Näytä suppeat kuvailutiedot

dc.contributor.authorKari, Martti
dc.contributor.editorCruz, Tiago
dc.contributor.editorSimoes, Paulo
dc.date.accessioned2020-01-07T07:32:05Z
dc.date.available2020-01-07T07:32:05Z
dc.date.issued2019
dc.identifier.citationKari, M. (2019). Protecting the besieged cyber fortress : Russia’s response to cyber threats. In T. Cruz, & P. Simoes (Eds.), <i>ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security</i> (pp. 685-691). Academic Conferences International. Proceedings of the European conference on information warfare and security.
dc.identifier.otherCONVID_32270992
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67102
dc.description.abstractThe Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information-psychological (i.e., when the adversary tries to influence a person’s mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by an internal or external actor into the information infrastructure of the RF to achieve political, social, or other goals. Cyber threats against Russia are increasing and becoming more diverse. The Russian assessment of the cyber threat contains the same besieged fortress narrative as the country’s other threat assessments do. In this narrative, Russia is surrounded by hostile states and non-state actors in cyberspace. The sources of the cyber threat are Western intelligence services, terrorists, extremist movements, and criminals. To protect itself against cyber threats, Russia is increasing its digital sovereignty by preparing to isolate the Russian segment of the Internet, RUNET, from the global Internet. Russia is also improving the protection of its critical information infrastructure. To protect itself against cyber threats but also to monitor the opposition, Russia has increased surveillance of RUNET and banned user anonymity. Russia is also making an effort to replace imported information and communication technology (ICT) with Russian production. This paper discuss Russia’s defense against cyber threats. After the introduction, the paper begins with a description of the Russian cyber threat perception. The main section then discusses Russia’s response to this threat. This study uses grounded theory, an appropriate method for this subject because little theoretical and structured information has, to date, been published on the Russian response to cyber threats. The study data are drawn from official Russian documents such as strategies, doctrines, laws, and presidential decrees.en
dc.format.extent884
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.otherVenäjä
dc.subject.othercyber defense
dc.subject.othercyber threat
dc.subject.othercyberspace
dc.subject.otherRussia
dc.titleProtecting the besieged cyber fortress : Russia’s response to cyber threats
dc.typeconference paper
dc.identifier.urnURN:NBN:fi:jyu-202001071043
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-28-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange685-691
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© The Author(s) 2019
dc.rights.accesslevelopenAccessfi
dc.type.publicationconferenceObject
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoinfrastruktuurit
dc.subject.ysokyberavaruus
dc.subject.ysokyberturvallisuus
dc.subject.ysoturvallisuuspolitiikka
dc.subject.ysoverkkohyökkäykset
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p7989
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p9566
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright