Skip to main content

Phenomena in the Cyber World

  • Chapter
  • First Online:

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 78))

Abstract

This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Alberts DS, Garstka JJ, Stein FP (2000) Network centric warfare: developing and leveraging information superiority, 2nd revised ed. CCRP, Washington

    Google Scholar 

  • Arquilla J, Ronfeldt D (eds) (2001) Networks and netwars: the future of terror, crime, and militancy. RAND, Santa Monica

    Google Scholar 

  • Ashenden D (2011) Cyber security: time for engagement and debate. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (ECIW 2011, Tallinn). Academic Publishing, Reading, UK, pp 11–16

    Google Scholar 

  • Beggs C (2006) Proposed risk minimization measures for cyber-terrorism and SCADA networks in Australia. In: Remenyi D (ed) Proceedings of the 5th european conference on information warfare and security (ECIW 2006, Helsinki). Academic Publishing, Reading, UK, pp 9–18

    Google Scholar 

  • Bergqvist J (2010) Sinä olet sodassa: Sofistikoitujen algoritmien kamppailua kyberavaruudessa. Suomen sotilas 91(5):6–10

    Google Scholar 

  • Career Fields, National Security Agency, http://www.nsa.gov/careers/career_fields/

  • Cavelty MD (2010) The reality and future of cyberwar, Parliamentary Brief. Accessed 30 Mar 2010

    Google Scholar 

  • Cavelty MD (2011) Unraveling the stuxnet effect: of much persistence and little change in the cyber threats debate. Mil Strateg Aff 3(3):11–19

    Google Scholar 

  • Cebrowski AK, Garstka JJ (1998) Network-centric warfare: its origin and future. Proc US Naval Inst 124(1):28–35

    Google Scholar 

  • EU Commission (2009) Critical information infrastructure protection, vol 149. Brussels, COM(2009)

    Google Scholar 

  • Executive Order (2013) Executive orders on national security, Order 13636 of February 12, 2013

    Google Scholar 

  • Finland’s Cyber Security Strategy (2013) Government resolution 24.1.2013, secretariat of the security and defence committee. Helsinki, Finland

    Google Scholar 

  • Garstka JJ (2003) Network-centric warfare offers warfighting advantage, Signal, May 2003, pp 58–60

    Google Scholar 

  • Gibson W (1984) Neuromancer. Berkley Publishing Group, New York

    Google Scholar 

  • Green paper on a European programme for critical infrastructure protection, COM(2005) 576 final, Commission of the European Communities, Brussels. Accessed 17 Nov 2005

    Google Scholar 

  • Grobler M, van Vuuren JJ, Zaaiman J (2011) Evaluating cyber security awareness in South Africa. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (ECIW 2011, Tallinn). Academic Publishing, Reading, UK, pp 113–121

    Google Scholar 

  • Hintikka Kari A (2013) Haktivismi, Kansalaisyhteiskunnan tutkimusportaali. http://kans.jyu.fi/sanasto/sanat-kansio/haktivismi

  • HVK (2013) Huoltovarmuuskeskus, National Emergency Supply Agency, http://www.huoltovarmuus.fi/tietoahuoltovarmuudesta/kriittinen-infrastruktuuri-kasite/

  • Information Operations (2005) Air force doctrine document 2–5. http://www.iwar.org.uk/iwar/resources/usaf/afdd2-5-2005.pdf. Accessed 11 Jan 2005

  • ITU (2011) ITU national cybersecurity strategy guide, Geneva

    Google Scholar 

  • Jacobs S, Chitkushev L, Zlateva T (2010) Identities, anonymity and information warfare. In: Demergis J (ed) Proceedings of the 9th european conference on information warfare and security (Thessaloniki, 2010). Academic Publishing, Reading, pp 120–127

    Google Scholar 

  • Jordan T (2008) Hacking: digital media and technological determinism. Polity Press, Cambridge

    Google Scholar 

  • Kääriäinen J (2010) Verkkorikollisuuden vaarat, Haaste 3/2010

    Google Scholar 

  • Kiravuo T, Särelä M ja Manner J (2013) Kybersodan taistelukentät, Sotilasaikakauslehti 88(3):46–49

    Google Scholar 

  • KRITIS (2009) National strategy for critical infrastructure protection (CIP strategy). Federal Ministry of the Interior, Berlin, (17th June 2009)

    Google Scholar 

  • Kuusisto R (2012) KYBER—miten se voitaisiinkaan määritellä? lecture 10.10.2012 Helsinki

    Google Scholar 

  • Lehto M (2013) The ways, means and ends in cyber security strategies. In: Kuusisto R, Kurkinen E (eds) Proceedings of the 12th european conference on information warfare and security (Jyväskylä, 2013), Academic Publishing, Reading, pp 182–190

    Google Scholar 

  • Liaropoulos A (2010) War and ethics in cyberspace: cyber-conflict and just war theory. In: Demergis J (ed) Proceedings of the 9th european conference on information warfare and security, (Thessaloniki, 2010), Academic Publishing, Reading, pp 177–182

    Google Scholar 

  • Libicki MC (1995) What is information warfare? strategic forum, institute for national strategic studies. National Defense University (Number 28; May 1995)

    Google Scholar 

  • Libicki MC (2007) Conquest in cyberspace—national security and information warfare. Cambridge University Press

    Google Scholar 

  • Libicki MC (2011) The strategic uses of ambiguity in cyberspace. Mil Strateg Aff 3(3):3–10

    Google Scholar 

  • McCaughey M, Ayers MD (2003) Cyberactivism: online activism in theory and practice. Routledge, New York

    Google Scholar 

  • NATO (2007) 162 CDS 07 E rev. 1—the protection of critical infrastructures, NATO Parliamentary Assembly

    Google Scholar 

  • OECD (2001) IFP project on future global shocks, report: reducing systemic cybersecurity risk, 14.1.2001

    Google Scholar 

  • OECD (2008) Protection of critical infrastructure and the role of investment policies relating to national security. OECD, May 2008

    Google Scholar 

  • Ottis R (2008) Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In: Proceedings of the 7th european conference on information warfare and security (Plymouth, 2008), Academic Publishing, Reading, pp 163–168

    Google Scholar 

  • Porter A (1969) Cybernetics simplified. English Universities Press, London

    Google Scholar 

  • Pye G, Warren M (2011) Analysis and modelling of critical infrastructure systems. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (Tallinn, 2011), Academic Publishing, Reading, pp 194–201

    Google Scholar 

  • Research Trends (2012) Issue 30: special issue on big data. http://scienceofsciencepolicy.net/newsletter/research-trends-issue-30-special-issue-big-data

  • Rowe N (2010) Towards reversible cyberattacks. In: Demergis J (ed) Proceedings of the 9th european conference on information warfare and security (Thessaloniki, 2010), Academic Publishing, Reading, pp 261–267

    Google Scholar 

  • Security Strategy for Society (2010) Government Resolution 16.12.2010, Ministry of Defence, Helsinki

    Google Scholar 

  • Senenko CM (2007) Network centric warfare and the principles of war, Master thesis. Joint Forces Staff College, Joint Advanced Warfighting School, Norfolk, VA

    Google Scholar 

  • Seruga J (2011) Information security awareness and enterprise security. Guest lecture at the University of Jyväskylä, 18 Aug 2011

    Google Scholar 

  • Sotatekninen arvio ja ennuste, STAE (2008) Finnish defence forces: estimate and prediction of military technologies

    Google Scholar 

  • Ståhle P (2004) Itseuudistumisen dynamiikka—systeemiajattelu kehitysprosessien ymmärtämisen perustana, verkkodokumentti

    Google Scholar 

  • Supervisory Control and Data Acquisition (SCADA) Systems (2004) Technical information bulletin 04-1. National Communications System, Arlington, October 2004

    Google Scholar 

  • Tereshchenko N (2013) US foreign policy challenges: cyber terrorism and critical infrastructure, e-International Relations, 12 June 2013

    Google Scholar 

  • The European Network and Information Security Agency (ENISA) (2012b), ENISA threat landscape: Responding to the evolving threat environment

    Google Scholar 

  • National Emergency Supply Agency (2013) http://www.huoltovarmuus.fi/tietoa-huoltovarmuudesta/

  • Towards a general policy on the fight against cyber crime (2007) COM (2007) 267 final, commission of the european communities, Brussels. Accessed 22 May 2007

    Google Scholar 

  • Travis G, Balas E, Ripley D, Wallace S (2003) Analysis of the “SQL Slammer” worm and its effects on indiana university and related institutions, report. Advanced Network Management Lab, Cybersecurity Initiative, Indiana University, Bloomington, IN

    Google Scholar 

  • Vegh S (2003) Classifying forms of online activism: the case of cyberprotests against the World Bank. In: McCaughey M, Ayers MD (eds) Cyberactivism: Online Activism in Theory and Practice. Routledge, New York, pp 71–95

    Google Scholar 

  • Woollaston V (2013) Revealed, what happens in just ONE minute on the internet, Daily Mail Online, 30 July 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martti Lehto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lehto, M. (2015). Phenomena in the Cyber World. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18302-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18301-5

  • Online ISBN: 978-3-319-18302-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics