A Critical Analytical View of Control Theory and the Geopolitical and Economic Drivers Affecting Cyber Security Warfare

A Critical Analytical View of Control Theory and the Geopolitical and Economic Drivers Affecting Cyber Security Warfare

DOI: 10.4018/979-8-3693-1630-6.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Nearly 1 billion emails were exposed in 1 single year affecting 20% or 1 and 5 internet users, causing cyber security warfare worldwide. Under the control theoretic approach, users can prescribe defense actions to security alerts that provide system alerts of cyber-attacks in progress when the network is compromised. This critical analytical view of the World Economic Forum statistical data surrounds the five major drivers affecting the geopolitical and economic conditions of the top 50 nations based on public motivation, government policy, education system, labor market, and population inclusivity. The statistical data illustrates how data breaches have become an ongoing business issue causing an average of $4.35 million annually per organization. Within the cyber security market spectrum, control theory can address some of the challenges associated with geopolitical and economic drivers affecting cyber security warfare by providing a framework for designing and implementing adaptive security systems.
Chapter Preview
Top

A Critical Analytical View Of Control Theory

The concept of control theory in cyber security has multiple facets. Control theory focuses on interconnectivity with issues facing cyber security anomalies and attacks causing challenges in performance (Zhong, 2022; Han et al., 2021; Castro, De Giovannini, Sato, Hübener & Rubio, 2023). Control theory is the process of how organizations use challenges and issues to find systematic solutions to improve system infrastructure, distribution strategies, and communication channels (Ali et al., 2023). In this study, control theory is used to formulate adaptive systems to create greater efficiency and effectiveness (Han et al., 2021; Castro et al., 2023). The control factor approach assists countries and organizations with efficiency and effectiveness as cyber attackers become more knowledgeable and creative. New innovations of security are required to mitigate attacks (Han et al., 2021; Castro et al., 2023). The concept of control theory was initially proposed as an engineering quality assurance (QA) function to resolve issues and challenges in production and manufacturing. However, the concept later used in cyber security to develop new ways of determining cluster-based attacks, cascading system failures, and overall decrease data congestion (Han et al., 2021; Castro et al., 2023). Although, the basis of control theory is a quality assurance (QA) function the concept is relevant to the cyber security warfare challenges of today.

The critical analytical view of control theory is useful to organizations as interconnectivity play a significant role in quality assurance measurements. As cyber security warfare expands, so do the culprits (Ali et al., 2023). Incorrect control signals and data interruptions provide root causes in cyber security challenges (Han et al., 2021; Castro et al., 2023). Therefore, adapting a quality assurance function to assist in the fight against cyber security attacks is appropriate to the long-standing view of future developments and innovations of security (Han et al., 2021; Castro et al., 2023; Castro et al., 2023). Moreover, failures in critical infrastructure due to software developments and internet connectivity cause organizations to become extremely volatile to cyber-attacks of all kinds (Ali et al., 2023; Han). Organizations must transition failure rates, network instability, and security interfaces in assessing high demands of loss, delay, error, or other risks (Han et al., 2021; Castro et al., 2023). Control theory is the framework for how organizations develop real-time data updates that are executable as quality control measurements, protocols, and commands (Han et al., 2021; Castro et al., 2023). Control theory functions as a probe of reliable security control structures and plans to develop corrective actions to growing failures.

Complete Chapter List

Search this Book:
Reset