Vis enkel innførsel

dc.contributor.authorWestbrook, Tegg
dc.date.accessioned2023-10-13T11:04:21Z
dc.date.available2023-10-13T11:04:21Z
dc.date.created2023-04-27T15:43:20Z
dc.date.issued2023
dc.identifier.citationWestbrook, T. (2023) ‘Trojan spoofing: A threat to critical infrastructure’, Security and Defence Quarterly, 42(2), pp. 1–15en_US
dc.identifier.issn2300-8741
dc.identifier.urihttps://hdl.handle.net/11250/3096388
dc.description.abstractThis article explores the phenomenon of location spoofing – where the spoofer is able to ‘teleport’ systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the ‘teleportation’ out of real, defined zones in the physical world. The research relied on a qualitative methodology, utilising academic research findings, media reports, hacker demonstrations, and secondary data from these sources, to situate the spoofing threat in the context of international security. This conceptual, argumentative essay finds that signal spoofing, the methods of which can be followed via online scripts, allows users the ability to overcome geographically-defined territorial restrictions. This, as this article finds, allows violent actors to weaponise systems such as unmanned ariel systems (UAS), potentially leading to the escalation of political tensions in extreme but unfortunately ever-frequent episodes. The article concludes that, while Trojan Spoofing (in particular) poses a real and an existential threat to international security, it is only a sum-of-all parts in considering other threats to critical functions in society. If geofences are to be used as a single point of security to protect assets against hostile actors, managers need to be aware of the vulnerability of intrusion and the resulting geopolitical consequences.en_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectsamfunnssikkerheten_US
dc.titleTrojan Spoofing: A Threat to Critical Infrastructureen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2023 T. Westbrooken_US
dc.subject.nsiVDP::Samfunnsvitenskap: 200en_US
dc.source.pagenumber1-15en_US
dc.source.volume42en_US
dc.source.journalSecurity and Defence Quarterlyen_US
dc.source.issue2en_US
dc.identifier.doi10.35467/sdq/164760
dc.identifier.cristin2143911
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal