Search results for "kybersodankäynti"
showing 10 items of 11 documents
Information Influence in Society’s Information Environment : An Empirical Analysis Using the Grounded Theory
2020
This paper investigates information influence in society’s Information Environment. The Grounded Theory approach was used to collect and to analyse the data. A conceptual framework of the thematic categories and item categories was developed on the basis of empirical evidence and past studies that reflect the findings of the field. The most fundamental components in this conceptual framework were six thematic categories (information influence, information operations, cyber operations, psychological operations, kinetic operations, and deception), their item categories, the items themselves, and the interrelationships between the thematic categories. The propositions regarding the thematic ca…
Cyberspace from the hybrid threat perspective
2013
Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community. peerReviewed
Sotia käydään myös digitaalisesti : eikä Ukrainan sota ole poikkeus
2022
Cyber warfare : the game changer in the battlespace
2022
A recent development in warfare has been the integration of Electronic Warfare (EW), Information Warfare (IW) and Cyber Warfare (CW) systems designed to generate non-kinetic effects in battle space together with the traditional use of kinetic weapons. These new capacities of armed forces create new possibilities to achieve the goals of war. These advanced and new capabilities form a whole new non-kinetic environment in which they have become a game changer in battle space. This article focuses on describing cyber warfare and the first experiences of the war in Ukraine. nonPeerReviewed
Where Cyber Meets the Electromagnetic Spectrum
2019
Cyber linked with Information Technology, computers and the internet are the most commonly understood potential threats that everybody is aware of nowadays. In the case of National Cyber Strategy most efforts are given to these potential battlefields and threats. But is it enough to stay with these paradigms? Cyber warfare will look for utmost effects for chaos and misalignment of economy and therefore we cannot exclude the facts, that there is a potential threat also possible in the cut volumes between the information technology, the electromagnetic spectrum and its linked infrastructure and processes. We understand the technology for mobile telecommunications and data transfer, as the pro…
Components of defence strategies in society’s information environment: a case study based on the grounded theory
2020
Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory. Results: This study shows that the goal of politically and militarily hostile actors is to weaken society’s infor…
Drones in cyber security environment
2019
Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…
The Cumulative Cyber Deterrence
2022
The cumulative cyber deterrence can be seen as a concept in which increasing the weight of different means and their use increases the deterrent effect on a common level or on selected adversaries. Cumulative cyber deterrence may include all traditional options of deterrence, and can be active or passive. Active deterrence can be characterized as targeting specific threats and actors, as a deterrent consisting of several different methods, while passive deterrence is a form of deterrence commonly targeted at all the potential adversaries. The cumulative cyber deterrence can be an independent type of deterrence or part of a state’s overall deterrence. This paper approaches the concept of cum…
Cyber deterrence and Russia’s active cyber defense
2020
Non-Kinetic Warfare : The New Game Changer in the Battle Space
2020
Cyber warfare, information warfare, electronic warfare, command and control warfare, spectrum warfare. Those are only some of the names by which researchers and military experts describe their offensive and defensive non-kinetic actions. The reason for the diversity of the non-kinetic environment is the evolution of the military Electromagnetic Spectrum (EMS) and digital environment over 100 years. With the arrival of radio in the early 20th century, the militarization of the electronic operating environment began. The latest expansion is the formation of the cyber space. Also, the definitions vary significantly. There are differences between USA, Russia, China and NATO. Western countries t…