Applied 2023 1 4 Hubbard
Applied 2023 1 4 Hubbard
Geoffrey A. Hubbard, Bavarian School of Public Policy, Technical University of Munich, Germany,
ORCID: 0000-0002-0771-292X
Keywords
cybersecurity, cyberspace, national cyber resilience, critical infrastructure, national security, smart cities
1. Introduction
The Colonial system, running 5,500 miles between Texas and New York, is the
largest U.S. gasoline pipeline and transports 2.5 million barrels per day. It is the main source of
fuel for the region, carrying nearly half of all fuel consumed on the East Coast [4]. The May 2021
attack compromised IT systems, locking down the victim’s computers and demanding payment.
A day earlier, the hackers had already stolen confidential industry data, which they threatened
to leak if the payment was not made. To contain the attack, the company halted the pipeline’s
operations along the entire network, and in response to the double extortion attempt, decided to
pay the ransom, worth 75 bitcoins. After receiving payment, the hackers granted the company
access to its systems, but the recovery process was slow. The shutdown lasted six days,
during which uncertainty and panic over fuel supply took hold across the East Coast [5, 6].
Gasoline prices spiked to a six-year high and gas stations continued running out of fuel, even
days after the shutdown [7]. In order to best deal with such incidents, a state must have
measures in place to improve its resilience. Unfortunately, the main focus in policy so far
has been on cyber security (i.e. ensuring systems are fail-safe), and not on cyber resilience
(i.e. ensuring systems are safe-to-fail). Furthermore, there remains a paucity of work in the
social sciences regarding the intersection of resilience and cyber technologies, with different
scholars asserting five years apart that this research topic remains in its infancy [8, 9].
To fulfil its purpose, the article takes the following structure: after this
introductory section and a brief note on terminology, we touch upon the theoretical
background that supports the key assumptions in conducting this work. Next, we develop
a conceptualisation of state-level cyber resilience. To this end, we conduct a conceptual
examination of resilience from three points of view, namely the general, cyber, and state
perspectives. With this knowledge we then proceed to positing a new concept of state-
level cyber resilience. In closing, we offer a final discussion of the advances made, reflect
on future research paths, and share our concluding thoughts.
This work has two main underlying assumptions, namely, (1) that developing
resilience is desirable and necessary, and (2) that the state is an important unit of study
related to resilience. Supporting the first assumption, we employ the theoretical background
of a risk society. Developed most prominently by Ulrich Beck, he defined this idea as
“a systematic way of dealing with hazards and insecurities induced and introduced by
modernisation itself” [16]. He stated that dangerous threats to humanity have become an
inherent part of industrial life, rather than a manageable by-product. These self-inflicted
risks of modernisation are known as manufactured risks. In the same way that human
actions are the key cause, humans can also (and must) do much to reduce the threat [17, 18].
Bearing this in mind helps us understand how modern developments that deeply disrupt
human life become a double-edged sword. Our stance assumes that states have a resilience
deficit regarding the manufactured risks of cyber-space, and that they need to act to
improve their capacities for cyber resilience.
For our second assumption, we refer to the evolving role of the state and
its ongoing primacy in organised human life. Over the last century, the reach of the state
has grown with the development of welfare systems around the world. As such, states
have generally taken on greater and more diverse responsibilities than they previously
had. In the field of technology, it has been observed that states are highly reliant on the
private sector for the development of cyber-capabilities, leading to the question of whether
and to what extent the power of the state has been eroded in this area. Nevertheless,
however much the power gap narrows between state and non-state actors, there are
some key aspects where state power is nevertheless unrivalled – states still exercise the
ultimate power of coercion and, unlike private actors, generally have social legitimacy,
formal authority, and regulatory capability [14].
2. Conceptual background
Resilience is a complex and multi-faceted phenomenon. As such it has been
approached from different angles with variations in its manifestations. In this section we
will explore the current understanding of the concept of resilience in different contexts,
and develop a comprehensive conceptualisation of state-level cyber resilience. To this
end, we first examine the concept of resilience in general, followed by a review of the
concepts of state resilience and cyber resilience. Finally, we probe existing contributions
in the direction of the joint concept of state-level cyber resilience, integrate the insights
from the individual terms, and provide a new conceptualisation.
What is considered a resilient state will vary between states and cultures,
but in general terms it would mean a state that is able to cope with adverse incidents in
a manner that is locally reasonable, and to adapt and recover to return to a state similar to
the one that existed previously. To this end, critical services that enable the functioning of
the state need to be maintained throughout the disruption, or at least rapidly reinstated.
In the case of developed states, with a larger extent of critical services, the demands on
the state are greater, as there are more services which must be guaranteed to operate.
Our third and final reference is the United Kingdom’s National Cyber Strategy
2022 [30]. This policy paper puts significant emphasis on cyber resilience as a state priority.
The UK is one of the states at the forefront of research and policy concerning matters of
cyber security. In 2016, the UK set up the National Cyber Security Centre (NCSC) with
the task of protecting both the government and society in cyber-space [31]. In spite of
actions such as this to improve the state’s overall cyber security standing, the policy paper
states that there is “growing evidence of gaps in our national resilience”, with the number
of incidents affecting government, businesses and individuals continuing to rise [30].
With its new strategy the government aims to work towards a vision of cyber-space “as
a reliable and resilient place for people and business to flourish” as a fundamental part of
building a “more resilient nation” [30]. This apparent level of concern and commitment is
significant coming from one of the states considered to be most ‘powerful’ in cyber-space
and highlights the ubiquitous perceived risks states face in cyber-space [32].
With this brief review, we can see how state-level cyber resilience is gaining
attention. This growing interest, though, has not yet produced significant theoretical
advancements and the concept remains incipient. Indeed, something acknowledged in all
three reference works is that further research is needed. The concept is still rudimentary
and hardly goes beyond the generic definition of resilience. Without a sound and well-
grounded definition, we run the risk of state-level cyber resilience becoming a vague
and misused concept, further clouding attempts for assessment and improvement. With
this reasoning in mind, we now proceed to proposing a new, comprehensive concept.
(a) Layers;
(b) Assets;
(c) Damage;
(d) Stages.
These variables have component indicators that allow for their assessment.
A deep exploration of these indicators is beyond the scope of this article, but we will briefly
propose a set to illustrate the concept’s operationalisation. These indicators have been
selected with the intention of being comprehensive with respect to the key elements of
each type of variable, whilst being succinct and thus making assessment straightforward.
In doing this we have heeded the recommendation that resilience metrics should be (1)
broad enough to be used in diverse cases and (2) precise enough to measure specific
system components [33]. Cyber resilience is “flexible by nature” [33] and as such, we
reason that it is an adequate approach to provide the evaluator with a degree of autonomy
within the framework.
Layers
Governments may be the directing actors within a state, but improving state
cyber resilience requires multiple actors working together. Hausken, for instance, names
eight state layers involved in cyber resilience [23]. We consider this selection inconsistent
with our unit of analysis and therefore propose our own set of four layers where resilience
is manifested, consisting of the government, as the directing and coalescing actor; private
companies, as the main organised entities performing economic activity; communities,
as the main organised entities performing non-economic activity, and the individual, as
the smallest and most numerous unit within a state.
Damage
When it comes to distinguishing between types of damage, we suggest
employing the CIA triad of cybersecurity, a common classification for the kind of damage
inflicted in cyber-space. This acronym stands for the damage that can be suffered with
regards to Confidentiality, Integrity, and Availability of data or systems. The impact of
each type of damage would have to be assessed in relation to the state of normalcy of
the state being studied, at a particular time [9, 24].
Table 1. State-level cyber resilience variables and their proposed component indicators.
Individuals Finance
Stages
As discussed earlier, when resilience is put into practice, it manifests
itself as a process before, during and after an adverse incident. A common typology of
stages is that employed by Bellini and Marrone [8], namely: prepare, withstand or absorb,
recover and adapt. Although we find this typology to be insightful, we prefer a slightly
condensed version consisting of three stages: Preparation, Response, and Recovery.
Here we consider the Response stage to include both ‘absorbing’ a shock, as well as
‘adapting’ to it for its duration.
Much of the challenge in addressing the resilience this article has tackled
stems from the fact that cyber resilience is typically understood pertaining to individual
parts of the state system, and had not yet been conceptualised at the system level,
incorporating the different constituent elements. This article explores and analyses the
most important aspects of resilience, and subsequently distils them into an integrated
and concise concept.
Table 2. Illustrative application of the concept to a scenario based on the Colonial Pipeline attack.
Assets Human capital How can the different layers of the state in question
Technology harness these assets in such a scenario? Do the layers
Organisation have the necessary skills? What is the condition of
Finance the relevant technology? Are there mechanisms in
place for effective cooperation within and across the
relevant layers? What is the financial landscape and
how would it respond to such a scenario?
Damage Confidentiality What types of damage will the state suffer? Which
Integrity of these would be most harmful? Which one is most
Availability likely and what measures are in place to deal with
such damage?
Stages Preparation Given the previous questions and answers, what is the
Response assessment of the state’s overall preparation? Based
Recovery on this, what is the perceived competence for
a response and recovery to such an incident?
4. Conclusions
This work has taken on an ambitious challenge. In an increasingly important
research field that is nevertheless in its infancy, we have proposed a comprehensive
conceptual framework of state-level cyber resilience. To accomplish this, we have relied
on an intensive cross-pollination of ideas and information provided by other scholars in
related research areas. We do not claim to have achieved a definitive concept of state-
level cyber resilience; rather, the accomplishments of this work are to aid researchers
and policymakers by providing a common terminology, fostering a systematic and
multidimensional approach to states’ capacity for resilience in cyber-space, and supplying
a springboard for academic debate and further research.
Funding
This research received no external funding.
applied cybersecurity
& internet governance References
[1] J. Ryan, A history of the Internet and the digital future. London: Reaktion Books, 2010.
[3] World Economic Forum, The Global Risks Report 2018, 2018. [Online]. Available: http://www3.weforum.
org/docs/WEF_GRR18_Report.pdf. [Accessed: May 4, 2023].
[4] C. Bing, S. Kelly. (2021). Cyber attack shuts down U.S. fuel pipeline “jugular,” Biden briefed. [Online].
Available: https://www.reuters.com/technology/colonial-pipeline-halts-all-pipeline-operations-after-
cybersecurity-attack-2021-05-08/. [Accessed: Dec. 1, 2021].
[5] U.S. Government Accountability Office. (2021, May 18). Colonial Pipeline Cyberattack Highlights Need
for Better Federal and Private-Sector Preparedness (infographic), U.S. GAO. [Online]. Available: https://www.
gao.gov/blog/colonial-pipeline-cyberattack-highlights-need-better-federal-and-private-sector-preparedness-
infographic. [Accessed: May 4, 2023].
[6] U.S. Department of Justice. (2021, June 7). Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to
the Ransomware Extortionists Darkside. [Online]. Available: https://www.justice.gov/opa/pr/department-justice-
seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside. [Accessed: May 4, 2023].
[7] C. Thorbecke. (2021). Gas hits highest price in 6 years, fuel outages persist despite Colonial Pipeline
restart. [Online]. Available: https://abcnews.go.com/US/gas-hits-highest-price-years-fuel-outagespersist/
story?id=77735010. [Accessed: May 5, 2023].
[8] E. Bellini, S. Marrone, “Towards a novel conceptualization of Cyber Resilience,” 2020 IEEE World Congress
on Services (SERVICES), pp. 189–196, 2020, doi: 10.1109/SERVICES48979.2020.00048.
[9] F. Björck, M. Henkel, J. Stirna, J. Zdravkovic, “Cyber Resilience – Fundamentals for a Definition,” in New
Contributions in Information Systems and Technologies, vol. 353, A. Rocha, A. M. Correia, S. Costanzo, and L. P.
Reis, Eds. Cham: Springer International Publishing, pp. 311–316, 2015, doi: 10.1007/978-3-319-16486-1_31.
[10] H. Tiirmaa-Klaar, “Building national cyber resilience and protecting critical information infrastructure,”
Journal of Cyber Policy, vol. 1, no. 1, pp. 94–106, 2016, doi: 10.1080/23738871.2016.1165716.
[11] D. Kuehl, “From Cyberspace to Cyberpower: Defining the Problem,” in Cyberpower and National Security,
F. D. Kramer, S. H. Starr, L. K. Wentz, Eds. 1st ed.Washington, DC: National Defense University Press, 2009,
pp. 24–42.
[12] M. Dunn Cavelty, “Cyber-Security,” in Contemporary Security Studies, A. Collins, Ed., Oxford: Oxford
University Press, 2016, pp. 400–416.
[13] J. S. Nye, The future of power, 1st ed. New York: Public Affairs, 2011.
[14] N. Choucri, “Emerging Trends in Cyberspace: Dimensions & Dilemmas,” Cyberspace: Malevolent Actors,
Criminal Opportunities and Strategic Competition, 2012, pp. 1–19. [Online]. Available: https://nchoucri.mit.
edu/sites/default/files/documents/[Choucri]%202012%20Emerging%20Trends%20in%20Cyberspace-
Dimensions%20%26%20Dilemmas.pdf. [Accessed: May 5, 2023].
[15] C. Demchak, “Cybered Conflict, Cyber Power, and Security Resilience as Strategy,” in Cyberspace and
national security: threats, opportunities, and power in a virtual world, D. S. Reveron, Ed., Washington, DC:
Georgetown University Press, 2012, pp. 121–136.
[16] U. Beck, "Risk society: towards a new modernity," in Theory, culture & society. London, Newbury Park,
New Delhi: Sage Publications, 1992.
[18] M. Shimizu, A. L. Clark, Nexus of Resilience and Public Policy in a Modern Risk Society. Singapore: Springer
Singapore, 2019. doi: 10.1007/978-981-10-7362-5.
[19] T. Prior, J. Hagmann, “Measuring resilience: methodological and political challenges of a trend security
concept,” Journal of Risk Research, vol. 17, no. 3, pp. 281–298, 2014, doi: 10.1080/13669877.2013.808686.
[20] C. Fjäder, “The nation-state, national security and resilience in the age of globalisation,” Resilience, vol. 2,
no. 2, pp. 114–129, 2014, doi: 10.1080/21693293.2014.914771.
[21] I. Linkov, A. Kott, "Fundamental Concepts of Cyber Resilience: Introduction and Overview," in Cyber
Resilience of Systems and Networks, A. Kott, I. Linkov, Eds. Cham: Springer International Publishing, 2019, pp.
1–25. doi: 10.1007/978-3-319-77492-3_1.
[23] K. Hausken, “Cyber resilience in firms, organizations and societies,” Internet of Things, vol. 11, 2020, doi:
10.1016/j.iot.2020.100204.
[24] E. G. Carayannis, E. Grigoroudis, S. S. Rehman, N. Samarakoon, “Ambidextrous Cybersecurity: The Seven Pillars (7Ps)
of Cyber Resilience,” IEEE Trans. Eng. Manage., vol. 68, no. 1, pp. 223–234, 2021, doi: 10.1109/TEM.2019.2909909.
[26] A. F. K. Organski, World politics, 2nd ed. New York: Alfred A. Knopf, 1968.
applied cybersecurity [27] J. Rowland, M. Rice, S. Shenoi, “The anatomy of a cyber power,” International Journal of Critical Infrastructure
Protection, vol. 7, no. 1, pp. 3–11, 2014, doi: 10.1016/j.ijcip.2014.01.001.
& internet governance
[28] G. Ahmadi-Assalemi, H. Al-Khateeb, G. Epiphaniou, C. Maple, “Cyber Resilience and Incident Response
in Smart Cities: A Systematic Literature Review,” Smart Cities, vol. 3, no. 3, pp. 894–927, 2020, doi: 10.3390/
smartcities3030046.
[29] A. Vespignani, “The fragility of interdependency,” Nature, vol. 464, no. 7291, pp. 984–985, 2010, doi:
10.1038/464984a.
[30] H.M. Government. (2021). National Cyber Strategy 2022. [Online]. Available: https://assets.publishing.
service.gov.uk/government/uploads/system/uploads/attachment_data/file/1040805/National_Cyber_
Strategy_-_FINAL_VERSION.pdf. [Accessed: May 5, 2023].
[31] M. Flournoy, M. Sulmeyer, “Battlefield Internet,” Foreign Affairs, vol. 97, no. 5, pp. 40–46, 2018.
[32] J. Voo, I. Hemani, S. Jones, D. Winnona, D. Cassidy, et al. (2020). National Cyber Power Index 2020.
[Online]. Available: https://www.belfercenter.org/publication/national-cyber-power-index-2020. [Accessed:
Dec. 10, 2021].
[33] I. Linkov, D. A. Eisenberg, K. Plourde, T. P. Seager, J. Allen, A. Kott, “Resilience metrics for cyber systems,”
Environ Syst Decis, vol. 33, no. 4, pp. 471–476, 2013, doi: 10.1007/s10669-013-9485-y.