Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - A model for characterizing cyberpower
AU - Venables, Adrian
AU - Shaikh, Siraj
AU - Shuttleworth, James
PY - 2015
Y1 - 2015
N2 - This paper builds on previous work describing the nature of cyberspace by further developing a model in which the domain can be divided into distinct layers, each with their own unique characteristics. Combining this with the concept of Near, Mid and Far space, which adds a notionof distance, a three dimensional view of cyberspace is proposed through which the projection of cyberpower can be modelled. The concept of cyberpower is examined from the perspective of national security and a range of prominent cyber attacks are qualitatively assessed and compared within the context of this model using six attributes measuring the sophistication of the attack. From this initial assessment it can be seen that whereas targeting of individuals through the medium of cyberspace can be relatively simple in technological terms, the ability to gain information about the infrastructure or to be able to cause physical damage via cyberspace is an increasingly complex task, which may currently only be within the capabilities of nation states. The paper concludes with proposals for further research to develop this work to produce a measurable, quantitative model for cyberpower.
AB - This paper builds on previous work describing the nature of cyberspace by further developing a model in which the domain can be divided into distinct layers, each with their own unique characteristics. Combining this with the concept of Near, Mid and Far space, which adds a notionof distance, a three dimensional view of cyberspace is proposed through which the projection of cyberpower can be modelled. The concept of cyberpower is examined from the perspective of national security and a range of prominent cyber attacks are qualitatively assessed and compared within the context of this model using six attributes measuring the sophistication of the attack. From this initial assessment it can be seen that whereas targeting of individuals through the medium of cyberspace can be relatively simple in technological terms, the ability to gain information about the infrastructure or to be able to cause physical damage via cyberspace is an increasingly complex task, which may currently only be within the capabilities of nation states. The paper concludes with proposals for further research to develop this work to produce a measurable, quantitative model for cyberpower.
KW - Cyberspace
KW - cyberpower
KW - cyber attacks
KW - national security
U2 - 10.1007/978-3-319-26567-4_1
DO - 10.1007/978-3-319-26567-4_1
M3 - Conference contribution/Paper
SN - 9783319265667
VL - 9
SP - 3
EP - 16
BT - Critical Infrastructure Protection
PB - Springer
CY - USA
ER -