, “Cybersecurity policy for the electricity sector: the first step to protecting our critical infrastructure from cyber threats,” Boston University Journal of Science& Technology Law, vol. 19, no. 2, pp. 319 – 366, 2013.
  • 4. A. Yates, “Death modes from a loss of energy infrastructure continuity in a community setting,” Homeland Security & Emergency Management, vol. 10, no. 2,pp. 587 – 608, 2013, doi: 10.1515/jhsem-2012 – 0048.
  • 5. E. Hatipoglu, S. Al Muhanna, B. Efird, “Renewables and the future of geopolitics: Revisiting main concepts of international relations from the lens of renewables, ”Russian Journal of Economics, vol. 6, no. 4, 2020, pp. 358 – 373, 2020, doi: 10.32609/j.ruje.6.55450.
  • 6. J.A. Lewis. (2010). The Electrical Grid as a Target for Cyber Attack. [Online]. Available: http://csis-website-prod.s3.am... [Accessed: Dec. 29, 2023].
  • 7. A. I. Ayerbe, La ciberseguridad en el sector energético, ARI 3/2020. Madrid: Real Instituto Elcano, 2020.
  • 8. J.S. Nye, “Soft power,” Foreign Policy, vol. 80, pp. 153–171, 1990.
  • 9. J. S. Nye, Soft power: The means to success in world politics. New York: Public Affairs,2004.
  • 10. D. Belo, “Conflict in absence of war: a comparative analysis of China and Russia engagement in gray zone conflicts,” Canadian Foreign Policy Journal, vol. 26, no. 1,pp. 73 – 91, 2020, doi: 10.1080/11926422.2019.1644358.
  • 11. D. Ventre. Cyberwar and Information Warfare. London: ISTE, 2011.
  • 12. D. Yergin, “Ensuring Energy Security,” Foreign Affairs, vol. 85, no. 2, pp. 69–82,2006, doi: 10.2307/20031912.
  • 13. A. Sánchez-Ortega, Poder y seguridad energética en las relaciones internacionales: la estrategia rusa de poder. Granada: Editorial Universidad de Granada, 2012.
  • 14. S. Paltsev, “The complicated geopolitics of renewable energy,” Bulletin of the Atomic Scientists, vol. 72, no. 6, pp. 390 – 395, 2016, doi: 10.1080/00963402.2016.1240476.
  • 15. G. Escribano, “Geopolítica de la energía: identificación de algunas variables,”Índice: Revista de Estadística y Sociedad, vol. 46, pp. 12 – 14, 2011.
  • 16. J. Jordán, “Un modelo de análisis geopolítico para el e studio de las relaciones internacionales,” Documento Marco 04/2018, Instituto Español de EstudiosEstratégicos, 2018.
  • 17. J. J. Wirtz, “Life in the “Gray Zone”: observations for contemporary strategists,” Defense & Security Analysis, vol. 33, no. 2, pp. 106 – 114, 2017, doi:10.1080/14751798.2017.1310702.
  • 18. J. W. Matisek, “Shades of Gray Deterrence: Issues of fighting in the Gray Zone, ”Journal or Strategic Security, vol. 10, no. 3, pp. 1 – 26, 2017.
  • 19. M. J. Mazarr, Gray Zone: Understanding a Changing Era of Conflict. Carlisle: United States Army War College Press, 2015.
  • 20. R. Stiennon, Surviving cyberwar. Plymouth: Government Institutes, 2010.
  • 21. E. Schmidt, J. Cohen, The new digital era: Reshaping the future of people, nations and business. New York: Random House, 2013.
  • 22. A. Greenberg, Sandworm: A new era of Cyberwar and the Hunt for the Kremlin’smost dangerous hackers. New York: Doubleday, 2018.
  • 23. B. Groys, “Russia and the West: The Quest for Russian National identity,” Studiesin Soviet Thought, vol. 43, no. 3, pp. 185 – 198, 1992.
  • 24. J. Mankoff, “Russia and the West: Taking the longer view,” The Washington Quarterly, vol. 20, no. 2, pp. 123 – 135, 2007.
  • 25. E. Rummer, A. Stent, “Russia and the West,” Survival: Global Politics and Strategy, vol. 51, no. 2, pp. 91 – 104, 2009, doi: 10.1080/00396330902860835.
  • 26. M. Skladanowski, “The Myth of Russian Exceptionalism: Russia as a Civilization and its Uniqueness in Aleksandr G. Dugin’s Thought,” Politics, Religion and Ideology, vol. 4, no. 20, pp. 423 – 446, 2019, doi: 10.1080/21567689.2019.1697870.
  • 27. N. Mina, Blogs, cyber-literature and virtual culture in Iran. George C. Marshall: European Center for Security Studies, 15, 2007.
  • 28. E. Morozov, The net delusion. The Darkside of the Internet Freedom. New York: Public Affairs, 2012.
  • 29. United States Institute for Peace. (May 03, 2023). Report. Iran accelerates cyber--attacks. [Online]. Available: https://iranprimer.usip.org/bl... [Accessed: Dec. 29, 2023].
  • 30. Check Point Research. (Jan. 05, 2023). Check Point Research Reports a 38%Increase in 2022 Global Cyberattacks. [Online]. Available: https://blog.checkpoint.com/20... [Accessed: Jan. 25, 2024].
  • 31. T. Maurer, G. Hinck, “Russia: Information Security meets cyber security,” in Confronting an axis of cyber? China, Iran, North Korea, Russia in Cyberspace, F. Rugge, Ed. Milan: Institute for International Political Studies (ISPI), 2018, pp. 39 – 57.
  • 32. E. Reichborn-Kjennerud, P. Cullen. (2016). What is hybrid warfare? [Online].Available: https://www.jstor.org/stable/p... [Accessed: Dec. 29, 2023].
  • 33. The Economist. (Nov. 30, 2022). Lessons from Russia’s Cyberwar in Ukraine. Science and Technology. [Online]. Available: https://www.economist.com/scie... [Accessed: Dec. 29, 2023].
  • 34. L. Tabanski, “Iran’s cybered warfare meets western cyber-insecurity,” in Confronting an axis of cyber? China, Iran, North Korea, Russia in Cyberspace, F. Rugge, Ed. Milan: Institute for International Political Studies (ISPI), 2018, pp. 121 – 141.
  • 35. G. Siboni, S. Kronenfeld, “Iran and Cyberspace Warfare,” Military and Strategic Affairs, vol. 4, no. 3, pp. 77 – 99, 2012.
  • 36. J. G. Spataro, “Iranian cyber espionage”. Master Thesis. Utica College, 2019.
  • 37. United States Institute for Peace. (May 3, 2023). Report. Iran accelerates cyber-attacks. [Online]. Available: https://iranprimer.usip.org/bl... [Accessed: Dec. 29, 2023].
  • 38. United Against Iranian Nuclear. (2023). Report: The Iranian Cyber threat. UAIN.[Online]. Available: https://www.unitedagainstnucle... [Accessed: Dec. 29, 2023].
  • 39. S. Jones, S. (Apr. 26, 2016). Cyber warfare: Iran opens a new front. Financial Times.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-61ad9d83-7039-42ed-b7e6-5e5b32eb2d29
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.