首页> 外文会议>International Conference on Cyber Conflict >The cyber decade: Cyber defence at a X-ing point
【24h】

The cyber decade: Cyber defence at a X-ing point

机译:网络十年:X-ing Point的网络防守

获取原文

摘要

As a consequence of the numerous cyber attacks over the last decade, both the consideration and use of cyberspace has fundamentally changed, and will continue to evolve. Military forces all over the world have come to value the new role of cyberspace in warfare, building up cyber commands, and establishing new capabilities. Integral to such capabilities is that military forces fundamentally depend on the rapid exchange of information in order for their decision-making processes to gain superiority on the battlefield; this compounds the need to develop network- enabled capabilities to realize network-centric warfare. This triangle of cyber offense, cyber defence, and cyber dependence creates a challenging and complex system of interdependencies. Alongside, while numerous technologies have not improved cyber security significantly, this may change with upcoming new concepts and systems, like decentralized ledger technologies (Blockchains) or quantum-secured communication. Following these thoughts, the paper analyses the development of both cyber threats and defence capabilities during the past 10 years, evaluates the current situation and gives recommendations for improvements. To this end, the paper is structured as follows: first, general conditions for military forces with respect to "cyber" are described, including an analysis of the most likely courses of action of the West and their seemingly traditional adversary in the East, Russia. The overview includes a discussion of the usefulness of the measures and an overview of upcoming technologies critical for cyber security. Finally, requirements and recommendations for the further development of cyber defence are briefly covered.
机译:由于众多网络攻击在过去十年中,顾虑和使用网络空间的使用根本改变,并将继续发展。世界各地的军事力量已经来重视网络空间在战争中的新作用,建立网络命令,建立新功能。这些能力的一体化是军事力量从根本上取决于信息迅速交换,以便他们的决策过程在战场上获得优势;该化合物需要开发支持网络的能力以实现以网络为中心的战争。这种网络犯罪,网络防守和网络依赖的三角形创造了一个有挑战性和复杂的相互依赖性系统。除此之外,虽然众多技术没有显着改善网络安全性,但这可能随着即将到来的新概念和系统而改变,如分散的分类账技术(区块)或量子安全的通信。在这些思想之后,本文分析了在过去10年中的网络威胁和防御能力的发展,评估了目前的情况,并提出了改进建议。为此,本文的结构如下:首先,描述了关于“网络”的军事力量的一般条件,包括对西方最有可能的行动课程和他们看似传统的对手的分析,俄罗斯。概述包括讨论措施的有用性及对网络安全至关重要的即将推出的技术概述。最后,简要介绍了网络防御进一步发展的要求和建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号