The stability of State information in the face of terrorist threats
Abstract
The objective of the study is to identify the key factors of the stability of state information in the face of terrorist threats based on the review of existing research in this area, and to identify the main approaches to ensure the stability of state information in the face of terrorist threats. Based on the analysis of scientific works, the factors of the state’s resistance to cyberterrorism are identified and the main approaches are organized to ensure the stability of state information in the face of terrorist threats. The results of the study provide an understanding of the key factors needed to achieve the legal, technical, organizational, and operational areas of state resilience to cyber threats. Further research may aim to perform empirical calculations of indicators from around the world to determine certain dependencies in the field of cybersecurity. It is concluded that factors such as the growing impact of information and communication technologies on public relations, production activities, the operation of infrastructure facilities and the activities of public authorities, indicate that the issue of security as a line of scientific research is urgent.
Downloads
References
ALBAHAR, Marwan. 2019. “Cyber-attacks and terrorism: A twenty-first century conundrum” In: Science and engineering ethics. Vol. 25, No. 4, pp. 993- 1006.
ALHARBE, Mahmood Abdulghani. 2020. “Cyber security, forensics and its impact on future challenges in Saudi Arabia smart cities: Case study on the modern, urban planning and design” In: International Journal of Advanced Trends in Computer Science and Engineering. Vol. 9, No. 2, pp. 2464-2470.
BACKHAUS, Sophia; GROSS, Michael; WAISMEL-MANOR, Israel; COHEN, Hagit; CANETTI, Daphna. 2020. “A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure” In: Cyberpsychology, Behavior, and Social Networking. Vol. 23, No. 9, pp. 595-603.
BHAMARE, Deval; ZOLANVARI, Maede; ERBAD, Aiman; JAIN, Raj; KHAN, Khaled; MESKIN, Nader. 2020. “Cybersecurity for industrial control systems: A survey” In: Computers and Security. Vol. 89, Article 101677. Available online. In: https://doi.org/10.1016/j.cose.2019.101677. Date of consultation: 14/09/2020.
BINBUSAYYIS, Adel; VAIYAPURI, Thavavel. 2021. “Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM” In: Applied Intelligence. Vol. 51, No. 2, pp. 980-990.
BRANCH, Jordan. 2021. “What’s in a name? Metaphors and cybersecurity” In: International Organization. Vol. 75, No. 1, pp. 39-70.
CAMACHO, Jose; GARCÍA-GIMÉNEZ, Jose Manuel; FUENTES-GARCÍA, Noemí Marta; MACIÁ-FERNÁNDEZ, Gabriel. 2019. “Multivariate big data analysis for intrusion detection: 5 steps from the haystack to the needle. In: Computers and Security. Vol. 87, Article 101603. Available online. In: https://doi.org/10.1016/j.cose.2019.101603. Date of consultation: 14/09/2020.
CARVALHO, João Vidal; CARVALHO, Sandro; ROCHA, Álvaro. 2020. “European strategy and legislation for cybersecurity: Implications for Portugal” In: Cluster Computing. Vol. 23, No. 3, pp. 1845-1854.
CASCAVILLA, Giuseppe; TAMBURRI, Damian; VAN DEN HEUVEL, Willem. 2021. “Cybercrime threat intelligence: A systematic multi-vocal literature review” In: Computers and Security. Vol. 105, Article 102258. Available online. In: https://doi.org/10.1016/j.cose.2021.102258. Date of consultation: 14/09/2020.
CATAK, Ferhat Ozgur; AHMED, Javed; SAHINBAS, Kevser; KHAND, Zahid Hussain. 2021. “Data augmentation based malware detection using convolutional neural networks” In: Peer J Computer Science. Vol. 7, pp. 1-26.
CHO, Yoonyoung; CHUNG, Jongpil. 2017. “Bring the state back in: Conflict and cooperation among states in cybersecurity” In: Pacific Focus. Vol. 32, No. 2, pp. 290-314.
DARKO, Amos; CHAN, Albert. 2016. “Critical analysis of green building research trend in construction journals” In: Habitat International. Vol. 57, pp. 53-63.
DOMBE, Arur; GOLANDSKY, Youram. 2016. A Review and Analysis of the World of Cyber Terrorism. Available online. In: https://cyberisk.biz/ cyber-terrorism-review-and-analysis/. Consultation date: 11/02/21.
EGA.2018.NationalCyberSecurityIndex2018.Tallinn:e-GovernanceAcademy. Available online. In: https://ega.ee/wp-content/uploads/2018/05/ncsi_digital_smaller.pdf. Consultation date: 11/03/2021.
EGA. 2021a. NCSI: Compare. Tallinn: e-Governance Academy. Available online. In: https://ncsi.ega.ee/compare/. Consultation date: 13/03/21.
EGA. 2021b. NCSI: Methodology. Tallinn: e-Governance Academy. Available online. In: https://ncsi.ega.ee/methodology/. Consultation date: 13/03/2021.
DEBAR, Herve; DI FRANCO, Fabio; GRAMMATOPOULOS, Athanations; MANTZOURANIS, Irene; MARKATOS, Evangelous. 2021. Cybersecurity research directions for the EU’s digital strategic autonomy. ENISA. Available online. In: https://op.europa.eu/en/publication-detail/-/ publication/30b09e02-a7cc-11eb-9585-01aa75ed71a1/language-en. Consultation date: 11/03/2021.
EPSC. 2019. Rethinking strategic autonomy in the digital age. European Political Strategy Centre, Strategic Notes, 30. Available online. In: https:// wayback.archive-it.org/12090/20191129072400/https://ec.europa. eu/epsc/publications/strategic-notes/rethinking-strategic-autonomy- digital-age_en. Consultation date: 11/03/2021.
GONZALEZ-GRANADILLO, Gustavo; DUBUS, Samuel; MOTZEK, Alexander; GARCIA-ALFARO, Joaquin; ALVAREZ, Ender; MERIALDO, Matteo; DEBAR, Herve. 2018. “Dynamic risk management response system to handle cyber threats” In: Future Generation Computer Systems. Vol. 83, pp. 535-552.
GÓRKA, Marek. 2018. “The Cybersecurity Strategy of the Visegrad Group Countries” In: Politics in Central Europe. Vol. 14, No. 2, pp. 75-98.
GOURISETTI, Sri Nikhil Gupta; MYLREA, Michael; PATANGIA, Hirak. 2020. “Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis” In: Future Generation Computer Systems. Vol. 105, pp. 410-431.
HANDA, Anand; SHARMA, Ashu; SHUKLA, Sandeep. 2019. “Machine learning in cybersecurity: A review” In: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. Vol. 9, No. 4. Available online. In: https://doi.org/10.1002/widm.1306. Consultation date: 11/03/2021.
HERNANDEZ-RAMOS, Jose; MATHEU, Sara; SKARMETA, Antonio. 2021. “The challenges of software cybersecurity certification [Building Security In]” In: IEEE Security & Privacy. Vol. 19, No. 1, pp. 99-102.
HERR, Tobias. 2021. “Cyber insurance and private governance: The enforcement power of markets” In: Regulation and Governance. Vol. 15, No. 1, pp. 98-114.
HONG, Yuming; CHAN, Daniel. 2014. “Research trend of joint ventures in construction: A two-decade taxonomic review” In: Journal of facilities management. Vol. 12, No. 2, pp. 118-141.
IMF. 2020. Cyber Risk is the New Threat to Financial Stability. Available online. In: https://blogs.imf.org/2020/12/07/cyber-risk-is-the-new-threat-to- financial-stability/. Consultation date: 11/02/2021.
ITU. 2019. Global Cybersecurity Index 2018. Available online. In: https:// www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf. Consultation date: 11/03/2021.
JAGTAP, Sagar; SHANKAR, Sriram; SUBRAMANIYASWAMY, Vim. 2021. “A hypergraph based Kohonen map for detecting intrusions over cyber- physical systems traffic” In: Future Generation Computer Systems. Vol. 119, pp. 84-109.
JAMEI, Mahdi; STEWART, Emma; PEISERT, Sean; SCAGLIONE, Anna; MCPARLAND, Chuck; ROBERTS, Ciaran; MCEACHERN, Alex. 2016. “Micro synchrophasor-based intrusion detection in automated distribution systems: Toward critical infrastructure security” In: IEEE Internet Computing. Vol. 20, No. 5, pp. 18-27.
KANNARI, Phanindra Reddy; SHARIFF, Noorullah; BIRADAR, Rajkumar. 2021. “Network intrusion detection using sparse autoencoder with swish-PReLU activation model” In: Journal of Ambient Intelligence and Humanized Computing. Vol. 12, No. 3, pp. 3209 - 3212.
KRUHLOV, Vitalii; LATYNIN, Mykola; HORBAN, Alina; PETROV, Anton. 2020. “Public-private partnership in cybersecurity” In: CEUR Workshop Proceedings. Vol. 2654, pp. 619-628.
KULESZA, Joanna; WEBER, Rolf. 2021. “Protecting the internet with international law” In: Computer Law and Security Review. Vol. 40. Available online. In: DOI: 10.1016/j.clsr.2021.105531. Consultation date: 11/03/2021.
KUMAR, Vivek; MAZZARA, Manuel; MESSINA, Angelo; LEE, Joo. 2019. A conjoint application of data mining techniques for analysis of global terrorist attacks-prevention and prediction for combating terrorism. Springer. Berlin, Germany.
LAU, Pikkin; WEI, Wei; WANG, Lingfeng; LIU, Zhaoxi; TEN, Chee. 2020. “A cybersecurity insurance model for power system reliability considering optimal defense resource allocation”. In: IEEE Transactions on Smart Grid. Vol. 11, No. 5, pp. 4403-4414.
LEE, Kyungbok; LIM, Jong. 2016. “The reality and response of cyber threats to critical infrastructure: A case study of the cyberterror attack on the Korea Hydro & Nuclear Power Co., Ltd” In: KSII Transactions on Internet and Information Systems. Vol. 10, No. 2, pp. 857-880.
MA, Qian; SUN, Cong; CUI, Baojiang; JIN, Xiaohui. 2021. “A novel model for anomaly detection in network traffic based on kernel support vector machine” In: Computers and Security. Vol. 104, Article 102215. Available online. In: DOI: https://doi.org/10.1016/j.cose.2021.102215. Consultation date: 11/03/2021.
MARKOPOULOU, Dimitra; PAPAKONSTANTINOU, Vagelis; DE HERT, Paul. 2019. “The new EU cybersecurity framework: The NIS directive, ENISA’s role and the general data protection regulation” In: Computer Law and Security Review. Vol. 35, No. 6, pp. 123-136.
MORABOENA, Srikanthyadav; KETEPALLI, Gayatri; RAGAM, Padmaja. 2020. “A deep learning approach to network intrusion detection using deep autoencoder” In: Revue d’Intelligence Artificielle. Vol. 34, No. 4, pp. 457-463.
NEISSE, Ricardo; HERNANDEZ-RAMOS, Jose Luis; MATHEU-GARCIA, Sara Nieves; BALDINI, Gianmarco; SKARMETA, Antonio; SIRIS, Vasilios; NIKANDER, Pekka. 2020. “An interledger blockchain platform for cross-border management of cybersecurity information” In: IEEE Internet Computing. Vol. 24, No. 3, pp. 19-29.
NESPOLI, Pantaleone; GÓMEZ MÁRMOL, Felix; MAESTRE VIDAL, Jorge. 2021. “Battling against cyberattacks: Towards pre-standardization of countermeasures” In: Cluster Computing. Vol. 24, No. 1, pp. 57-81.
OSEI-KYEI, Robert; CHAN, Albert. 2015. “Review of studies on the critical success factors for publiceprivate partnership (PPP) projects from 1990 to 2013” In: International Journal of Project Management. Vol. 33, No. 6, pp. 1335-1346.
PALASINSKI, Marek; BOWMAN-GRIEVE, Lorraine. 2017. “Tackling cyber- terrorism: Balancing surveillance with counter-communication” In: Security Journal. Vol. 30, No. 2, pp. 556-568.
PARK, Sangdon; KIM, Il Hwan; KIM, Jaehyoun; LEE, Kyung Lyul. 2018. “The diagnosis and prescription for cybersecurity in Korea: Focusing on policy and system” In: KSII Transactions on Internet and Information Systems. Vol. 12, No. 2, pp. 843-859.
PLOTNEK, Jordan; SLAY, Jill. 2021. “Cyber terrorism: A homogenized taxonomy and definition” In: Computers & Security. Vol. 102, Article 102145. Available online. In: DOI: https://doi.org/10.1016/j. cose.2020.102145. Consultation date: 16/04/2021.
PONNUSAMY, Suhannia; RUBASUNDRAM, Geetha. 2019. “An international study on the risk of cyber terrorism” In: International Journal of Recent Technology and Engineering. Vol. 7, No. 5, pp. 159-163.
QUINCOZES, Silvio; ALBUQUERQUE, Celio; PASSOS, Diego; MOSSÉ, Daniel. 2021. “A survey on intrusion detection and prevention systems in digital substations” In: Computer Networks. Vol. 184, Article 107679. Available online. In: DOI: https://doi.org/10.1016/j.comnet.2020.107679. Consultation date: 16/04/2021.
RASS, Stefan; SCHAUER, Stefan; KÖNIG, Sandra; ZHU, Quanyan. 2020. Cyber-Security in Critical Infrastructures. Springer. Berlin, Germany.
REHMAN, Shafiq; KHALIQ, Muhammad; IMTIAZ, Mulla; RASOOL, Asif; SHAFIQ, Muhammad; JAVED, Zahira; BASHIR, Khalid. 2021. “DIDDOS: An approach for detection and identification of distributed denial of service (DDoS) cyberattacks using gated recurrent units (GRU)” In: Future Generation Computer Systems. Vol. 118, pp. 453-466.
SADIK, Shahrin; AHMED, Mohiuddin; SIKOS, Leslie; NAJMUL, Islam. 2020. “Toward a sustainable cybersecurity ecosystem” In: Computers. Vol. 9, No. 3, pp. 1-17.
STURC, Boris; GUROVA, Tatyana; CHERNOV, Sergei. 2020. “The specifics and patterns of cybercrime in the field of payment processing” In: International Journal of Criminology and Sociology. Vol. 9, pp. 2021- 2030.
SYAFRIZAL, Melwin; SELAMAT, Rahayu; ZAKARIA, Nurul Azma. 2020. “Analysis of cybersecurity standard and framework components” In: International Journal of Communication Networks and Information Security. Vol. 12, No. 3, pp. 417-432.
TAHA, Ahmad; QI, Junjian; WANG, Jianhui; PANCHAL, Jitesh. 2018. “Risk mitigation for dynamic state estimation against cyber-attacks and unknown inputs” In: IEEE Transactions on Smart Grid. Vol. 9, No. 2, pp. 886-899.
THAPA, Niraj; LIU, Zhipeng; GOKARAJU, Balakrishna; ROY, Kaushik. 2020. “Comparison of machine learning and deep learning models for network intrusion detection systems” In: Future Internet. Vol. 12, No. 10, pp. 1-16.
TIAN, Qiuting; HAN, Dezhi; LI, Kuan-Ching; LIU, Xingao; DUAN, Letian; CASTIGLIONE, Arcangelo. 2020. “An intrusion detection approach based on improved deep belief network” In: Applied Intelligence. Vol. 50, No. 10, pp. 3162-3178.
UNITED NATIONS. 2008. Human Rights, Terrorism and Counter-terrorism.
Available online. In: https://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Consultation date: 14/02/2021.
UNITED NATIONS. 2017. Combatting Cybercrime: Tools and Capacity Building for Emerging Economies. World Bank and United Nations. Washington, DC, USA.
UNICRI. 2014. Cybercrime: Risks for the Economy and Enterprises at the EU and Italian Level, Turin. Available online. In: http://www.unicri.it/in_focus/files/Criminalita_informatica_inglese.pdf. Consultation date: 14/02/2021.
VÄLJA, Margus; HEIDING, Fredrik; FRANKE, Ulrik; LAGERSTRÖM, Robert. 2020. “Automating threat modelling using an ontology framework: Validated with data from critical infrastructures” In: Cybersecurity. Vol. 3, No. 19, pp. 412-420.
VEERASAMY, Namosha; GROBLER, Marthie. 2015. “Logic tester for the classification of cyberterrorism attacks” In: International Journal of Cyber Warfare and Terrorism. Vol. 5, No. 1, pp. 30-46.
VILIĆ, Vida. 2017. “Dark web, cyber terrorism and cyber warfare: Dark side of the cyberspace” In: Balkan Social Science Review. Vol. 10, No. 10, pp. 7-25.
WEF (World Economic Forum). 2021. The Global Risks Report 2021. Available online. In: https://www.weforum.org/reports/the-global-risks- report-2021. Consultation date: 11/02/2021.
WILNER, Alex. 2017. “Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation” In: Comparative Strategy. Vol. 36, No. 4, pp. 309-318.
YAU, Hon-Min. 2020. “Evolving toward a balanced cyber strategy in East Asia: Cyber deterrence or cooperation?” In: Issues & Studies. Vol. 56, No. 03, pp. 23-39.
YI, Wen; CHAN, Albert. 2014. “Critical review of labor productivity research in construction journals” In: Journal of Management in Engineering. Vol. 30, No. 2, pp. 214-225.
YU, Yao; OSEI-KYEI, Robert; CHAN, Albert; PING Chuen; CHEN, Chuan; MARTEK, Igor. 2018. “Review of social responsibility factors for sustainable development in public-private partnerships” In: Sustainable development. Vol. 26, No. 6, pp. 515-524.
Copyright
The authors who publish in this journal agree to the following terms:
The authors retain the copyright and guarantee the journal the right to be the first publication where the article is presented, which is published under a Creative Commons Attribution License, which allows others to share the work prior to the recognition of the authorship of the article work and initial publication in this journal.
Authors may separately establish additional agreements for the non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgment of its initial publication in this journal.
This work is under license:
Creative Commons Reconocimiento-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0)