Prediction of terrorism pattern accompanied by cyber-terrorism and the
development direction of corresponding legal systems
- URL: http://arxiv.org/abs/2203.03620v1
- Date: Sat, 5 Mar 2022 00:21:15 GMT
- Title: Prediction of terrorism pattern accompanied by cyber-terrorism and the
development direction of corresponding legal systems
- Authors: Daegeon Kim
- Abstract summary: As terrorist groups' access to cyber-attack assets improves, the traditional form of terrorism is also expected to change to a form combined with cyber-terrorism.
From a national security point of view, Korea lacks a legal system to prepare for and respond to cyber terrorism.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: As the information and communication system has become an essential element
for national operation and people's lives, and the dependence on information
and communication systems such as national infrastructure systems and
facilities increases, cyber terrorism is rapidly emerging as a serious threat
to national security in peacetime. As terrorist groups' access to cyber-attack
assets improves, the traditional form of terrorism is also expected to change
to a form combined with cyber-terrorism. Nevertheless, from a national security
point of view, Korea lacks a legal system to prepare for and respond to cyber
terrorism. In this paper, based on the development process of the modern
military operation concept, we predict the changes in the form of terrorism,
analyze the restrictions on the national response to cyber-terrorism based on
the current legal system, and propose the development directions.
Related papers
- Analysing India's Cyber Warfare Readiness and Developing a Defence Strategy [0.0]
The demand for strong cyber defence measures grows, especially in countries such as India.
The literature review reveals significant shortcomings in India's cyber defence readiness.
The study proposes an educational framework for training cyber professionals.
arXiv Detail & Related papers (2024-06-18T12:55:07Z) - Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - Intell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology [8.246783059859887]
This study proposes Intell-dragonfly, a cyber security attack surface generation engine based on artificial intelligence generation technology.
Based on ChatGPT technology, this paper designs an automated attack surface generation process, which can generate diversified and personalized attack scenarios.
The experimental results show that the ChatGPT-based method has significant advantages in the accuracy, diversity and operability of attack surface generation.
arXiv Detail & Related papers (2023-11-01T02:46:02Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Defending against cybersecurity threats to the payments and banking
system [0.0]
The proliferation of cyber crimes is a huge concern for various stakeholders in the banking sector.
To prevent risks of cyber-attacks on software systems, entities operating within cyberspace must be identified.
This paper will examine various approaches that identify assets in cyberspace, classify the cyber threats, provide security defenses and map security measures to control types and functionalities.
arXiv Detail & Related papers (2022-12-15T11:55:11Z) - Towards Automated Classification of Attackers' TTPs by combining NLP
with ML Techniques [77.34726150561087]
We evaluate and compare different Natural Language Processing (NLP) and machine learning techniques used for security information extraction in research.
Based on our investigations we propose a data processing pipeline that automatically classifies unstructured text according to attackers' tactics and techniques.
arXiv Detail & Related papers (2022-07-18T09:59:21Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z) - Beyond kinetic harm and towards a dynamic conceptualization of
cyberterrorism [0.0]
After more than two decades of discussion, the concept of cyberterrorism remains plagued by confusion.
This article presents the result of an integrative review which maps the development of the term and situates the communities that have shaped the debate.
arXiv Detail & Related papers (2020-12-16T16:23:11Z) - An Automated, End-to-End Framework for Modeling Attacks From
Vulnerability Descriptions [46.40410084504383]
In order to derive a relevant attack graph, up-to-date information on known attack techniques should be represented as interaction rules.
We present a novel, end-to-end, automated framework for modeling new attack techniques from textual description of a security vulnerability.
arXiv Detail & Related papers (2020-08-10T19:27:34Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.