Advertisement

Cybernetic Dependency Capacity

  • Jorge BarbosaEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 152)

Abstract

The state of development of the information society of a particular country can have a great influence on the outcome of a cyberwarfare in which it is involved. This influence, in the possible outcome of a war of this type, can be positive or negative. In addition, contrary to what might initially be thought, a low development of the information society can be advantageous to obtain a victory, if one strictly considers the scenario of cyberwar and the countries in confrontation. This way we analyze this influence and relationship between the information society and cyberwarfare in the scope of security and defense. We designate this dependency as Cybernetic Dependency Capacity. This dependence is a very important factor in the results of cyberwarfare actions and can be positive or negative for both technologically developed and less-developed countries. For these reasons, the destiny of any country, within the scope of a cyberwar, is very influenced by the dependence of this country of their information society. As a major development of the IT society in one country will not make it theoretically victorious in a cyberwarfare with a country less IT developed. This fact, which is apparently paradoxical, is because the larger information society of a country is more informatics systems have to exist. Then, if much more informatics systems exist, more cyber-doors are open for cyber-attacks, because the probability of these systems will be unprotected, from the point of view of cyber-attacks, increases with the growth in the number of computers systems. For the same reason, the countries with less dependence on the information society do not have this cyber-permeability and may be more cyber-resilient. In the limit, theoretically, the least dependent cyber-country can be the winner and the most dependent and as such, technologically more developed, be the loser in a cyberwar between the two. These scenarios are also applicable to non-states and terrorist organizations and for these reasons should be analyzed and considered in the definition of the cyber-defense policies of any country, namely in the factors like a Cybernetic Attack Capacity and a Cybernetic Dependency Capacity.

Keywords

Cyber Dependence Cyber-Warfare Cyber-Defense Cybersecurity Cyber Resilience Information Society 

Notes

Acknowledgements

I thank the Portuguese National Defense Institute as well as the ISEC/IPC for the support and facilities granted.

This paper is based on the work Final Report of National Defense Course, done by the author in the Portuguese National Defense Institute.

References

  1. 1.
    Carr, J.: Inside Cyber Warfare, 2nd edn. O’Reilly Media Inc., Sebastopol, CA, USA (2012)Google Scholar
  2. 2.
    Ranger, S.: What is cyberwar? Everything you need to know about the frightening future of digital conflict. https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/ (2018). Acedido em 25 Setembro 2018
  3. 3.
    Zetter, K.: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Crown Publishers, NY (2014)Google Scholar
  4. 4.
    Clark, R.A., Knake, R.K.: Cyber War: The Next Threat to National Security and What to do About. HarperCollins Publishers Inc, New York (2010)Google Scholar
  5. 5.
    Kostopoulos, G.K.: Cyberspace and Cybersecurity. CRC Press, Taylor & Francis Group, New York (2013)Google Scholar
  6. 6.
    Barbosa, J.:Pequenas potências militares convencionais, Grandes potências militares cibernéticas - Abordagem da utilização de meios informáticos na defesa/ataque militar moderno. IDN, Lisboa (2018)Google Scholar
  7. 7.
    Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar—What Everyone Needs to Know. Oxford University Press, NY (2014)Google Scholar
  8. 8.
    Wittkop, J.: Building a Comprehensive IT Security Program. Apress, Bolton, USA (2016)CrossRefGoogle Scholar
  9. 9.
    Ayala, L.: Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide. Apress, New York (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Coimbra Polytechnic – ISECCoimbraPortugal
  2. 2.Portuguese National Defense InstituteLisbonPortugal

Personalised recommendations