logo

Hotspot Analysis: (Record no. 21130)

MARC details
000 -CABECERA
campo de control de longitud fija 01180nam a22002177a 4500
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
campo de control ES-MaBCA
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN
campo de control 20190520094755.0
008 - CÓDIGOS DE INFORMACIÓN DE LONGITUD FIJA
campo de control de longitud fija 130611b xxu||||| |||| 00| 0 eng d
040 ## - FUENTE DE LA CATALOGACIÓN
Centro transcriptor ES-MaBCA
100 ## - PUNTO DE ACCESO PRINCIPAL - NOMBRE DE PERSONA
9 (RLIN) 16045
Nombre de persona Baezner, Marie
245 ## - MENCIÓN DE TÍTULO
Título Hotspot Analysis:
Medio [Recurso electrónico]PDF
Resto del título : Synthesis 2017: Cyber-conflicts in perspective
260 ## - PUBLICACIÓN, DISTRIBUCIÓN, ETC. (PIE DE IMPRENTA)
Lugar de publicación distribución etc. Zurich
Nombre del editor distribuidor etc. CSS ETH Zurich
Fecha de publicación distribución etc. September 2018
300 ## - DESCRIPCIÓN FÍSICA
Extensión 32 p.
Tamaño de la unidad 762 KB
520 ## - SUMARIO, ETC.
Sumario etc. In 2016 and 2017, cyber-incidents made<br/>headlines around the world and increasingly represent a<br/>tool of choice for many actors. The ramifications of<br/>effective cyberattacks was on full display, from Russian<br/>meddling in the US presidential election to the crippling<br/>of the globe’s largest shipping company Maersk through<br/>NotPetya malware. However, not all these events had<br/>the same political ramifications. In 2016 and 2017, we<br/>analyzed five cyber-related conflicts in Hotspot Analysis<br/>reports. This Hotspot Synthesis gives an overview of<br/>these five cases and identifies and analyzes trends and<br/>particularities observed in the five Hotspot Analysis<br/>reports.<br/>This Hotspot Synthesis argues that cyberconflicts,<br/>understood as the use of cybermeans in<br/>strategic contexts or political conflicts, are different<br/>from cybercrime due to their political components.<br/>Increasingly, states politicize, militarize and securitize<br/>cyberspace as a strategic domain. This trend was<br/>observed in several policy documents analyzed in the<br/>CSS Cyber Defense Project’s National Best Practice<br/>Snapshots Handbook (see Dewar 2018a). The study<br/>showed that cybersecurity was increasingly taken into<br/>account at the policy and Grand Strategy levels. In<br/>addition, the strategic choice of targets and the strategic<br/>attribution are other political aspects of cybersecurity<br/>that reflect the increasing politicization of the subject.<br/>State actors’ motives in cyberspace are very different<br/>than those of cybercriminals. State actors choose their<br/>targets for other reasons than pure economic gain.<br/>Strategic attribution of cyberattacks by the targeted<br/>state is also a political choice and can act as a means to<br/>many an end (e.g., deterrence, provoke a reaction).<br/>Though a politicization of cyberspace and cybersecurity<br/>issues was observed, the technical innovations in the<br/>cybersphere remained rather limited. Malware<br/>developers did not invent new special features, but<br/>instead spent resources in developing more effective<br/>vectors to deliver malware. In addition, even if malware<br/>could be adapted to cause more damage, perpetrators<br/>have often shown restraint in the extent of their attacks.<br/>The use of cyberspace, and the political<br/>dimensions inherent in cyber warfare, is also highly<br/>dependent on the context. This Hotspot Synthesis<br/>identified three main categories of contexts based on<br/>the Hotspot Analysis reports: internationalized civil wars<br/>(Syria), asymmetric military operations between states<br/>(Ukraine), and strategic relationships between great<br/>powers (USA-Russia, USA-China and elections in<br/>Europe). The study showed that in each category, actors<br/>used different tools and techniques and targeted other<br/>types of objectives.<br/>The analysis of Hotspots in 2016 and 2017 also<br/>shed light on the disagreements between states<br/>regarding legitimate and illegitimate uses of cyberspace<br/>in strategic interactions. Cyberspace crosses all political<br/>and legal principles of the use of force. Cyberattacks are<br/>used to target civilians and non-civilians, in peace and in<br/>war, domestically and internationally. The versatility of<br/>cyberattacks creates a particular challenge for states, as<br/>they attempt to find common understanding on many<br/>elements of cybersecurity. The lack of definitional<br/>consensus regarding cybersecurity issues works to<br/>heighten tensions between states when cyber-activities<br/>are in play, as well as heighten the risks of<br/>misperception. In Hotspot Analysis reports, we<br/>identified two major points of contention: intelligence<br/>and information warfare. The disagreement on<br/>intelligence is rooted in the perceived goal of<br/>cyberespionage. Some states see a difference between<br/>cyberespionage for economic purposes and<br/>cyberespionage for national security purposes. The lack<br/>of a common set of norms increased tensions between<br/>states and augmented the risk of misperceptions in their<br/>relations. Information warfare can cause further conflict<br/>when cyberspace is used to influence electoral<br/>campaigns in foreign states. While some states consider<br/>the use of cyberspace as a vector to influence their own<br/>or other states’ political processes as legitimate, other<br/>states do not. The ambiguity around the appropriate use<br/>of cyberspace also strained relations between states.<br/>This Hotspot Synthesis is the first document in a<br/>series of reports. The series will analyze various cyberactivities<br/>in the context of their political conflicts and<br/>strategic relationships, as well as highlight trends in the<br/>use of cybertools.
650 #0 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA
9 (RLIN) 1698
Término de materia o nombre geográfico como elemento inicial Seguridad en las Tecnologías
650 #0 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA
9 (RLIN) 1708
Término de materia o nombre geográfico como elemento inicial Delitos informáticos
710 ## - PUNTO DE ACCESO ADICIONAL--NOMBRE DE ENTIDAD CORPORATIVA
9 (RLIN) 4374
Nombre de entidad o nombre de jurisdicción como elemento inicial Center for Security Studies ETH Zurich
856 ## - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Tipo de formato electrónico *DESCARGAR PDF*
Identificador Uniforme del Recurso (URI) <a href="file:///C:/Documents%20and%20Settings/Administrador/Escritorio/Cyber-Reports-2018-06.pdf">file:///C:/Documents%20and%20Settings/Administrador/Escritorio/Cyber-Reports-2018-06.pdf</a>
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA)
Fuente del sistema de clasificación o colocación Universal Decimal Classification
Tipo de ítem Koha Artículos
Holdings
Estado de retiro Estado de pérdida Fuente del sistema de clasificación o colocación Estado dañado No para préstamo Código de colección Localización permanente Ubicación/localización actual Fecha de adquisición Total de préstamos Código de barras Fecha visto por última vez Precio válido a partir de Tipo de ítem Koha
    Universal Decimal Classification     Biblioteca Digital Centro de Análisis y Prospectiva de la Guardia Civil Centro de Análisis y Prospectiva de la Guardia Civil 02/08/2018   2019554 02/08/2018 02/08/2018 Artículos