Abstract
In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in case of losing controls of such weapons. Existing methods are summarized and new techniques which are currently under development are described. Some of the current limitations and challenges are also identified. To tackle these challenges, we propose a socio-technical framework, in which Cyber Ranges can play a major role.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schmitt, M.N.: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)
Jesson, J., Matheson, L., Lacey, F.M.: Doing Your Literature Review: Traditional and Systematic Techniques. Sage, London (2011)
Zschoch, M.A.: Configurational comparative methods: qualitative comparative analysis (QCA) and related techniques. Edited by Rihoux, B., Ragin, C., pp. xxv. Sage Publications, Thousand Oaks (2009). Canadian Journal of Political Science/Revue canadienne de science politique, 44(3), 743–746, 2011
Kowalski, S.: It insecurity: a multi-disciplinary inquiry (1996)
Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120–124 (2013)
Schwartz, A., Knake, R.: Belfer Center for Science, and International Affairs. Government’s Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process. Harvard Kennedy School, Belfer Center for Science and International Affairs (2016)
Tripathi, A., Singh, U.K.: Taxonomic analysis of classification schemes in vulnerability databases. In: 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 686–691. IEEE (2011)
Baram, G., Cohen, D., Shapira, Z., Wechsler, O., Hight, N., Ben-Israel, I.: 2017 strategic trends in the global cyber conflict (2018)
Shane, S., Perlroth, N., Sanger, D.E.: Security breach and spilled secrets have shaken the NSA to its core. New York Times, 12 November 2017
Nurse, J.R.C., et al: Understanding insider threat: A framework for characterising attacks. In: IEEE Security and Privacy Workshops, pp. 214–228. IEEE (2014)
Chaudhry, P.E.: The looming shadow of illicit trade on the internet. Bus. Horiz. 60(1), 77–89 (2017)
Yamin, M.M., Katt, B.: Inefficiencies in cyber-security exercises life-cycle: a position paper. In: CEUR Workshop Proceedings, vol. 2269, pp. 41–43 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Yamin, M.M., Katt, B., Kianpour, M. (2019). Cyber Weapons Storage Mechanisms. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-24907-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24906-9
Online ISBN: 978-3-030-24907-6
eBook Packages: Computer ScienceComputer Science (R0)