Hotspot Analysis: (Record no. 21130)
[ view plain ]
| 000 -CABECERA | |
|---|---|
| campo de control de longitud fija | 01180nam a22002177a 4500 |
| 003 - IDENTIFICADOR DEL NÚMERO DE CONTROL | |
| campo de control | ES-MaBCA |
| 005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN | |
| campo de control | 20190520094755.0 |
| 008 - CÓDIGOS DE INFORMACIÓN DE LONGITUD FIJA | |
| campo de control de longitud fija | 130611b xxu||||| |||| 00| 0 eng d |
| 040 ## - FUENTE DE LA CATALOGACIÓN | |
| Centro transcriptor | ES-MaBCA |
| 100 ## - PUNTO DE ACCESO PRINCIPAL - NOMBRE DE PERSONA | |
| 9 (RLIN) | 16045 |
| Nombre de persona | Baezner, Marie |
| 245 ## - MENCIÓN DE TÍTULO | |
| Título | Hotspot Analysis: |
| Medio | [Recurso electrónico]PDF |
| Resto del título | : Synthesis 2017: Cyber-conflicts in perspective |
| 260 ## - PUBLICACIÓN, DISTRIBUCIÓN, ETC. (PIE DE IMPRENTA) | |
| Lugar de publicación distribución etc. | Zurich |
| Nombre del editor distribuidor etc. | CSS ETH Zurich |
| Fecha de publicación distribución etc. | September 2018 |
| 300 ## - DESCRIPCIÓN FÍSICA | |
| Extensión | 32 p. |
| Tamaño de la unidad | 762 KB |
| 520 ## - SUMARIO, ETC. | |
| Sumario etc. | In 2016 and 2017, cyber-incidents made<br/>headlines around the world and increasingly represent a<br/>tool of choice for many actors. The ramifications of<br/>effective cyberattacks was on full display, from Russian<br/>meddling in the US presidential election to the crippling<br/>of the globe’s largest shipping company Maersk through<br/>NotPetya malware. However, not all these events had<br/>the same political ramifications. In 2016 and 2017, we<br/>analyzed five cyber-related conflicts in Hotspot Analysis<br/>reports. This Hotspot Synthesis gives an overview of<br/>these five cases and identifies and analyzes trends and<br/>particularities observed in the five Hotspot Analysis<br/>reports.<br/>This Hotspot Synthesis argues that cyberconflicts,<br/>understood as the use of cybermeans in<br/>strategic contexts or political conflicts, are different<br/>from cybercrime due to their political components.<br/>Increasingly, states politicize, militarize and securitize<br/>cyberspace as a strategic domain. This trend was<br/>observed in several policy documents analyzed in the<br/>CSS Cyber Defense Project’s National Best Practice<br/>Snapshots Handbook (see Dewar 2018a). The study<br/>showed that cybersecurity was increasingly taken into<br/>account at the policy and Grand Strategy levels. In<br/>addition, the strategic choice of targets and the strategic<br/>attribution are other political aspects of cybersecurity<br/>that reflect the increasing politicization of the subject.<br/>State actors’ motives in cyberspace are very different<br/>than those of cybercriminals. State actors choose their<br/>targets for other reasons than pure economic gain.<br/>Strategic attribution of cyberattacks by the targeted<br/>state is also a political choice and can act as a means to<br/>many an end (e.g., deterrence, provoke a reaction).<br/>Though a politicization of cyberspace and cybersecurity<br/>issues was observed, the technical innovations in the<br/>cybersphere remained rather limited. Malware<br/>developers did not invent new special features, but<br/>instead spent resources in developing more effective<br/>vectors to deliver malware. In addition, even if malware<br/>could be adapted to cause more damage, perpetrators<br/>have often shown restraint in the extent of their attacks.<br/>The use of cyberspace, and the political<br/>dimensions inherent in cyber warfare, is also highly<br/>dependent on the context. This Hotspot Synthesis<br/>identified three main categories of contexts based on<br/>the Hotspot Analysis reports: internationalized civil wars<br/>(Syria), asymmetric military operations between states<br/>(Ukraine), and strategic relationships between great<br/>powers (USA-Russia, USA-China and elections in<br/>Europe). The study showed that in each category, actors<br/>used different tools and techniques and targeted other<br/>types of objectives.<br/>The analysis of Hotspots in 2016 and 2017 also<br/>shed light on the disagreements between states<br/>regarding legitimate and illegitimate uses of cyberspace<br/>in strategic interactions. Cyberspace crosses all political<br/>and legal principles of the use of force. Cyberattacks are<br/>used to target civilians and non-civilians, in peace and in<br/>war, domestically and internationally. The versatility of<br/>cyberattacks creates a particular challenge for states, as<br/>they attempt to find common understanding on many<br/>elements of cybersecurity. The lack of definitional<br/>consensus regarding cybersecurity issues works to<br/>heighten tensions between states when cyber-activities<br/>are in play, as well as heighten the risks of<br/>misperception. In Hotspot Analysis reports, we<br/>identified two major points of contention: intelligence<br/>and information warfare. The disagreement on<br/>intelligence is rooted in the perceived goal of<br/>cyberespionage. Some states see a difference between<br/>cyberespionage for economic purposes and<br/>cyberespionage for national security purposes. The lack<br/>of a common set of norms increased tensions between<br/>states and augmented the risk of misperceptions in their<br/>relations. Information warfare can cause further conflict<br/>when cyberspace is used to influence electoral<br/>campaigns in foreign states. While some states consider<br/>the use of cyberspace as a vector to influence their own<br/>or other states’ political processes as legitimate, other<br/>states do not. The ambiguity around the appropriate use<br/>of cyberspace also strained relations between states.<br/>This Hotspot Synthesis is the first document in a<br/>series of reports. The series will analyze various cyberactivities<br/>in the context of their political conflicts and<br/>strategic relationships, as well as highlight trends in the<br/>use of cybertools. |
| 650 #0 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA | |
| 9 (RLIN) | 1698 |
| Término de materia o nombre geográfico como elemento inicial | Seguridad en las Tecnologías |
| 650 #0 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA | |
| 9 (RLIN) | 1708 |
| Término de materia o nombre geográfico como elemento inicial | Delitos informáticos |
| 710 ## - PUNTO DE ACCESO ADICIONAL--NOMBRE DE ENTIDAD CORPORATIVA | |
| 9 (RLIN) | 4374 |
| Nombre de entidad o nombre de jurisdicción como elemento inicial | Center for Security Studies ETH Zurich |
| 856 ## - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS | |
| Tipo de formato electrónico | *DESCARGAR PDF* |
| Identificador Uniforme del Recurso (URI) | <a href="file:///C:/Documents%20and%20Settings/Administrador/Escritorio/Cyber-Reports-2018-06.pdf">file:///C:/Documents%20and%20Settings/Administrador/Escritorio/Cyber-Reports-2018-06.pdf</a> |
| 942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA) | |
| Fuente del sistema de clasificación o colocación | Universal Decimal Classification |
| Tipo de ítem Koha | Artículos |
| Estado de retiro | Estado de pérdida | Fuente del sistema de clasificación o colocación | Estado dañado | No para préstamo | Código de colección | Localización permanente | Ubicación/localización actual | Fecha de adquisición | Total de préstamos | Código de barras | Fecha visto por última vez | Precio válido a partir de | Tipo de ítem Koha |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Universal Decimal Classification | Biblioteca Digital | Centro de Análisis y Prospectiva de la Guardia Civil | Centro de Análisis y Prospectiva de la Guardia Civil | 02/08/2018 | 2019554 | 02/08/2018 | 02/08/2018 | Artículos |
