Top Cybersecurity Trends For 2021 and Beyond

By William Rials Abstract This article provides an overview of the cybersecurity landscape and how it was dramatically shifted due to the COVID-19 pandemic. In addition, it provides a look into the future with the top 10 cybersecurity trends and predictions for 2021 and beyond. The pandemic response caused massive disruptions to the way we

Normalizing Cybersecurity: Improving Cyber Incident Response with the Incident Command System

Darin HansOn EXECUTIVE SUMMARY In February of 2018, the state of Colorado became the first state in the nation to issue an emergency declaration for a cyber attack after its Department of Transportation was struck with ransomware.[1]  After early struggles responding to the incident, the Incident Command System (ICS) was implemented and a Unified Command

International Governance of Non-State Actors in Cyberspace: Is A Single Entity Sufficient for Dispute Resolution?

Jaclyn Francis  Executive summary The 21st century digital “Information Age” is characterized by dynamism, innovation, and new technological capabilities. The cyber domain provides limitless technological capabilities to improve living in the modern world. As technological capabilities expand to meet the needs of an information-driven society, it is critical that the international community create an international

Book Review: Inside the Enemy’s Computer: Identifying Cyber-Attackers by Clement Guitton

Reviewed by Mark T. Peters II, USAF, Retired Suggested Citation Peters, Mark T. Review of Inside the Enemy’s Computer: Identifying Cyber-Attackers, by Clement Guitton. Homeland Security Affairs 16, Article 2. www.hsaj.org/articles/15817 Expanding cyber-domain conflicts challenge modern strategists to create definitive attribution standards for who did what to whom, especially in developing national policy. Attribution’s importance

The Mole in Your Pocket: A Study of the Data Gathering Capabilities and Security Implications of Modern Smartphones

Paula Maxson EXECUTIVE SUMMARY According to a survey by the Pew Research Center, 77 percent of U.S. adults own a smartphone. Since most smartphone users are completely unaware of the sensors that are built into their phones, it is critical to evaluate the potential homeland security risks posed by the routine data collection and sharing

Incentivizing Cyber Security Investment in the Power Sector Using An Extended Cyber Insurance Framework

By Jack Rosson, Mason Rice, Juan Lopez, and David Fass Abstract Collaboration between the DHS Cybersecurity and Infrastructure Security Agency (CISA) and public- sector partners has revealed that a dearth of cyber- incident data combined with the unpredictability of cyber attacks have contributed to a shortfall in first-party cyber insurance protection in the critical infrastructure

Implementation of Active Cyber Defense Measures by Private Entities: The Need for an International Body to Address Disputes

Ike Barnes EXECUTIVE SUMMARY News reports about cyber-attacks against corporations are commonplace. A search of Google News on July 31, 2017, for cyber-attacks yielded eight articles from the same day on the first page of the search return. To address this problem, organizations such as George Washington University’s Center for Cyber and Homeland Security and

Cyber Federalism: Defining Cyber’s Jurisdictional Boundaries

Eric Rosner EXECUTIVE SUMMARY As technology matures and produces new opportunities for human advancement, it also creates new threats and vulnerabilities. Today’s interconnected and interdependent systems heighten these risks because they increase the likelihood of a cyber-attack having cascading consequences across the country. The federal government plays a large role in cyber preparedness and cyber

Hacking your ride: Is Web 2.0 creating vulnerabilities to surface transportation?

Cedric Novenario EXECUTIVE SUMMARY Traffic congestion during commuting hours (7:00 A.M. to 9:00 A.M. and 4:00 P.M. to 6:00 P.M.) is as much a guarantee as death and taxes. Sitting in traffic gridlock consumes valuable free time, adds pollutants to the air, and reduces overall quality of life.[1] Developers from the mobile application (app) world

Protecting Networks via Automated Defense of Cyber Systems

Matthew Morin EXECUTIVE SUMMARY This thesis examined if automated cyber defense promises to be more effective than current models to cope with the results of vulnerabilities introduced by the projected increase in Internet-enabled devices. The question was scoped to foresee cyberspace landscape evolution over the next 10 to 15 years. In particular, the author claims