scholarly journals Cyber Security, Challenges, Some Practical Solutions

Author(s):  
Y. V. Sai Bharadwaj ◽  
Sai Bhageerath Y. V ◽  
Y.V.S.S.S.V. Prasada Rao

Cybercrime continues to surge without a slowdown in sight. The cyber security threat continues to worsen. In the first half of 2018, the number of cyber breaches soared over 140% from a year earlier, leading to 33 billion compromised data records worldwide. Cyber Security news such as Marriott hack in Nov 2018 is dominating headlines and becoming a serious headache for business leaders. Malicious outsiders sparked more than half of the 944 breaches and accounted for roughly 80% of stolen, compromised or lost records. Identity theft continues to lead data breach types, but financial access incidents are escalating in severity as well. The United States continues to be the favorite target, and data breaches at major US enterprises continue to grab the headlines. In 2018, the most notable breaches have occurred at Adidas, FedEx, Jason’s Deli, Macy’s, Under Armour, Nordstrom’s and the most popular Facebook. [1].

Author(s):  
Sanjay Pulipaka ◽  
Libni Garg

The international order today is characterised by power shift and increasing multipolarity. Countries such as India and Vietnam are working to consolidate the evolving multipolarity in the Indo-Pacific. The article maps the convergences in the Indian and Vietnamese foreign policy strategies and in their approaches to the Indo-Pacific. Both countries confront similar security challenges, such as creeping territorial aggression. Further, India and Vietnam are collaborating with the United States and Japan to maintain a favourable balance of power in the Indo-Pacific. While Delhi and Hanoi agree on the need to reform the United Nations, there is still some distance to travel to find a common position on regional economic architectures. The India–Vietnam partnership demonstrates that nation-states will seek to define the structure of the international order and in this instance by increasing the intensity of multipolarity.


1990 ◽  
Vol 64 (4) ◽  
pp. 585-629 ◽  
Author(s):  
Mira Wilkins

A great deal of attention has recently been focused on the extent of Japanese direct investment in the United States. In the following historical survey, Professor Wilkins details the size and scope of these investments from the late nineteenth century, showing that Japanese involvements in America have deep historical roots. At the same time, she analyzes the ways in which late twentieth century Japanese direct investment differs from the earlier phenomenon and attempts to explain why it has aroused such concern among both business leaders and the general public.


Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


2017 ◽  
Vol 33 (3) ◽  
pp. 292-312 ◽  
Author(s):  
R. Kim Cragin

This article explores the security challenges posed by foreign fighter returnees. It argues that—contrary to popular belief—most foreign fighters do not die on battlefields or travel from conflict to conflict. They return home. This means that law enforcement, intelligence, and other security officials should expect unprecedented numbers of returnees from Syria and Iraq should a ceasefire hold. The challenge posed by returnees is threefold: Recidivism rates are uncertain, law enforcement cannot manage the numbers of prospective returnees alone, and returnees from non-Western countries also pose a threat to the United States. Findings suggest that a global architecture should be put in place to mitigate the threats from foreign fighter returnees.


2021 ◽  
Author(s):  
Joanne Wallis ◽  
Anna Powles

Abstract One of President Joseph Biden's foreign policy priorities is to ‘renew’ and ‘strengthen’ the United States' alliances, as they were perceived to have been ‘undermined’ during the Trump administration, which regularly expressed concern that allies were free-riding on the United States' military capability. Yet the broad range of threats states face in the contemporary context suggests that security assistance from allies no longer only—or even primarily—comes in the form of military capability. We consider whether there is a need to rethink understandings of how alliance relationships are managed, particularly how the goals—or strategic burdens—of alliances are understood, how allies contribute to those burdens, and how influence is exercised within alliances. We do this by analysing how the United States–Australia and Australia–New Zealand alliances operate in the Pacific islands. Our focus on the Pacific islands reflects the United States' perception that the region plays a ‘critical’ role in helping to ‘preserve a free and open Indo-Pacific region’. We conclude that these understandings need to be rethought, particularly in the Pacific islands, where meeting non-traditional security challenges such as economic, social and environmental issues, is important to advancing the United States, Australia and New Zealand's shared strategic goal of remaining the region's primary security partners and ensuring that no power hostile to their interests establishes a strategic foothold.


1999 ◽  
Vol 8 (1) ◽  
pp. 3-22
Author(s):  
Claudia Sadowski-Smith

In April 1999, the simultaneous involvement of the United States in three apparently unrelated events illustrated important shifts in geopolitical realities. A decade after the fall of the Berlin Wall, which prefigured dramatic geopolitical changes in the countries of the former “Evil Empire,” a US-dominated NATO not only bombed Yugoslavia to stop ethnic cleansing in Kosovo, but also continued its air strikes against Iraq. In the same month, NATO also approved a new Strategic Concept that identified the “uncontrolled movement of large numbers of people” as ample justification for military “crisis intervention” and thus officially recognized international migration and refugee flows as a new class of security challenges.


Sign in / Sign up

Export Citation Format

Share Document