dc.contributor.author | Kari, Martti | |
dc.contributor.editor | Cruz, Tiago | |
dc.contributor.editor | Simoes, Paulo | |
dc.date.accessioned | 2020-01-07T07:32:05Z | |
dc.date.available | 2020-01-07T07:32:05Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Kari, M. (2019). Protecting the besieged cyber fortress : Russia’s response to cyber threats. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 685-691). Academic Conferences International. Proceedings of the European conference on information warfare and security. | |
dc.identifier.other | CONVID_32270992 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67102 | |
dc.description.abstract | The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information-psychological (i.e., when the adversary tries to influence a person’s mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by an internal or external actor into the information infrastructure of the RF to achieve political, social, or other goals. Cyber threats against Russia are increasing and becoming more diverse. The Russian assessment of the cyber threat contains the same besieged fortress narrative as the country’s other threat assessments do. In this narrative, Russia is surrounded by hostile states and non-state actors in cyberspace. The sources of the cyber threat are Western intelligence services, terrorists, extremist movements, and criminals. To protect itself against cyber threats, Russia is increasing its digital sovereignty by preparing to isolate the Russian segment of the Internet, RUNET, from the global Internet. Russia is also improving the protection of its critical information infrastructure. To protect itself against cyber threats but also to monitor the opposition, Russia has increased surveillance of RUNET and banned user anonymity. Russia is also making an effort to replace imported information and communication technology (ICT) with Russian production. This paper discuss Russia’s defense against cyber threats. After the introduction, the paper begins with a description of the Russian cyber threat perception. The main section then discusses Russia’s response to this threat. This study uses grounded theory, an appropriate method for this subject because little theoretical and structured information has, to date, been published on the Russian response to cyber threats. The study data are drawn from official Russian documents such as strategies, doctrines, laws, and presidential decrees. | en |
dc.format.extent | 884 | |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European conference on information warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | Venäjä | |
dc.subject.other | cyber defense | |
dc.subject.other | cyber threat | |
dc.subject.other | cyberspace | |
dc.subject.other | Russia | |
dc.title | Protecting the besieged cyber fortress : Russia’s response to cyber threats | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202001071043 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-28-0 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 685-691 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Author(s) 2019 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | infrastruktuurit | |
dc.subject.yso | kyberavaruus | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | turvallisuuspolitiikka | |
dc.subject.yso | verkkohyökkäykset | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7989 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9566 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A4 | |