Cyberattacks: Does Physical Boundry Matter?
نویسندگان
چکیده
Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. The policy and managerial implication is that physical boundary should be an important factor in addressing strategic cyber attacks and their potential risks.
منابع مشابه
Buckling optimization of elastic IPE and circular sections columns considering boundry condition effects
Abstract: The theory of optimization has improved remarkably during the last four decades. The main part of optimizing investigations has been focused on enhancing buckling resistance which does not violate the economic feasibility of final design. The finite element analysis which is called ESO (Evolutionary Structural Optimization) is presented for optimum (or most ideal) design of c...
متن کاملDeterrence theory in the cyber - century . Lessons from a state - of - the - art literature review
Cyberattacks from a variety of perpetrators are constantly rising. To achieve restraint from attacks, deterrence theory has long been considered a valuable concept. How do criticisms of classical deterrence apply in this relatively new domain, and how does cyberdeterrence differ? Can offensive cyber capabilities be effective in deterring adversaries or must kinetic retaliation be “on the table”...
متن کاملLeveraging Strategic Defense Techniques for Smart Home Pricing Cyberattacks
Smart home, which controls the end use of the power grid, has become a critical component in the smart grid infrastructure. In a smart home system, the advanced metering infrastructure (AMI) is used to connect smart meters with the power system and the communication system of a smart grid. The electricity pricing information is transmitted from the utility to the local community, and then broad...
متن کاملVulnerabilities of Electric Vehicle Battery Packs to Cyberattacks on Auxiliary Components
Modern automobiles are entirely controlled by electronic circuits and programs which undoubtedly exposes them to the threat of cyberattacks. Alongside, there is a potential for massive growth in electric vehicle (EV) adoption. The cyber vulnerabilities are magnified with electric vehicles because of the unique and critical risks that entail most EV batteries. EV battery packs provide ‘limited d...
متن کامل