Facing cyberthreats in a crisis and post-crisis era: Rethinking security services response strategy.

Comput Hum Behav Rep

Levis City Police Service, Levis, QC, Canada.

Published: May 2023

The recent years have witnessed two major events that have deeply impacted cybersecurity threats. First, the COVID-19 pandemic has drastically increased our dependence upon technology. From individuals to corporations and governments, the overwhelming majority of our activities moved online. As the proportion of human activities performed online is reaching new peaks, cybersecurity becomes a problem of national security. Second, the Russia-Ukraine war is giving us a glimpse of what cyberthreats may look like in future cyberconflicts. From data integrity to identity thievery, and from industrial espionage to hostile manoeuvres from foreign powers, cyberthreats have never been that numerous and diverse. Due to the increase of the magnitude, of the diversity, and of the complexity of cyberthreats, the current security strategies used to face cybercriminality won't be sufficient in the post-crisis era. Therefore, governments need to rethink globally their national security services response strategy. This paper analyses how this new context has impacted cybersecurity for individuals, corporations, and governments, and emphasis the need to reposition the economical identity of the individuals at the center of security response. We propose strategies to optimize law enforcement response from police to counterintelligence, notably through formation, prevention, and interaction with cybercriminality. We then discuss the possibilities to optimize the articulation of the different levels of security response and expertise, by emphasizing the need for coordination between security services, and by proposing strategies to include non-institutional players.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10043949PMC
http://dx.doi.org/10.1016/j.chbr.2023.100282DOI Listing

Publication Analysis

Top Keywords

security services
12
post-crisis era
8
services response
8
response strategy
8
impacted cybersecurity
8
individuals corporations
8
corporations governments
8
national security
8
security response
8
security
7

Similar Publications

Background: Forecasting future public pharmaceutical expenditure is a challenge for healthcare payers, particularly owing to the unpredictability of new market introductions and their economic impact. No best-practice forecasting methods have been established so far. The literature distinguishes between the top-down approach, based on historical trends, and the bottom-up approach, using a combination of historical and horizon scanning data.

View Article and Find Full Text PDF

As modern vehicles continue to evolve, advanced technologies are integrated to enhance the driving experience. A key enabler of this advancement is the Controller Area Network (CAN) bus, which facilitates seamless communication between vehicle components. Despite its widespread adoption, the CAN bus was not designed with security as a priority, making it vulnerable to various attacks.

View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

Securing Cloud-Based Internet of Things: Challenges and Mitigations.

Sensors (Basel)

December 2024

Department of Computer Science & Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea.

The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.

View Article and Find Full Text PDF

What Is Grazing Time? Insights from the Acoustic Signature of Goat Jaw Activity in Wooded Landscapes.

Sensors (Basel)

December 2024

Rangeland Service, Ministry of Agriculture and Food Security, P.O. Box 30, Rishon LeZion 5025001, Israel.

Acoustic monitoring facilitates the detailed study of herbivore grazing by generating a timeline of sound bursts associated with jaw movements (JMs) that perform bite or chew actions. The unclassified stream of JM events was used here in an observational study to explore the notion of "grazing time". Working with shepherded goat herds in a wooded landscape, a horn-based acoustic sensor with a vibration-type microphone was deployed on a volunteer animal along each of 12 foraging routes.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!