Guarding the Nation: A Comprehensive Look at State Cybersecurity Measure
Downloads
In a continuously evolving world, technology has not been left out of the process which consists of studies and research done by specialists in the field of cyber technology. Although the latter has brought along benignant effects in society, it can be considered a controversial domain due to those effects that can be used against the public safety and national security. Cyber-attacks & Cyber terrorism are just two of them, usually countered by Cyber intelligence, OSINT security, Cyber risk management. These actions are coordinated by different intelligence services such as: Federal Bureau of Investigation – FBI, Romanian Intelligence Service – SRI, Federal Security Service – FSB, while they have to cooperate with civilians, due to a shortage of employees. The lack of qualified staff on the following domain: awareness of the different types of cyber-attack, such as malware, web-based attacks, phishing, web application attacks, spam, distributed denial of service (DDoS), identity theft, data breach, insider threat, botnets, physical manipulation, damage, theft and loss, information leakage, ransomware, cyber-espionage, industrial espionage and crypto jacking, reaches an amount of 7.659 officials that are needed in this area.
Downloads
Cross-Sector Cybersecurity Performance Goals, March 2023: https://www.cisa.gov/resources-tools/resources/cpg-report.
Boozallen, What are the 7 types of security? https://www.boozallen.com/expertise/cybersecurity/national-cyber-strategy.html.
ESET, Part 1: “En Route with Sednit: Approaching the Target” Part 2: “En Route with Sednit: Observing the Comings and Goings” Part 3: “En Route with Sednit: A Mysterious Downloader”, October 2016: https://www.eset.com/afr/about/newsroom/press-releases-afr/research/dissection-of-sednit-espionage-group-1/.
Editorial Team from Front Lines, CrowdStrike’s work with the Democratic National Committee: Setting the record straight , 5 June 2020: https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/.
Malpedia, X-AGENT & MALWARE Reports, 2014-2020: https://malpedia.caad.fkie.fraunhofer.de/details/win.xagent.
CISAGOV & FBI, X-AGENT MALWARE FAMILY (Figures&Working Diagram), 29 December 2016: https://www.cisa.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf.
World Economic Forum, Global Risk Reports, January 2023: https://www.weforum.org/reports/global-risks-report-2023/.
Cloud Flare, DDoS Attacks: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/.
The importance of cybersecurity in military, Nicole Allen, 20 Oct. 2021: https://saltcommunications.com/news/the-importance-of-cybersecurity-in-military/.
Fireeye APT28 & Programing Lines: http://www2.fireeye.com/rs/fireye/images/rpt-apt28.pdf.
National Security Technology Accelerator, 26 April 2022: https://nstxl.org/cybersecurity/.
Akshay Joshi, Daniel Dobrygowki, World Economic Forum, The US has announced its National Cybersecurity Strategy: Here’s what you need to know, 9 March 2023: https://www.weforum.org/agenda/2023/03/us-national-cybersecurity-strategy/.
Cyberscoop, Christian Vasqyez, 16 December 2022: https://cyberscoop.com/apt28-fancy-bear-satellite/.
Editorial Team, Research & Threat Intel, Who is FANCY BEAR, 12 February 2019: https://www.crowdstrike.com/blog/who-is-fancy-bear/.