Abstract
This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alberts DS, Garstka JJ, Stein FP (2000) Network centric warfare: developing and leveraging information superiority, 2nd revised ed. CCRP, Washington
Arquilla J, Ronfeldt D (eds) (2001) Networks and netwars: the future of terror, crime, and militancy. RAND, Santa Monica
Ashenden D (2011) Cyber security: time for engagement and debate. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (ECIW 2011, Tallinn). Academic Publishing, Reading, UK, pp 11–16
Beggs C (2006) Proposed risk minimization measures for cyber-terrorism and SCADA networks in Australia. In: Remenyi D (ed) Proceedings of the 5th european conference on information warfare and security (ECIW 2006, Helsinki). Academic Publishing, Reading, UK, pp 9–18
Bergqvist J (2010) Sinä olet sodassa: Sofistikoitujen algoritmien kamppailua kyberavaruudessa. Suomen sotilas 91(5):6–10
Career Fields, National Security Agency, http://www.nsa.gov/careers/career_fields/
Cavelty MD (2010) The reality and future of cyberwar, Parliamentary Brief. Accessed 30 Mar 2010
Cavelty MD (2011) Unraveling the stuxnet effect: of much persistence and little change in the cyber threats debate. Mil Strateg Aff 3(3):11–19
Cebrowski AK, Garstka JJ (1998) Network-centric warfare: its origin and future. Proc US Naval Inst 124(1):28–35
EU Commission (2009) Critical information infrastructure protection, vol 149. Brussels, COM(2009)
Executive Order (2013) Executive orders on national security, Order 13636 of February 12, 2013
Finland’s Cyber Security Strategy (2013) Government resolution 24.1.2013, secretariat of the security and defence committee. Helsinki, Finland
Garstka JJ (2003) Network-centric warfare offers warfighting advantage, Signal, May 2003, pp 58–60
Gibson W (1984) Neuromancer. Berkley Publishing Group, New York
Green paper on a European programme for critical infrastructure protection, COM(2005) 576 final, Commission of the European Communities, Brussels. Accessed 17 Nov 2005
Grobler M, van Vuuren JJ, Zaaiman J (2011) Evaluating cyber security awareness in South Africa. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (ECIW 2011, Tallinn). Academic Publishing, Reading, UK, pp 113–121
Hintikka Kari A (2013) Haktivismi, Kansalaisyhteiskunnan tutkimusportaali. http://kans.jyu.fi/sanasto/sanat-kansio/haktivismi
HVK (2013) Huoltovarmuuskeskus, National Emergency Supply Agency, http://www.huoltovarmuus.fi/tietoahuoltovarmuudesta/kriittinen-infrastruktuuri-kasite/
Information Operations (2005) Air force doctrine document 2–5. http://www.iwar.org.uk/iwar/resources/usaf/afdd2-5-2005.pdf. Accessed 11 Jan 2005
ITU (2011) ITU national cybersecurity strategy guide, Geneva
Jacobs S, Chitkushev L, Zlateva T (2010) Identities, anonymity and information warfare. In: Demergis J (ed) Proceedings of the 9th european conference on information warfare and security (Thessaloniki, 2010). Academic Publishing, Reading, pp 120–127
Jordan T (2008) Hacking: digital media and technological determinism. Polity Press, Cambridge
Kääriäinen J (2010) Verkkorikollisuuden vaarat, Haaste 3/2010
Kiravuo T, Särelä M ja Manner J (2013) Kybersodan taistelukentät, Sotilasaikakauslehti 88(3):46–49
KRITIS (2009) National strategy for critical infrastructure protection (CIP strategy). Federal Ministry of the Interior, Berlin, (17th June 2009)
Kuusisto R (2012) KYBER—miten se voitaisiinkaan määritellä? lecture 10.10.2012 Helsinki
Lehto M (2013) The ways, means and ends in cyber security strategies. In: Kuusisto R, Kurkinen E (eds) Proceedings of the 12th european conference on information warfare and security (Jyväskylä, 2013), Academic Publishing, Reading, pp 182–190
Liaropoulos A (2010) War and ethics in cyberspace: cyber-conflict and just war theory. In: Demergis J (ed) Proceedings of the 9th european conference on information warfare and security, (Thessaloniki, 2010), Academic Publishing, Reading, pp 177–182
Libicki MC (1995) What is information warfare? strategic forum, institute for national strategic studies. National Defense University (Number 28; May 1995)
Libicki MC (2007) Conquest in cyberspace—national security and information warfare. Cambridge University Press
Libicki MC (2011) The strategic uses of ambiguity in cyberspace. Mil Strateg Aff 3(3):3–10
McCaughey M, Ayers MD (2003) Cyberactivism: online activism in theory and practice. Routledge, New York
NATO (2007) 162 CDS 07 E rev. 1—the protection of critical infrastructures, NATO Parliamentary Assembly
OECD (2001) IFP project on future global shocks, report: reducing systemic cybersecurity risk, 14.1.2001
OECD (2008) Protection of critical infrastructure and the role of investment policies relating to national security. OECD, May 2008
Ottis R (2008) Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In: Proceedings of the 7th european conference on information warfare and security (Plymouth, 2008), Academic Publishing, Reading, pp 163–168
Porter A (1969) Cybernetics simplified. English Universities Press, London
Pye G, Warren M (2011) Analysis and modelling of critical infrastructure systems. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (Tallinn, 2011), Academic Publishing, Reading, pp 194–201
Research Trends (2012) Issue 30: special issue on big data. http://scienceofsciencepolicy.net/newsletter/research-trends-issue-30-special-issue-big-data
Rowe N (2010) Towards reversible cyberattacks. In: Demergis J (ed) Proceedings of the 9th european conference on information warfare and security (Thessaloniki, 2010), Academic Publishing, Reading, pp 261–267
Security Strategy for Society (2010) Government Resolution 16.12.2010, Ministry of Defence, Helsinki
Senenko CM (2007) Network centric warfare and the principles of war, Master thesis. Joint Forces Staff College, Joint Advanced Warfighting School, Norfolk, VA
Seruga J (2011) Information security awareness and enterprise security. Guest lecture at the University of Jyväskylä, 18 Aug 2011
Sotatekninen arvio ja ennuste, STAE (2008) Finnish defence forces: estimate and prediction of military technologies
Ståhle P (2004) Itseuudistumisen dynamiikka—systeemiajattelu kehitysprosessien ymmärtämisen perustana, verkkodokumentti
Supervisory Control and Data Acquisition (SCADA) Systems (2004) Technical information bulletin 04-1. National Communications System, Arlington, October 2004
Tereshchenko N (2013) US foreign policy challenges: cyber terrorism and critical infrastructure, e-International Relations, 12 June 2013
The European Network and Information Security Agency (ENISA) (2012b), ENISA threat landscape: Responding to the evolving threat environment
National Emergency Supply Agency (2013) http://www.huoltovarmuus.fi/tietoa-huoltovarmuudesta/
Towards a general policy on the fight against cyber crime (2007) COM (2007) 267 final, commission of the european communities, Brussels. Accessed 22 May 2007
Travis G, Balas E, Ripley D, Wallace S (2003) Analysis of the “SQL Slammer” worm and its effects on indiana university and related institutions, report. Advanced Network Management Lab, Cybersecurity Initiative, Indiana University, Bloomington, IN
Vegh S (2003) Classifying forms of online activism: the case of cyberprotests against the World Bank. In: McCaughey M, Ayers MD (eds) Cyberactivism: Online Activism in Theory and Practice. Routledge, New York, pp 71–95
Woollaston V (2013) Revealed, what happens in just ONE minute on the internet, Daily Mail Online, 30 July 2013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lehto, M. (2015). Phenomena in the Cyber World. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-18302-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18301-5
Online ISBN: 978-3-319-18302-2
eBook Packages: EngineeringEngineering (R0)