Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
Abstract
:1. Introduction
1.1. Contributions and Limitations of This Work
1.2. Outline of This Paper
2. Background and Related Works
2.1. Contemporary Food Supply Context
“In this context resilience, which is defined as the resistance of a system to external effects, is required. A field that is indeed part of the critical infrastructure, but which has not been considered as intensively as the energy sector, is food production.”
2.1.1. Impact of Technology in Agribusiness and Strategic Supply Chains
2.1.2. Brazilian Beef Production Chain
2.2. Threat Intelligence
“Must be actionable to meet the needs of current defensive systems that have to deal with and respond to cyber attacks.”
“Policy releases by nations or groups of interest, news stories in domestic and foreign press, and news stories in subject-specific press, such as financial papers, or articles published in journals by high-ranking persons in the nation or group of interest, as all of those can be indicators of intent or capability.”
2.2.1. Cyber Threat Intelligence
“CTI represents actionable threat information that is relevant to a specific organization”.
2.3. Countries with Cyber Attack Capabilities and Their Targets
“To fully realise the potential of technology, states must align their national economic visions with their national security priorities.”
- China
- Iran
- United Kingdom
- Japan
- Switzerland
- The Netherlands
- Sweden
- Australia
- USA
- Russia
2.4. Recent Cases of Vulnerabilities Exploitation
2.4.1. JBS Attack
2.4.2. John Deere and Case New Holland
2.4.3. USAHERDS
3. Proposed Methods and Criteria Evaluation
3.1. Step 1
3.2. Step 2
3.3. Step 3
3.4. Step 4
3.5. Step 5
- Countries that produces the most, result of Step 1 (named ‘Producers’ in Table 1);
- Countries that exports the most, result of Step 2 (named ‘Exporters’ in Table 2);
- Countries that compete directly against Brazilian product because they share clients, result of Step 4 (named ‘Competitors’ in Table 3);
- Countries that imports more from Brazilian product, first result of Step 3 (named ‘Importers’ in Table 4);
- Countries that consume more beef in the world, second result of Step 3 (named ‘Consumers’ in Table 5).
3.6. Step 6
4. Results and Evaluations
4.1. Identification of the Largest Beef Producers and Their Export Rates
4.2. Identification of Direct Competitors to Brazilian Beef in the International Market
4.3. Identification of the Largest Consumers
4.4. Identification of Exporters That Sell to the Same Countries That Brazilian Beef Producers Do
4.5. Establishing Criteria in Accordance to Relevant Categories
4.6. Meshing Categories Results with the NCPI Index
4.7. Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
5. Discussion
“organizations looking to have technical threat intelligence are now overwhelmed with a massive amount of threat data, leaving them with the huge challenge of identifying what is actually relevant. Thus, a problem of quantity over quality has been developed.”
“Especially when considered in the context of a political map, detailing the physical and sovereign boundaries between nation states. Without physical delineations to define jurisdictions, the established law, authorities, regulations, processes, structure, and concepts applied to the cyber domain are still in flux for both the public and private sectors.”
Context after Recent Cases
- Hire an Experienced Cyber team;
- Keep Security Software updated;
- Use Multi Step authentication;
- Teach Cyber Vigilance to employees.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
KRITIS | Betreiber Kritischer Infrastrukturen |
DP | Gross Domestic Product |
OECD | Organisation for Economic Co-operation and Development |
CTI | Cyber Threat intelligence |
CI | Critical Infrastructure |
CICARNE | Centro de Inteligência da Carne bovina |
DOJ | The Justice Department |
USA | United States of America |
GSI/PR | Institutional Security Office of the Presidency of the Republic |
CISA | Cyber security and Infrastructure Security |
Embrapa | Empresa Brasileira de Pesquisa Agropecuária |
ENISA | The European Union Agency for Cybersecutirty |
EU | European Union |
ISO | International Organization for Standardization ISO |
ITC | International Trade Centre |
ITU | International Telecommunication Union |
IT | Information Technology |
NCPI | National Cyber Power Index |
NEI | National Economic Intelligence |
OSINT | open source intelligence |
Saas | Software-as-a-Service |
TISN | Trusted Information Sharing Network |
UK | United Kingdom |
USA | United States of America |
USAHerds | Animal Health Emergency Reporting Diagnostic System |
References
- CICB (Centro de Inteligencia da Carne Bovina). Qualidade da Carne Bovina. Evaluation, Embrapa. 2022. Available online: https://www.embrapa.br/qualidade-da-carne/carne-bovina (accessed on 8 February 2022).
- Beef Report–Perfil da Pecuária no Brasil 2021. Available online: http://abiec.com.br/publicacoes/beef-report-2021/ (accessed on 8 February 2022).
- OECD/FAO. OECD-FAO Agricultural Outlook 2020–2029. Available online: https://www.oecd-ilibrary.org/agriculture-and-food/oecd-fao-agricultural-outlook-2020-2029_1112c23b-en (accessed on 10 February 2022).
- Tounsi, W. What is Cyber Threat Intelligence and How Is It Evolving? In Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT; Wiley Online Library; 2019; pp. 1–49. Available online: https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119618393.ch1 (accessed on 1 July 2022).
- Goedde, L.; Katz, J.; Ménard, A.; Revellat, J. Agriculture’s Connected Future: How Technology Can Yield New Growth; McKinsey & Company: Hong Kong, 2020; Available online: https://www.mckinsey.com/~/media/McKinsey/Industries/Agriculture/Our%20Insights/Agricultures%20connected%20future%20How%20technology%20can%20yield%20new%20growth/Agricultures-connected-future-How-technology-can-yield-new-growth-F.pdf (accessed on 24 July 2022).
- Baggett, R.K.; Simpkins, B.K. Homeland Security and Critical Infrastructure Protection; ABC-CLIO, LLC: Santa Barbara, CA, USA; Denver, CO, USA, 2018. [Google Scholar]
- Ossevorth, F.; Seidel, P.; Krahmer, S.; Seifert, J.; Schegner, P.; Lochmann, P.; Oehm, L.; Mauermann, M. Resilience in supply systems—What the food industry can learn from energy sector. J. Saf. Sci. Resil. 2022, 3, 39–47. [Google Scholar] [CrossRef]
- USA. HSPD 7; Homeland Security Presidential Directive 7. Available online: https://www.hsdl.org/?view&did=441950 (accessed on 2 February 2022).
- Brasil. Decreto nº 10.569, from 9 December 2020. Available online: https://www.in.gov.br/en/web/dou/-/decreto-n-10.569-de-9-de-dezembro-de-2020-293251357 (accessed on 2 February 2022).
- Brasil. Decreto Nº 6.703, from 18 December 2008. Available online: http://www.planalto.gov.br/ccivil_03/_ato2007-2010/2008/Decreto/D6703.htm (accessed on 2 February 2022).
- OECD. OECD-Reviews of Risk Mangement Policies Good Governance for Critical Infrastructure Resilience. Available online: https://www.oecd-ilibrary.org/sites/b1dac86e-en/index.html?itemId=/content/component/b1dac86e-en (accessed on 22 March 2022).
- Canada. National Strategy for Critical Infrastructure. 2009. Available online: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/srtg-crtcl-nfrstrctr-eng.pdf (accessed on 2 February 2022).
- Japan. The Cybersecurity Policy for Critical Infrastructure Protection. Available online: https://www.nisc.go.jp/eng/pdf/cs_policy_cip_eng_v4.pdf (accessed on 25 February 2022).
- CICB (Centro de Inteligencia da Carne Bovina). Cadeia Produtiva da Carne Bovina. Evaluation, Embrapa. 2021. Available online: https://www.cicarne.com.br/2020/06/03/cadeia-produtiva-da-carne-bovina (accessed on 10 March 2022).
- Rojo-Gimeno, C.; van der Voort, M.; Niemi, J.K.; Lauwers, L.; Kristensen, A.R.; Wauters, E. Assessment of the value of information of precision livestock farming: A conceptual framework. Njas-Wagening. J. Life Sci. 2019, 90, 100311. Available online: https://www.sciencedirect.com/science/article/pii/S1573521418302215 (accessed on 20 July 2022). [CrossRef]
- Malafaia, G.C.; de Vargas Mores, G.; Casagranda, Y.G.; Barcellos, J.O.J.; Costa, F.P. The Brazilian beef cattle supply chain in the next decades. Livest. Sci. 2021, 253, 104704. [Google Scholar] [CrossRef]
- Evans, C.V. Future warfare: Weaponizing critical infrastructure. US Army War Coll. Q. Parameters 2020, 50, 6. [Google Scholar] [CrossRef]
- Chismon, D.; Ruks, M. Threat Intelligence: Collecting, Analysing, Evaluating; MWR InfoSecurity Ltd.: Basingstoke, UK, 2015. [Google Scholar]
- Ramsdale, A.; Shiaeles, S.; Kolokotronis, N. A comparative analysis of cyber-threat intelligence sources, formats and languages. Electronics 2020, 9, 824. [Google Scholar] [CrossRef]
- Hu, Z.; Khokhlachova, Y.; Sydorenko, V.; Opirskyy, I. Method for optimization of information security systems behavior under conditions of influences. Int. J. Intell. Syst. Appl. 2017, 9, 46. [Google Scholar] [CrossRef]
- López, A.B. ISO 27002 y Ciberseguridad en la Empresa: Del Control a la Formación del Usuario. 2022. Available online: https://www.seguritecnia.es/tecnologias-y-servicios/ciberseguridad/iso-27002-y-ciberseguridad-en-la-empresa_20220329.html (accessed on 20 June 2022).
- Cybok. The Cyber Security Body of Knowledge—CyBOK. Evaluation, University of Bristol, Formal Methods for Security. 2021. Available online: https://www.cybok.org/knowledgebase/ (accessed on 10 March 2022).
- Borges Amaro, L.J.; Percilio Azevedo, B.W.; Lopes de Mendonca, F.L.; Giozza, W.F.; Albuquerque, R.d.O.; García Villalba, L.J. Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data. Appl. Sci. 2022, 12, 1205. Available online: https://www.mdpi.com/2076-3417/12/3/1205 (accessed on 25 February 2022).
- Shin, B.; Lowry, P.B. A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished. Comput. Secur. 2020, 92, 101761. [Google Scholar] [CrossRef]
- EU. Threat Landscape Report 2021. 2021. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 (accessed on 2 February 2022).
- Al-Ghamdi, M.I. Guide to developing a National Cyber Security Strategy. Mater. Today Proc. 2021. [Google Scholar] [CrossRef]
- Voo, J.; Hemani, I.; Jones, S.; DeSombre, W.; Cassidy, D.; Schwarzenbach, A. National Cyber Power Index 2020; Belfer Center for Science and International Affairs: Cambridge, MA, USA, 2020. [Google Scholar]
- ITC. Trademap. Evaluation, ITC. 2022. Available online: https://www.trademap.org/ (accessed on 10 December 2021).
- de Souza, D.N. Inteligência econômica de estado: Necessidade estratégica para o Brasil. Rev. Bras. Inteligência 2018, 13, 129–148. [Google Scholar]
- Fields, K.H.; Therrien, D.A.; Halstrom, D.; Haggard, J.; Clayton, P. International bBef Trade: A Value Proposition. Anim. Front. 2018, 8, 16–22. [Google Scholar] [CrossRef] [PubMed]
- Gamero-Garrido, A. Cyber Conflicts in International Relations: Framework and Case Studies; Cyber International Relations Seminar; University of California: San Diego, CA, USA, 2014; Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2427993 (accessed on 10 April 2022).
- Cardon, E. Fighting Alone Is Called Losing: The Unlearned Lessons of Fragmented Systems. The Cyber Defense Review. Vol. 7, No. 1, SPECIAL EDITION: Unlearned Lessons from the First Cybered Conflict Decade, 2010–2020 (WINTER 2022); Army Cyber Institute. pp. 75–82. Available online: https://www.jstor.org/stable/48642039 (accessed on 15 April 2022).
- EUA. Use of Administrative Subpoenas for Cybersecurity Vulnerability Identification and Notification. 2021. Available online: https://www.dhs.gov/sites/default/files/publications/privacy-pia-cisa38-adminsubpoenasforcybersecurityvulnerabilityid-may2021.pdf (accessed on 15 June 2022).
- Forbes Staff. 2021. Available online: https://www.forbes.com/sites/carlieporterfield/2021/06/03/department-of-justice-creates-new-task-force-to-take-on-ransomware-attacks/?sh=218288524b80 (accessed on 2 February 2022).
- OEA (Organização dos Estados Americanos). Revisão Da Capacidade de Cibersegurança. Evaluation, Centro Global de Capacidade de Segurança Cibernética. 2020. Available online: https://www.oas.org/pt/ssm/cicte/docs/PORT-Revisao-da-Capacidade-de-Ciberseguranca.pdf (accessed on 20 February 2022).
- Diniz, G.; Muggah, R.; Glenny, M. Deconstructing Cybersecurity in Brazil: Threats and Responses. Strategic Paper 11, Igarapé Institute. 2015. Available online: https://igarape.org.br/wp-content/uploads/en/2014/11/Strategic-Paper-11-Cyber2.pdf (accessed on 10 April 2022).
- Ravich, S.F.; Fixler, A. Framework and Terminology for Understanding Cyber-Enabled Economic Warfare; Foundation for Defense of Democracies, Center on Sanctions and Illicit Finance Resource Document: Washington, DC, USA, 2017. [Google Scholar]
- da Silva, J.C.B.L. Guerra cibernética: A guerra no quinto domínio, conceituação e princípios. Nav. War Coll. J. 2016, 20, 193–211. [Google Scholar]
- Rajão, R.; Nobre, A.D.; Cunha, E.L.; Duarte, T.R.; Marcolino, C.; Soares-Filho, B.; Sparovek, G.; Rodrigues, R.R.; Valera, C.; Bustamante, M.; et al. The risk of fake controversies for Brazilian environmental policies. Biol. Conserv. 2022, 266, 109447. [Google Scholar] [CrossRef]
Country | Beef Production (milTEC *) | Export/Production % (mil TEC) |
---|---|---|
USA | 12,347.7 | 9.94 |
Brazil | 10,187 | 26.42 |
European Union (EU) | 7665.7 | 44.73 |
Argentina | 3178.5 | 27.06 |
India | 2474.9 | 31.2 |
Australia | 2078 | 66.79 |
Canada | 1304.7 | 36.15 |
New Zealand | 703 | 84.41 |
Ireland | 649 | 86.97 |
Poland | 605.1 | 100.15 |
Uruguay | 514.5 | 74.19 |
The Netherlands | 396.3 | 162.41 |
Country | Imports (milTEC) | Importers of Brazilian Beef in Percentage |
---|---|---|
EU | 5886.7 | 6.24 |
China | 2223.4 | 50.8 |
USA | 1459.3 | 41.67 |
Hong Kong | 619.6 | 60.81 |
The Netherlands | 472.2 | 32.9 |
Italy | 424.4 | 9 |
Egypt | 403.9 | 41.67 |
Russia | 344.8 | 21.69 |
Chile | 283.1 | 41.69 |
Uruguay | 46.7 | 74.96 |
Country | Beef Export Competitors (Source ITC) |
---|---|
EUA | Australia, New Zealand, Nicaragua, Uruguay, Mexico, Canada, Japan |
China | Australia, New Zealand, USA, Argentina, Uruguay, Brazil |
EU | Brazil, Australia, USA, India, New Zealand, Local producers |
Chile | Brazil, Paraguay, USA, Argentina, Uruguay, China |
Egypt | Brazil, India, Paraguay, Colombia, Australia, New Zealand |
Russia | Brazil, India, Paraguay, Belarus, Argentina, India, Colombia |
Countries | Producers Step 1 | Exporters Step 2 | Importers Step 3.1 | Consumers Step 3.2 | Competitors Step 4 | Mentions Step 5 |
---|---|---|---|---|---|---|
Argentina | X | X | N/A | X | X | 4 |
Australia | X | X | N/A | X | X | 4 |
Canada | X | N/A | N/A | X | X | 3 |
Chile | N/A | N/A | X | X | N/A | 2 |
China | N/A | N/A | X | X | X | 3 |
Egypt | N/A | N/A | X | X | N/A | 2 |
EU | X | X | X | X | N/A | 4 |
India | X | N/A | N/A | X | X | 3 |
Ireland | X | X | N/A | N/A | N/A | 2 |
Japan | N/A | N/A | N/A | X | X | 2 |
Mexico | N/A | X | N/A | X | X | 3 |
The Netherlands | X | X | X | N/A | N/A | 3 |
New Zealand | X | X | N/A | X | X | 4 |
Poland | X | X | N/A | N/A | N/A | 2 |
Russia | N/A | N/A | X | X | N/A | 2 |
Uruguay | X | N/A | X | X | X | 4 |
USA | X | X | X | X | X | 5 |
Brazilian Conceivable Contenders in the Beef World Export | Number of Categories Mentions | State Ranked on the NCPI |
---|---|---|
USA | 5 | 9th |
Australia | 5 | 8th |
EU | 5 | N/A |
New Zealand | 4 | N/A |
Uruguay | 4 | N/A |
Argentina | 4 | N/A |
Mexico | 3 | N/A |
Canada | 3 | N/A |
India | 3 | N/A |
China | 3 | 2nd |
The Netherlands | 3 | 6th |
Ireland | 2 | N/A |
Russia | 2 | 10th |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Trinks, V.d.M.D.; Albuquerque, R.d.O.; Nunes, R.R.; Mota, G.A. Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector. Information 2022, 13, 431. https://doi.org/10.3390/info13090431
Trinks VdMD, Albuquerque RdO, Nunes RR, Mota GA. Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector. Information. 2022; 13(9):431. https://doi.org/10.3390/info13090431
Chicago/Turabian StyleTrinks, Virgínia de Melo Dantas, Robson de Oliveira Albuquerque, Rafael Rabelo Nunes, and Gibran Ayupe Mota. 2022. "Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector" Information 13, no. 9: 431. https://doi.org/10.3390/info13090431
APA StyleTrinks, V. d. M. D., Albuquerque, R. d. O., Nunes, R. R., & Mota, G. A. (2022). Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector. Information, 13(9), 431. https://doi.org/10.3390/info13090431