Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

2011

Cybersecurity

Articles 1 - 3 of 3

Full-Text Articles in Public Affairs, Public Policy and Public Administration

Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer Jul 2011

Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer

Journal of Strategic Security

The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …


China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal Jul 2011

China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal

Journal of Strategic Security

This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …


Radicalization And The Use Of Social Media, Robin L. Thompson Jan 2011

Radicalization And The Use Of Social Media, Robin L. Thompson

Journal of Strategic Security

The use of social media tools by individuals and organizations to radicalize individuals for political and social change has become increasingly popular as the Internet penetrates more of the world and mobile computing devices are more accessible. To establish a construct for radicalization,the power and reach of social media will be described so there is common understanding of what social media is and how it is utilized by various individuals and groups. The second section will answer the question of why social media applications are the perfect platform for the radical voice. Finally, the use of social media and its …