Socio-Technical Root Cause Analysis of Cyber-enabled Theft of the U.S. Intellectual Property – The Case of APT41

03/08/2021
by   Mazaher Kianpour, et al.
0

Increased connectivity has made us all more vulnerable. Cyberspace, besides all its benefits, spawned more devices to hack and more opportunities to commit cybercrime. Criminals have found it lucrative to target both individuals and businesses, by holding or stealing their assets via different types of cyber attacks. The cyber-enabled theft of Intellectual Property (IP), as one of the most important and critical intangible assets of nations, organizations and individuals, by foreign countries has been a devastating challenge of the United States (U.S.) in the past decades. In this study, we conduct a socio-technical root cause analysis to investigate one of the recent cases of IP theft by employing a holistic approach. It concludes with a list of root causes and some corrective actions to stop the impact and prevent the recurrence of the problem in the future. Building upon the findings of this study, the U.S. requires a detailed revision of IP strategies bringing the whole socio-technical regulatory system into focus and strengthen IP rights protection considering China's indigenous innovation policies. It is critical that businesses and other organizations take steps to reduce their exposure to cyber attacks. It is particularly important to train employees on how to spot potential threats, and to institute policies that encourage workers to report potential security failures so that action can be taken quickly. Finally, we discuss how cyber ranges can provide an efficient and safe platform for dealing with such challenges. The results of this study can be expanded to other countries in order to protect their IP rights and deter or prevent and respond to future incidents.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/12/2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

As Critical National Infrastructures are becoming more vulnerable to cyb...
research
11/27/2020

DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations

The training and creation of deep learning model is usually costly, thus...
research
11/03/2020

Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands

On a regular basis, we read in the news about cyber-attacks on critical ...
research
11/13/2017

United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping

Prior works, such as the Tallinn manual on the international law applica...
research
03/05/2023

Prompt-Based Learning for Thread Structure Prediction in Cybersecurity Forums

With recent trends indicating cyber crimes increasing in both frequency ...
research
10/09/2021

Emergent Insight of the Cyber Security Management for Saudi Arabian Universities: A Content Analysis

While cyber security has become a prominent concept of emerging informat...
research
07/29/2018

The Second Amendment and Cyber Weapons - The Constitutional Relevance of Digital Gun Rights

In the future, the United States government can seek to limit the owners...

Please sign up or login with your details

Forgot password? Click here to reset