27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Karim Hamza and Van Dalen<br />

productive and efficient role as facilitator and maintainer of some information systems and<br />

infrastructure, and through policy mechanisms such as; tax breaks to encourage reducing vulnerability<br />

and improving recovery and reconstitution capability. An important factor is the traditional change in<br />

the government’s role as one move from national defense through public safety toward things that<br />

represent the public good. Clearly, the government’s perceived role in this area will have to be<br />

balanced against public perceptions of the loss of civil liberties and the commercial sector’s concern<br />

about unwarranted limits on its practices and markets.<br />

When responding to information warfare, military strategy can thus no longer focus just on support to<br />

and operations. It must also examine information warfare implications on its state and allies’ strategic<br />

infrastructures military, physical, economic, political, and social that depends upon information<br />

systems and information support.<br />

Figure 2: Strategic information warfare impact , (Roger, Molander, Riddile, Wilson, 1996)<br />

Government can use and develop different tools and techniques to handle such situation<br />

Research and Development: The government’s role in defending against such threats, apart from<br />

protecting its own systems, is indirect: Sponsor research, development, and standard creation in<br />

computer network defense. Maximize the incentives for private industry to keep its own house in<br />

order. Increase the resources devoted to cyber forensics, including the distribution of honeypots<br />

to trap rogue code for analysis. Encourage information-sharing among both private and public<br />

network operators. Invest in threat intelligence. Subsidize the education of computer security<br />

professionals. All are current agenda items. In a cyberwar, all would receive greater emphasis.<br />

(LibiCki, 2009)<br />

Policy : defining policies that deals with different Strategic Information Warfare threats and<br />

engage different international parties , also working on modify constitutes an act of war, which<br />

may be defined as one of three ways: universally, multilaterally, and unilaterally. A universal<br />

definition is one that every state accepts. The closest analog to “every state” is when the United<br />

Nations says that something is an act of war. The next-closest analog is if enough nations have<br />

signed a treaty that says as much. No such United Nations dictum exists, and no treaty says as<br />

much. One might argue that a cyber attack (which is an output of Strategic Information warfare) is<br />

like something else that is clearly an act of war, but unless there is a global consensus that such<br />

an analogy is valid, it cannot be defined as an act of war.<br />

Laws : develop clear laws to criminalize action which threat eGovernance framework specially<br />

with internal threat<br />

Diplomatic : develop allies networks to discover different joint threats that can impact each other<br />

Governance through intelligence and early detections<br />

111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!