The stability of State information in the face of terrorist threats

Palabras clave: estabilidad de la información, estado, ciberterrorismo, ciberseguridad, amenazas

Resumen

El objetivo del estudio es identificar los factores clave de la estabilidad de la información del estado frente a las amenazas terroristas basándose en la revisión de la investigación existente en esta área, e identificar los principales enfoques para garantizar la estabilidad de la información del estado frente a las amenazas terroristas. Con base en el análisis de trabajos científicos, se identifican los factores de la resistencia del estado al ciberterrorismo y se organizan los principales enfoques para garantizar la estabilidad de la información del estado ante amenazas terroristas. Los resultados del estudio proporcionan una comprensión de los factores clave necesarios para lograr las áreas: legales, técnica, organizacional y operativa de la resiliencia del estado a las amenazas cibernéticas. La investigación adicional puede tener como objetivo realizar cálculos empíricos de indicadores de todo el mundo para determinar ciertas dependencias en el campo de la ciberseguridad. Se concluye que factores como el creciente impacto de las tecnologías de la información y la comunicación en las relaciones públicas, las actividades de producción, el funcionamiento de las instalaciones de infraestructura y las actividades de las autoridades públicas, indican que urge el tema de la seguridad como línea de investigación científica.

Descargas

La descarga de datos todavía no está disponible.

Biografía del autor/a

Yuriy M. Bidzilya , Uzhhorod National University

Doctor of Social Communications, Associate Professor, Professor, Head of the Department of Journalism, Faculty of Philology, Uzhhorod National University, Uzhhorod, Ukraine.

Yevhen O. Solomin, Uzhhorod National University

PhD in Social Communications, Associate Professor of the Department of Journalism, Faculty of Philology, Uzhhorod National University, Uzhhorod, Ukraine.

Halyna V. Shapovalova, Uzhhorod National University

PhD in Philology, Associate Professor of the Department of Journalism, Faculty of Philology, Uzhhorod National University, Uzhhorod, Ukraine.

Viktoriia V. Georgiievska, Borys Hrynchenko Kiev University

Doctor of Social Communications, Associate Professor, Professor of Department of Journalism and New Media, Institute of Journalism, Borys Hrynchenko Kiev University, Kyiv, Ukraine.

Nataliya M. Poplavska, Volodymyr Hnatiuk Ternopil National Pedagogical University

Doctor of Philology, Professor, Head of Department of Journalism, Faculty of Philology and Journalism, Volodymyr Hnatiuk Ternopil National Pedagogical University, Ternopil, Ukraine.

Citas

ADHIKARI, Uttam; MORRIS, Thomas; PAN, Shengyi. 2016. “Applying non- nested generalized exemplars classification for cyber-power event and intrusion detection” In: IEEE Transactions on Smart Grid. Vol. 9, No. 5, pp. 3928-3941.

ALBAHAR, Marwan. 2019. “Cyber-attacks and terrorism: A twenty-first century conundrum” In: Science and engineering ethics. Vol. 25, No. 4, pp. 993- 1006.

ALHARBE, Mahmood Abdulghani. 2020. “Cyber security, forensics and its impact on future challenges in Saudi Arabia smart cities: Case study on the modern, urban planning and design” In: International Journal of Advanced Trends in Computer Science and Engineering. Vol. 9, No. 2, pp. 2464-2470.

BACKHAUS, Sophia; GROSS, Michael; WAISMEL-MANOR, Israel; COHEN, Hagit; CANETTI, Daphna. 2020. “A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure” In: Cyberpsychology, Behavior, and Social Networking. Vol. 23, No. 9, pp. 595-603.

BHAMARE, Deval; ZOLANVARI, Maede; ERBAD, Aiman; JAIN, Raj; KHAN, Khaled; MESKIN, Nader. 2020. “Cybersecurity for industrial control systems: A survey” In: Computers and Security. Vol. 89, Article 101677. Available online. In: https://doi.org/10.1016/j.cose.2019.101677. Date of consultation: 14/09/2020.

BINBUSAYYIS, Adel; VAIYAPURI, Thavavel. 2021. “Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM” In: Applied Intelligence. Vol. 51, No. 2, pp. 980-990.

BRANCH, Jordan. 2021. “What’s in a name? Metaphors and cybersecurity” In: International Organization. Vol. 75, No. 1, pp. 39-70.

CAMACHO, Jose; GARCÍA-GIMÉNEZ, Jose Manuel; FUENTES-GARCÍA, Noemí Marta; MACIÁ-FERNÁNDEZ, Gabriel. 2019. “Multivariate big data analysis for intrusion detection: 5 steps from the haystack to the needle. In: Computers and Security. Vol. 87, Article 101603. Available online. In: https://doi.org/10.1016/j.cose.2019.101603. Date of consultation: 14/09/2020.

CARVALHO, João Vidal; CARVALHO, Sandro; ROCHA, Álvaro. 2020. “European strategy and legislation for cybersecurity: Implications for Portugal” In: Cluster Computing. Vol. 23, No. 3, pp. 1845-1854.

CASCAVILLA, Giuseppe; TAMBURRI, Damian; VAN DEN HEUVEL, Willem. 2021. “Cybercrime threat intelligence: A systematic multi-vocal literature review” In: Computers and Security. Vol. 105, Article 102258. Available online. In: https://doi.org/10.1016/j.cose.2021.102258. Date of consultation: 14/09/2020.

CATAK, Ferhat Ozgur; AHMED, Javed; SAHINBAS, Kevser; KHAND, Zahid Hussain. 2021. “Data augmentation based malware detection using convolutional neural networks” In: Peer J Computer Science. Vol. 7, pp. 1-26.

CHO, Yoonyoung; CHUNG, Jongpil. 2017. “Bring the state back in: Conflict and cooperation among states in cybersecurity” In: Pacific Focus. Vol. 32, No. 2, pp. 290-314.

DARKO, Amos; CHAN, Albert. 2016. “Critical analysis of green building research trend in construction journals” In: Habitat International. Vol. 57, pp. 53-63.

DOMBE, Arur; GOLANDSKY, Youram. 2016. A Review and Analysis of the World of Cyber Terrorism. Available online. In: https://cyberisk.biz/ cyber-terrorism-review-and-analysis/. Consultation date: 11/02/21.

EGA.2018.NationalCyberSecurityIndex2018.Tallinn:e-GovernanceAcademy. Available online. In: https://ega.ee/wp-content/uploads/2018/05/ncsi_digital_smaller.pdf. Consultation date: 11/03/2021.

EGA. 2021a. NCSI: Compare. Tallinn: e-Governance Academy. Available online. In: https://ncsi.ega.ee/compare/. Consultation date: 13/03/21.

EGA. 2021b. NCSI: Methodology. Tallinn: e-Governance Academy. Available online. In: https://ncsi.ega.ee/methodology/. Consultation date: 13/03/2021.

DEBAR, Herve; DI FRANCO, Fabio; GRAMMATOPOULOS, Athanations; MANTZOURANIS, Irene; MARKATOS, Evangelous. 2021. Cybersecurity research directions for the EU’s digital strategic autonomy. ENISA. Available online. In: https://op.europa.eu/en/publication-detail/-/ publication/30b09e02-a7cc-11eb-9585-01aa75ed71a1/language-en. Consultation date: 11/03/2021.

EPSC. 2019. Rethinking strategic autonomy in the digital age. European Political Strategy Centre, Strategic Notes, 30. Available online. In: https:// wayback.archive-it.org/12090/20191129072400/https://ec.europa. eu/epsc/publications/strategic-notes/rethinking-strategic-autonomy- digital-age_en. Consultation date: 11/03/2021.

GONZALEZ-GRANADILLO, Gustavo; DUBUS, Samuel; MOTZEK, Alexander; GARCIA-ALFARO, Joaquin; ALVAREZ, Ender; MERIALDO, Matteo; DEBAR, Herve. 2018. “Dynamic risk management response system to handle cyber threats” In: Future Generation Computer Systems. Vol. 83, pp. 535-552.

GÓRKA, Marek. 2018. “The Cybersecurity Strategy of the Visegrad Group Countries” In: Politics in Central Europe. Vol. 14, No. 2, pp. 75-98.

GOURISETTI, Sri Nikhil Gupta; MYLREA, Michael; PATANGIA, Hirak. 2020. “Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis” In: Future Generation Computer Systems. Vol. 105, pp. 410-431.

HANDA, Anand; SHARMA, Ashu; SHUKLA, Sandeep. 2019. “Machine learning in cybersecurity: A review” In: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. Vol. 9, No. 4. Available online. In: https://doi.org/10.1002/widm.1306. Consultation date: 11/03/2021.

HERNANDEZ-RAMOS, Jose; MATHEU, Sara; SKARMETA, Antonio. 2021. “The challenges of software cybersecurity certification [Building Security In]” In: IEEE Security & Privacy. Vol. 19, No. 1, pp. 99-102.

HERR, Tobias. 2021. “Cyber insurance and private governance: The enforcement power of markets” In: Regulation and Governance. Vol. 15, No. 1, pp. 98-114.

HONG, Yuming; CHAN, Daniel. 2014. “Research trend of joint ventures in construction: A two-decade taxonomic review” In: Journal of facilities management. Vol. 12, No. 2, pp. 118-141.

IMF. 2020. Cyber Risk is the New Threat to Financial Stability. Available online. In: https://blogs.imf.org/2020/12/07/cyber-risk-is-the-new-threat-to- financial-stability/. Consultation date: 11/02/2021.

ITU. 2019. Global Cybersecurity Index 2018. Available online. In: https:// www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf. Consultation date: 11/03/2021.

JAGTAP, Sagar; SHANKAR, Sriram; SUBRAMANIYASWAMY, Vim. 2021. “A hypergraph based Kohonen map for detecting intrusions over cyber- physical systems traffic” In: Future Generation Computer Systems. Vol. 119, pp. 84-109.

JAMEI, Mahdi; STEWART, Emma; PEISERT, Sean; SCAGLIONE, Anna; MCPARLAND, Chuck; ROBERTS, Ciaran; MCEACHERN, Alex. 2016. “Micro synchrophasor-based intrusion detection in automated distribution systems: Toward critical infrastructure security” In: IEEE Internet Computing. Vol. 20, No. 5, pp. 18-27.

KANNARI, Phanindra Reddy; SHARIFF, Noorullah; BIRADAR, Rajkumar. 2021. “Network intrusion detection using sparse autoencoder with swish-PReLU activation model” In: Journal of Ambient Intelligence and Humanized Computing. Vol. 12, No. 3, pp. 3209 - 3212.

KRUHLOV, Vitalii; LATYNIN, Mykola; HORBAN, Alina; PETROV, Anton. 2020. “Public-private partnership in cybersecurity” In: CEUR Workshop Proceedings. Vol. 2654, pp. 619-628.

KULESZA, Joanna; WEBER, Rolf. 2021. “Protecting the internet with international law” In: Computer Law and Security Review. Vol. 40. Available online. In: DOI: 10.1016/j.clsr.2021.105531. Consultation date: 11/03/2021.

KUMAR, Vivek; MAZZARA, Manuel; MESSINA, Angelo; LEE, Joo. 2019. A conjoint application of data mining techniques for analysis of global terrorist attacks-prevention and prediction for combating terrorism. Springer. Berlin, Germany.

LAU, Pikkin; WEI, Wei; WANG, Lingfeng; LIU, Zhaoxi; TEN, Chee. 2020. “A cybersecurity insurance model for power system reliability considering optimal defense resource allocation”. In: IEEE Transactions on Smart Grid. Vol. 11, No. 5, pp. 4403-4414.

LEE, Kyungbok; LIM, Jong. 2016. “The reality and response of cyber threats to critical infrastructure: A case study of the cyberterror attack on the Korea Hydro & Nuclear Power Co., Ltd” In: KSII Transactions on Internet and Information Systems. Vol. 10, No. 2, pp. 857-880.

MA, Qian; SUN, Cong; CUI, Baojiang; JIN, Xiaohui. 2021. “A novel model for anomaly detection in network traffic based on kernel support vector machine” In: Computers and Security. Vol. 104, Article 102215. Available online. In: DOI: https://doi.org/10.1016/j.cose.2021.102215. Consultation date: 11/03/2021.

MARKOPOULOU, Dimitra; PAPAKONSTANTINOU, Vagelis; DE HERT, Paul. 2019. “The new EU cybersecurity framework: The NIS directive, ENISA’s role and the general data protection regulation” In: Computer Law and Security Review. Vol. 35, No. 6, pp. 123-136.

MORABOENA, Srikanthyadav; KETEPALLI, Gayatri; RAGAM, Padmaja. 2020. “A deep learning approach to network intrusion detection using deep autoencoder” In: Revue d’Intelligence Artificielle. Vol. 34, No. 4, pp. 457-463.

NEISSE, Ricardo; HERNANDEZ-RAMOS, Jose Luis; MATHEU-GARCIA, Sara Nieves; BALDINI, Gianmarco; SKARMETA, Antonio; SIRIS, Vasilios; NIKANDER, Pekka. 2020. “An interledger blockchain platform for cross-border management of cybersecurity information” In: IEEE Internet Computing. Vol. 24, No. 3, pp. 19-29.

NESPOLI, Pantaleone; GÓMEZ MÁRMOL, Felix; MAESTRE VIDAL, Jorge. 2021. “Battling against cyberattacks: Towards pre-standardization of countermeasures” In: Cluster Computing. Vol. 24, No. 1, pp. 57-81.

OSEI-KYEI, Robert; CHAN, Albert. 2015. “Review of studies on the critical success factors for publiceprivate partnership (PPP) projects from 1990 to 2013” In: International Journal of Project Management. Vol. 33, No. 6, pp. 1335-1346.

PALASINSKI, Marek; BOWMAN-GRIEVE, Lorraine. 2017. “Tackling cyber- terrorism: Balancing surveillance with counter-communication” In: Security Journal. Vol. 30, No. 2, pp. 556-568.

PARK, Sangdon; KIM, Il Hwan; KIM, Jaehyoun; LEE, Kyung Lyul. 2018. “The diagnosis and prescription for cybersecurity in Korea: Focusing on policy and system” In: KSII Transactions on Internet and Information Systems. Vol. 12, No. 2, pp. 843-859.

PLOTNEK, Jordan; SLAY, Jill. 2021. “Cyber terrorism: A homogenized taxonomy and definition” In: Computers & Security. Vol. 102, Article 102145. Available online. In: DOI: https://doi.org/10.1016/j. cose.2020.102145. Consultation date: 16/04/2021.

PONNUSAMY, Suhannia; RUBASUNDRAM, Geetha. 2019. “An international study on the risk of cyber terrorism” In: International Journal of Recent Technology and Engineering. Vol. 7, No. 5, pp. 159-163.

QUINCOZES, Silvio; ALBUQUERQUE, Celio; PASSOS, Diego; MOSSÉ, Daniel. 2021. “A survey on intrusion detection and prevention systems in digital substations” In: Computer Networks. Vol. 184, Article 107679. Available online. In: DOI: https://doi.org/10.1016/j.comnet.2020.107679. Consultation date: 16/04/2021.

RASS, Stefan; SCHAUER, Stefan; KÖNIG, Sandra; ZHU, Quanyan. 2020. Cyber-Security in Critical Infrastructures. Springer. Berlin, Germany.

REHMAN, Shafiq; KHALIQ, Muhammad; IMTIAZ, Mulla; RASOOL, Asif; SHAFIQ, Muhammad; JAVED, Zahira; BASHIR, Khalid. 2021. “DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU)” In: Future Generation Computer Systems. Vol. 118, pp. 453-466.

SADIK, Shahrin; AHMED, Mohiuddin; SIKOS, Leslie; NAJMUL, Islam. 2020. “Toward a sustainable cybersecurity ecosystem” In: Computers. Vol. 9, No. 3, pp. 1-17.

STURC, Boris; GUROVA, Tatyana; CHERNOV, Sergei. 2020. “The specifics and patterns of cybercrime in the field of payment processing” In: International Journal of Criminology and Sociology. Vol. 9, pp. 2021- 2030.

SYAFRIZAL, Melwin; SELAMAT, Rahayu; ZAKARIA, Nurul Azma. 2020. “Analysis of cybersecurity standard and framework components” In: International Journal of Communication Networks and Information Security. Vol. 12, No. 3, pp. 417-432.

TAHA, Ahmad; QI, Junjian; WANG, Jianhui; PANCHAL, Jitesh. 2018. “Risk mitigation for dynamic state estimation against cyber-attacks and unknown inputs” In: IEEE Transactions on Smart Grid. Vol. 9, No. 2, pp. 886-899.

THAPA, Niraj; LIU, Zhipeng; GOKARAJU, Balakrishna; ROY, Kaushik. 2020. “Comparison of machine learning and deep learning models for network intrusion detection systems” In: Future Internet. Vol. 12, No. 10, pp. 1-16.

TIAN, Qiuting; HAN, Dezhi; LI, Kuan-Ching; LIU, Xingao; DUAN, Letian; CASTIGLIONE, Arcangelo. 2020. “An intrusion detection approach based on improved deep belief network” In: Applied Intelligence. Vol. 50, No. 10, pp. 3162-3178.

UNITED NATIONS. 2008. Human Rights, Terrorism and Counter-terrorism.
Available online. In: https://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Consultation date: 14/02/2021.

UNITED NATIONS. 2017. Combatting Cybercrime: Tools and Capacity Building for Emerging Economies. World Bank and United Nations. Washington, DC, USA.

UNICRI. 2014. Cybercrime: Risks for the Economy and Enterprises at the EU and Italian Level, Turin. Available online. In: http://www.unicri.it/in_focus/files/Criminalita_informatica_inglese.pdf. Consultation date: 14/02/2021.

VÄLJA, Margus; HEIDING, Fredrik; FRANKE, Ulrik; LAGERSTRÖM, Robert. 2020. “Automating threat modelling using an ontology framework: Validated with data from critical infrastructures” In: Cybersecurity. Vol. 3, No. 19, pp. 412-420.

VEERASAMY, Namosha; GROBLER, Marthie. 2015. “Logic tester for the classification of cyberterrorism attacks” In: International Journal of Cyber Warfare and Terrorism. Vol. 5, No. 1, pp. 30-46.
VILIĆ, Vida. 2017. “Dark web, cyber terrorism and cyber warfare: Dark side of the cyberspace” In: Balkan Social Science Review. Vol. 10, No. 10, pp. 7-25.

WEF (World Economic Forum). 2021. The Global Risks Report 2021. Available online. In: https://www.weforum.org/reports/the-global-risks- report-2021. Consultation date: 11/02/2021.

WILNER, Alex. 2017. “Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation” In: Comparative Strategy. Vol. 36, No. 4, pp. 309-318.

YAU, Hon-Min. 2020. “Evolving toward a balanced cyber strategy in East Asia: Cyber deterrence or cooperation?” In: Issues & Studies. Vol. 56, No. 03, pp. 23-39.

YI, Wen; CHAN, Albert. 2014. “Critical review of labor productivity research in construction journals” In: Journal of Management in Engineering. Vol. 30, No. 2, pp. 214-225.

YU, Yao; OSEI-KYEI, Robert; CHAN, Albert; PING Chuen; CHEN, Chuan; MARTEK, Igor. 2018. “Review of social responsibility factors for sustainable development in public-private partnerships” In: Sustainable development. Vol. 26, No. 6, pp. 515-524.
Publicado
2021-10-01
Cómo citar
Bidzilya , Y. M., Solomin, Y. O., Shapovalova, H. V., Georgiievska, V. V., & Poplavska, N. M. (2021). The stability of State information in the face of terrorist threats. Cuestiones Políticas, 39(70), 250-269. https://doi.org/10.46398/cuestpol.3970.16
Sección
Derecho Público