Skip to main content

Cybernetic Dependency Capacity

  • Conference paper
  • First Online:
  • 927 Accesses

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 152))

Abstract

The state of development of the information society of a particular country can have a great influence on the outcome of a cyberwarfare in which it is involved. This influence, in the possible outcome of a war of this type, can be positive or negative. In addition, contrary to what might initially be thought, a low development of the information society can be advantageous to obtain a victory, if one strictly considers the scenario of cyberwar and the countries in confrontation. This way we analyze this influence and relationship between the information society and cyberwarfare in the scope of security and defense. We designate this dependency as Cybernetic Dependency Capacity. This dependence is a very important factor in the results of cyberwarfare actions and can be positive or negative for both technologically developed and less-developed countries. For these reasons, the destiny of any country, within the scope of a cyberwar, is very influenced by the dependence of this country of their information society. As a major development of the IT society in one country will not make it theoretically victorious in a cyberwarfare with a country less IT developed. This fact, which is apparently paradoxical, is because the larger information society of a country is more informatics systems have to exist. Then, if much more informatics systems exist, more cyber-doors are open for cyber-attacks, because the probability of these systems will be unprotected, from the point of view of cyber-attacks, increases with the growth in the number of computers systems. For the same reason, the countries with less dependence on the information society do not have this cyber-permeability and may be more cyber-resilient. In the limit, theoretically, the least dependent cyber-country can be the winner and the most dependent and as such, technologically more developed, be the loser in a cyberwar between the two. These scenarios are also applicable to non-states and terrorist organizations and for these reasons should be analyzed and considered in the definition of the cyber-defense policies of any country, namely in the factors like a Cybernetic Attack Capacity and a Cybernetic Dependency Capacity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Carr, J.: Inside Cyber Warfare, 2nd edn. O’Reilly Media Inc., Sebastopol, CA, USA (2012)

    Google Scholar 

  2. Ranger, S.: What is cyberwar? Everything you need to know about the frightening future of digital conflict. https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/ (2018). Acedido em 25 Setembro 2018

  3. Zetter, K.: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Crown Publishers, NY (2014)

    Google Scholar 

  4. Clark, R.A., Knake, R.K.: Cyber War: The Next Threat to National Security and What to do About. HarperCollins Publishers Inc, New York (2010)

    Google Scholar 

  5. Kostopoulos, G.K.: Cyberspace and Cybersecurity. CRC Press, Taylor & Francis Group, New York (2013)

    Google Scholar 

  6. Barbosa, J.:Pequenas potências militares convencionais, Grandes potências militares cibernéticas - Abordagem da utilização de meios informáticos na defesa/ataque militar moderno. IDN, Lisboa (2018)

    Google Scholar 

  7. Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar—What Everyone Needs to Know. Oxford University Press, NY (2014)

    Google Scholar 

  8. Wittkop, J.: Building a Comprehensive IT Security Program. Apress, Bolton, USA (2016)

    Book  Google Scholar 

  9. Ayala, L.: Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide. Apress, New York (2016)

    Book  Google Scholar 

Download references

Acknowledgements

I thank the Portuguese National Defense Institute as well as the ISEC/IPC for the support and facilities granted.

This paper is based on the work Final Report of National Defense Course, done by the author in the Portuguese National Defense Institute.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorge Barbosa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Barbosa, J. (2020). Cybernetic Dependency Capacity. In: Rocha, Á., Pereira, R. (eds) Developments and Advances in Defense and Security. Smart Innovation, Systems and Technologies, vol 152. Springer, Singapore. https://doi.org/10.1007/978-981-13-9155-2_3

Download citation

Publish with us

Policies and ethics