Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under s...Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.展开更多
With the emergence of digital transformation success stories,more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth.The traditional communication mar...With the emergence of digital transformation success stories,more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth.The traditional communication market tends to be saturated,and the digital transformation of telecom operators is imminent.This article combining the development trend of telecom operators’product business and the application situation of the pilot summarizes the innovative application categories that telecom operators continue to launch based on their own advantages and in response to the needs of the industry.This article focuses on the transformation of security capabilities in communication services,big data,Internet of Things,artificial intelligence,unified authentication and network information security,and deeply analyzes the business characteristics and application modes from the aspects of resource integration,open platform construction,new connection construction,and innovative business development.This article puts forward suggestions for the security development of telecom operators,and provides basic research content for the subsequent research on the innovative application of telecom operators’capability openness.展开更多
文摘Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.
文摘With the emergence of digital transformation success stories,more and more enterprises are launching digital solutions to improve business efficiency or achieve optimal revenue growth.The traditional communication market tends to be saturated,and the digital transformation of telecom operators is imminent.This article combining the development trend of telecom operators’product business and the application situation of the pilot summarizes the innovative application categories that telecom operators continue to launch based on their own advantages and in response to the needs of the industry.This article focuses on the transformation of security capabilities in communication services,big data,Internet of Things,artificial intelligence,unified authentication and network information security,and deeply analyzes the business characteristics and application modes from the aspects of resource integration,open platform construction,new connection construction,and innovative business development.This article puts forward suggestions for the security development of telecom operators,and provides basic research content for the subsequent research on the innovative application of telecom operators’capability openness.