scholarly journals Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats

Author(s):  
Alika Guchua ◽  
Thornike Zedelashvili

The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using modern technologies, computer systems. The facts are many and we are often in the center of events. With the development of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becoming increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and problems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare. Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security

LITERATUS ◽  
2021 ◽  
Vol 3 (2) ◽  
pp. 152-158
Author(s):  
Samuel Mangara Sianturi

Cyber ??security issues began to emerge along with advances in the field of information technology and the rapid increase in internet use. However, the greater the need for the internet in the daily activities of the world community, the more potential international security threats arise from activities within the cyber scope. Given the "borderless" nature of cybercrime, it is necessary to deal with other countries. Indonesia's participation in ADMM-Plus illustrates Indonesia's efforts to achieve national interests, namely cyber security through the external environment. This study aims to discuss Indonesia's defense diplomacy in achieving cyber security through ADMM-Plus 2014-2019. By using defense diplomacy theory and qualitative methods, this research illustrates that Indonesia's diplomacy in ADMM-Plus is still at an early stage, so it is difficult to say that the diplomacy has not been maximized. However, the presence of ADMM-Plus has a positive impact on Indonesia, especially in terms of cyber security.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2020 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Jeffrey Kurebwa ◽  
Eunice Magumise

This study investigated the effectiveness of Zimbabwe's cyber security frameworks in combating terrorism. Media reports and scholarly evidence have constantly shown that cybercrime has led to loss of life, money, security, damage to property. There is a lot of concern among citizens of African countries such as Zimbabwe, Kenya, and Nigeria that their governments are not equipped with effective cyber security systems to combat these cyber threats. It is on the basis of these concerns that this study was carried out with the hope of helping to close policy and knowledge gaps affecting the effectiveness of the cyber security frameworks of Zimbabwe. The study used qualitative methodology and a case study research design was utilised. The study was conducted in Harare the capital city of Zimbabwe. Key informant interviews and documentary search were used to collect data. Among the findings of the study were that cyber fraud and theft are some of the significant cyber security threats in Zimbabwe; that Zimbabwe lacks established legislation and other regulatory institutions for cyber-security. Among the recommendations are; that the Ministry of Justice, Legal and Parliamentary Affairs enacts cyber security laws in Zimbabwe to combat cyber terrorism.


2021 ◽  
Vol 8 (1) ◽  
pp. 8-34
Author(s):  
B. Asadov ◽  
V. Gavrilenko ◽  
S. Nemchenko

The article is devoted to the examination of the formation of new vectors for international relations development within the global format of cooperation. The establishment and unification of BRICS in the international legal sphere through a wide range of common interests and views of its members towards issues facing the modern world reflect objective tendencies of world development to the formation of amultipolar international relations system and determination of particular large country actors of broad integration and having many dimensions. The authors reveal particular characteristics of the international-legal status of BRICS, which make it possible to have an effective impact on challenges facing the modern world. The legal BRICS status differs crucially from traditional legal approaches to international organizations. Acting as a special subject of world politics, creating more trusted interaction conditions, BRICS focuses its attention on the alternative world order principles within the new model of global relations. Such a format of multilateral cooperation, as well as more trusted and additional mechanisms of international interaction, gives the members an opportunity to demonstrate their geopolitical and geoeconomic world significance, and in addition their demanded humanitarian role, which, as the analysis of the mentioned actor demonstrates, is aimed at forming its own interaction model. The logic of the BRICS agenda extension to the level of an important global management system element demonstrates the goal in the field of action and, accordingly, intensive progress of humanitarian imperatives. For these humanitarian imperatives, the issues of international peacekeeping, security, protection, encouraging human rights and providing stable development are an objective necessity, especially for active demonstration of the members’ viewpoints on the international scene. For understanding the process of the alignment of international security humanitarian imperatives it is necessary to study the existing objective needs in conjunction with each country, member of BRICS.


Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


2018 ◽  
pp. 1553-1584
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


With the increasing literacy rate, the crowd over internet is increasing dramatically and so as the internet threats. Now these days, even kids below 10 are aware of what a virus is and how easily a virus can be created. This is a major problem for the data and stock companies who keep their entire data online or at any server which is traceable. This paper deals with some of the most malicious attacks of cyber world and they takes a little effort to be applied from the attacker side but a lot of effort to even detect it. This paper also focuses on some of the modern world prevention architectures like usage of Artificial Intelligence (Neural Networks) and Swarm Intelligence (Artificial Bee Colony [ABC]). This paper has evaluated the effectiveness of the prevention algorithm through Quality of Service parameters


In the era of social media and the Internet, there has been an exponential increase in threats related to the privacy of user accounts and data. The confidentiality of personal data is compromised for various motives. This sudden increase in security threats has led to widespread problems. Our research is focused on analyzing the extent of cyber-attacks in various countries across the globe. We have proposed a novel approach for analyzing the tweets related to cyber-attacks and its surrounding fields. The analysis proves that Asian countries face more cyber security issues as compared to European countries. Further, it is also analyzed that developing countries like India are more prone to these issues as compare to developed countries like the United States or the United Kingdom.


Author(s):  
Anatoliy Tarasyuk ◽  

The general factors of actualization of cybersecurity problems at the global level are considered. It is concluded that a distinctive feature of the modern approach to cybersecurity is its comprehensive and fundamental nature, which includes a whole system of regulations, plans and institutions. The main approaches and tendencies related to the development of a unified strategy in the field of cyber security at the supranational level of the EU are revealed. It is established that the main problem of effective cybersecurity is the creation of a single European political security space. Significant activity in this area of EU governing bodies is faced with the inability of a number of countries to fully comply with all directives, orders, regulations and other regulations. Due to complex coordination procedures at the national and supranational levels, which require considerable time, as well as due to the lack of a single political space in the EU, EU states and supranational structures do not always have time to respond to new cyber threats. The article identifies the main strategic goals of national information policy are: 1) ensuring cybersecurity and conditions for improving the efficiency of public administration; 2) creation of favorable conditions for ensuring constitutional human rights and freedoms in the information sphere, strengthening and preservation of moral values of society, traditions of humanism and patriotism, increase of scientific and cultural potential and formation of information culture of the population; 3) transformation of regional information resources into a strategic resource of stable and progressive development and creation of conditions for harmonious integration into the modern world economy on the basis of information openness and cooperation - entry into the international system of division of labor and exchanges in the information sphere.


2021 ◽  
pp. 1-25
Author(s):  
Guangjun Li ◽  
Preetpal Sharma ◽  
Lei Pan ◽  
Sutharshan Rajasegarar ◽  
Chandan Karmakar ◽  
...  

With the development of information technology, thousands of devices are connected to the Internet, various types of data are accessed and transmitted through the network, which pose huge security threats while bringing convenience to people. In order to deal with security issues, many effective solutions have been given based on traditional machine learning. However, due to the characteristics of big data in cyber security, there exists a bottleneck for methods of traditional machine learning in improving security. Owning to the advantages of processing big data and high-dimensional data, new solutions for cyber security are provided based on deep learning. In this paper, the applications of deep learning are classified, analyzed and summarized in the field of cyber security, and the applications are compared between deep learning and traditional machine learning in the security field. The challenges and problems faced by deep learning in cyber security are analyzed and presented. The findings illustrate that deep learning has a better effect on some aspects of cyber security and should be considered as the first option.


Sign in / Sign up

Export Citation Format

Share Document