Published:  April 9, 2020

Data-Centric Environment – Rise of Internet-Based Modern Warfare ‘iWar

Volume 7, Issue 4 of the CSIAC Journal, titled “Data-Centric Environment – Rise of Internet-Based Modern Warfare ‘iWar’,” addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities. This Issue’s first article, titled “Evaluation of Comprehensive Taxonomies for Information Technology Threats” evaluates the different taxonomies of cyber-physical threats and their associated impact on mission capabilities. The second offering identifies a number of social media cyber-attacks as well as solution-based platforms to ascertain whether malicious activity has occurred. This Issue’s third article investigates the performance of several binary classifiers and their ability to distinguish between non-verified and verified tweets based on the age of training data, under the title “Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers.” The final article in this Issue, titled “Rebooting Letters of Marque for Private Sector Active Cyber Defense,” discusses a modern interpretation of a Constitutional Clause to allow the private sector to defend themselves outside of their network borders.

In This Issue

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.

Rebooting Letters of Marque for Private Sector, Active Cyber Defense

The views expressed in this paper are those of the author and do not reflect the official policy or position of the 780th Military Intelligence Brigade, U.S. Intelligence and Security Command, Department of the Army,…

Can the “Gorilla” Deliver? Assessing the Security of Google’s New “Thread” Internet of Things (IoT) Protocol

Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that exploited vulnerabilities in remote cameras and home routers. Currently, no industry standard exists to provide…

Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers

Sophisticated adversaries are moving their botnet command and control infrastructure to social media microblogging sites such as Twitter. As security practitioners work to identify new methods for detecting and disrupting such botnets, including machine-learning approaches,…

Evaluation of Comprehensive Taxonomies for Information Technology Threats

Categorization of all information technology threats can improve communication of risk for an organization’s decision-makers who must determine the investment strategy of security controls. While there are several comprehensive taxonomies for grouping threats, there is…