Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Shared understanding of the operational environment in the cyber domain is the key enabler of NATO’s cyber posture. However, there have been no attempts to evaluate empirically the impact of the war in Ukraine on intra-Alliance coherence. This study applies a novel methodology based on computation text analysis to evaluate the trends within the recently adopted national cyber strategies with regards to the description of threats, risks, and actors involved in carrying out these threats – in particular, Italy, Latvia, the United Kingdom, and the United States. The analysis shows that before the large-scale invasion, the congruence was low between the two continental European states vis-a-vis the UK and the US on threat and risk assessment. After the invasion, these differences became smaller and the language of the updated National Cyber Security Strategies became more homogeneous as measured by the cosine similarity scores. There are still differences in the discussion of relevant actors in cyberspace. The methodology applied here can be extended to measure the cohesiveness of the Alliance’s cyber posture along other dimensions.
Czasopismo
Rocznik
Tom
Strony
261--271
Opis fizyczny
Bibliogr. 20 poz., rys., tab.
Twórcy
autor
- Research Division, NATO Defense CollegeRome, Italy
Bibliografia
- [1] U.S. Department of Defense. (Sep. 12, 2023). Summary: 2023 Cyber strategy. [Online]. Available: https://media.defense.gov/2023/Sep/12/2003299076/-1/-1/1/2023_DOD_Cyber_Strategy_Summary.PDF. [Accessed: Feb. 01, 2024].
- [2] Cyber Peace Institute. (Dec. 21, 2023). Cyber dimensions of the armed conflict in Ukraine-Q3, 2023. [Online]. Available: https://cyberpeaceinstitute.org/publications/cyber-dimensions-of-the-armed-conflict-in-ukraine-q3-2023/. [Accessed: Dec. 24, 2023].
- [3] Digwatch Online Platform. Ukraine conflict: Digital and cyber aspects. [Online]. Available: https://dig.watch/trends/ukraine-conflict-digital-and-cyber-aspects. [Accessed: May 01, 2023].
- [4] S. Duguin, P. Pavlova. (2023). The role of cyber in the Russian war against Ukraine: It’s impact and the consequences for the future armed conflict. [Online]. Available: https://www.europarl.europa.eu/thinktank/en/document/EXPO_BRI(2023)702594. [Accessed: Oct. 17, 2023].
- [5] H. Lin, “Russian cyber operations in the invasion of Ukraine,” The Cyber Defense Review, vol. 7, no. 4, pp. 31–46, 2022.
- [6] G.B. Mueller, B. Jensen, B. Valeriano, R.C. Maness, J.M. Macias. (2022). Cyber operations during the Russo-Ukrainian war: From strange patterns to alternative futures. [Online]. Available: https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war. [Accessed: Oct. 02, 2023].
- [7] T. Starks. (Feb. 16, 2023). “What we’ve learned from a year of Russian cyberattacks in Ukraine,” The Washington Post [Online]. Available: https://www.washingtonpost.com/politics/2023/02/16/what-we-learned-year-russian-cyberattacks-ukraine/. [Accessed: Feb. 19, 2023].
- [8] M. Willet, “The cyber dimension of the Russia–Ukraine war,” Survival, vol. 64, no. 5, pp. 7–26, 2022, doi: 10.1080/00396338.2022.2126193.
- [9] A. Paulus. (Dec. 09, 2021). German cybersecurity policy. [Online] Available: https://directionsblog.eu/. [Accessed: Jan. 05, 2024].
- [10] F. Oorsprong, P. Ducheine, P. Pijpers, “Cyber-attacks and the right of selfdefense: A case study of the Netherlands,” Policy Design and Practice, vol. 1, no. 23, 2023, doi: 10.1080/25741292.2023.2179955.
- [11] A. Jacuch, “Comparative analysis of cybersecurity strategies. European Union strategy and policies. Polish and selected countries strategies,” Modeling the new Europe, vol. 37, pp. 102–120, 2021, doi: 10.24193/OJMNE.2021.37.06.
- [12] J. Neville, “Posturing US cyber forces to defend the homeland,” The Cyber Defense Review, vol. 8, no. 2, pp. 105–128, 2023.
- [13] A. Mishra, Y.I Alzoubi, M.J. Anwar, A.Q. Gill, “Attributes impacting cybersecurity policy development: An evidence from seven nations,” Computers & Security, vol. 120, 2022, doi: 10.1016/j.cose.2022.102820.
- [14] N. Shafqat, A. Masood, “Comparative analysis of various national cyber security strategies,” (IJCSIS) International Journal of Computer Science and Information Security, vol. 14, no. 1, pp. 129–136, 2016.
- [15] M. Song, D.H. Kim, S. Bae, S.J. Kim, “Comparative analysis of national cyber security strategies using topic modelling,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, no. 12, 2021, doi: 10.14569/IJACSA.2021.0121209.
- [16] A.R. Lahitani, A.E. Permanasari, N.A. Setiawan, “Cosine similarity to determine similarity measure: Study case in online essay assessment.” 4th International Conference on Cyber and IT Service Management, Bandung, Indonesia, 2016, pp. 1–6, doi: 10.1109/CITSM.2016.7577578.
- [17] D. Gunawan, C.A. Sembiring, M.A. Budiman, “The implementation of cosine similarity to calculate text relevance between two documents.” 2nd International Conference on Computing and Applied Informatics 2017 28–30 November 2017, Medan, Indonesia, 2018, pp. 1–6, doi: 10.1088/1742-6596/978/1/012120.
- [18] T. Kosub, “Components and challenges of integrated cyber risk management,” ZVersWiss, vol. 104, pp. 615–634, 2015, doi: 10.1007/s12297-015-0316-8.
- [19] NATO. (Jul. 11, 2023). Vilnius Summit Communiqué [Online]. Available: https://www.nato.int/cps/en/natohq/official_texts_217320.htm. [Accessed: Nov. 14, 2023].
- [20] European Commission. (2022). The Strategic Compass of the European Union. [Online]. Available: https://www.strategic-compass-european-union.com. [Accessed: Jan. 23, 2023].
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f7dce420-7dd8-4d55-ba84-96b79b031b0b
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.