Protecting the Besieged Cyber Fortress: Russia's Response to Cyber Threats

被引:0
|
作者
Kari, Martti [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
Russia; cyber threat; cyber defense; cyberspace;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information psychological (i.e., when the adversary tries to influence a person's mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by an internal or external actor into the information infrastructure of the RF to achieve political, social, or other goals. Cyber threats against Russia are increasing and becoming more diverse. The Russian assessment of the cyber threat contains the same besieged fortress narrative as the country's other threat assessments do. In this narrative, Russia is surrounded by hostile states and non-state actors in cyberspace. The sources of the cyber threat are Western intelligence services, terrorists, extremist movements, and criminals. To protect itself against cyber threats, Russia is increasing its digital sovereignty by preparing to isolate the Russian segment of the Internet, RUNET, from the global Internet. Russia is also improving the protection of its critical information infrastructure. To protect itself against cyber threats but also to monitor the opposition, Russia has increased surveillance of RUNE/and banned user anonymity. Russia is also making an effort to replace imported information and communication technology (ICT) with Russian production. This paper discuss Russia's defense against cyber threats. After the introduction, the paper begins with a description of the Russian cyber threat perception. The main section then discusses Russia's response to this threat. This study uses grounded theory, an appropriate method for this subject because little theoretical and structured information has, to date, been published on the Russian response to cyber threats. The study data are drawn from official Russian documents such as strategies, doctrines, laws, and presidential decrees.
引用
收藏
页码:685 / 691
页数:7
相关论文
共 50 条
  • [1] Protecting against cyber threats in networked information systems
    Ertoz, L
    Lazarevic, A
    Eilertson, E
    Tan, PN
    Dokas, P
    Kumar, V
    Srivastava, J
    [J]. BATTLESPACE DIGITIZATION AND NETWORK-CENTRIC SYSTEMS III, 2003, 5101 : 51 - 56
  • [2] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [3] Cyber Security Threats in Russia in the Context of Digital Economy
    Vavilina, Alla Vladimirovna
    Manakhova, Irina Viktorovna
    Shcherbakova, Natalia Sergeevna
    [J]. EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 10431 - 10444
  • [4] Cyber Threats Mega Trends in Cyber Space
    Rusi, Tarja
    Lehto, Martti
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 323 - 331
  • [5] Cyber threats: Reducing the time to detection and response
    Brewer, Ross
    [J]. Network Security, 2015, 2015 (05) : 5 - 8
  • [6] Cyber Threats and Cyber Deception in Hybrid Warfare
    Steingartner, William
    Galinec, Darko
    [J]. ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 25 - 45
  • [7] Classifying resilience approaches for protecting smart grids against cyber threats
    Syrmakesis, Andrew D.
    Alcaraz, Cristina
    Hatziargyriou, Nikos D.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (05) : 1189 - 1210
  • [8] Protecting water and wastewater utilities from cyber-physical threats
    Clark, Robert M.
    Hakim, Simon
    Panguluri, Srinivas
    [J]. WATER AND ENVIRONMENT JOURNAL, 2018, 32 (03) : 384 - 391
  • [9] Classifying resilience approaches for protecting smart grids against cyber threats
    Andrew D. Syrmakesis
    Cristina Alcaraz
    Nikos D. Hatziargyriou
    [J]. International Journal of Information Security, 2022, 21 : 1189 - 1210
  • [10] Prepare for cyber threats
    Gill, Suzanne
    [J]. Control Engineering, 2019, 66 (10)