scholarly journals A COMPREHENSIVE CYBERSECURITY FRAMEWORK FOR AFGHANISTAN’S CYBERSPACE

Author(s):  
Ahmad Nabi Ahmadi

Need for cyber security framework to protect the evolving ICT Infrastructure and Cyberspace in the modern information society does not need any emphasis. Given the importance of cyber space for country development, many countries have invested large amount of money for cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical information infrastructure, to this end, the country may face various challenges including cyber security. Due to various potential threats and risks to Afghanistan cyber security, a comprehensive cyber security infrastructure and strategy is necessary. Accordingly, Afghanistan has introduced an ICT security law. However, nowadays internet is involving great portion of government and nongovernment sections. The country must introduce a comprehensive and appropriate cybersecurity framework and strategy to tackle all of the issues and risks related to this arena. With the introduction of different ICT based technologies in the country, Afghanistan is moving towards embracing electronic culture in its day-to-day dealings. As these technologies are becoming popular and being widely used, it is important to put in place technological infrastructure and legal frameworks, which will safeguard the private and enterprise data flowing through these ICT based infrastructures. The aim of this paper is to propose a comprehensive cybersecurity framework for Afghanistan’s cyberspace in order to protect and assure data, information and IT infrastructure security in cyberspace, enhance capacities to prevent and response to cyber threats, protect the nation from the risk and vulnerability, damage from modern cyber threats and incidents through a variety of standardized institutional structures, policies and procedures, and eventually establish and achieve a Safe – Secure and Resilient cyber space for the government, businesses and citizens of Afghanistan.

2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


2014 ◽  
pp. 471-514
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


2021 ◽  
Vol 21 (2) ◽  
pp. 171-184
Author(s):  
Muawwan Muawwan

Abstract   The escalation of cyber threats in Singapore has prompted the country to intensify its cyberspace security protection. Singapore then implemented numerous strategies by collaborating across agencies and actors to obtain a protective cyberspace security system. This research aimed at figuring out Singapore Cyber Security Strategy (SCSS) documents comprehensively throughout textual analysis based on qualitative approach of an emerging-dominant elements in documents such as actor, instrument, politic, economy, research, and collaboration which were cooperated within actors. The author also fulfilled this analysis using qualitative approach to measure the data relation and the big picture of SCSS documents. Finally, the author found that Singapore’s strategy in applications and infrasctructure aspects, the government intervened them intensively. Singapore, one of the highest technological expertise countries in Southeast Asia, was fuflnerable getting the threats or attacks. So, this country was regulating an excellent cyber system and infrastructure to proctect their cyber management system secure. Meanwhile, Singapore’s policy in core aspects was a transfer due to the fact that Singapore was multi-ethnical and multi-culturalism country. Thus, Singapore’s strategy for ideological aspects was not regulated significantly in SCSS documents.   Keywords: Cyber Security Strategy, Data Relation, Sovereignty   Abstrak   Eskalasi ancaman terhadap ruang siber yang terjadi di Singapura telah mendorong negara tersebut untuk meningkatkan proteksi keamanan ruang sibernya. Singapura kemudian menerapkan berbagai strategi dengan cara menjalin kerjasama lintas instansi dan aktor untuk memperoleh sistem keamanan ruang siber yang lebih protektif. Tulisan ini bermaksud untuk memahami dokumen Singapore Cyber Security Strategy (SCSS) secara komprehensif dengan melakukan analisis kontekstual berdasarkan pendekatan kualitatif terhadap sejumlah unsur yang dominan muncul di dalam dokumen seperti aktor, instrument, politik, ekonomi, penelitian, dan kolaborasi yang dibangun di antara para aktor. Penulis juga melengkapi analisis ini dengan pendekatan kuantitatif untuk mengukur relasi data dan kecenderungan yang tergambar dari dokumen SCSS tersebut. Hasilnya, penulis menemukan bahwa pada level strategi di sektor application dan infrastruktur, pemerintah Singapura memiliki intervensi penuh dalam mengatur seluruh aktivitas di kedua aspek tersebut. Sebagai salah satu negara yang cukup signifikan di dalam pengelolaan teknologinya di kawasan Asia Tenggara, maka Singapura secara eksklusif berupaya membangun sistem dan infrastruktur siber yang mumpuni untuk melindungi tata kelola ruang siber mereka dari berbagai ancaman. Berbeda pada aspek core yang bersifat lebih terbuka (transfer) lantaran banyak dipengaruhi oleh multietnis dan multikulturalisme. Sehingga proteksi terhadap hal-hal yang bersifat ideologis tidak banyak diatur di dalam dokumen SCSS.   Kata kunci: Kedaulatan, Relasi Data, Strategi Keamanan Siber


2021 ◽  
Vol 21 (1) ◽  
pp. 69-84
Author(s):  
Putri Bilqis Oktaviani ◽  
Anggraeni Silvia

This research discusses the analysis of security strategy policies made by the Malaysian government in the protection and development of Malaysian cyberspace. This research will explain in detail the strategy of developing challenges as well as the aspects that support the Malaysian cyber space to be saved by the Malaysian cyber space. This research will further discuss the Malaysian security strategy through the official document of the Malaysian security strategy which will later be analyzed through the MAXQDA and GEPHI applications in order to classify the various categories that support it. This research will use the security concept published by Hao Yeli in Three - Perspective Theory of Cyber ​​Sovereignty to classify ideas and data. This research finds that the security of the Malaysian system needs to be developed from both capacity and capability so that the government needs to work together with various related parties   Keywords: Cyber Security, Cybersecurity Challenges, Soveignty   Abstrak   Penelitian ini membahas tentang analisis kebijakan strategi keamanan siber yang dibuat oleh pemerintah Malaysia dalam perlindungan dan pengembangan keamanan ruang siber Malaysia. Penelitian ini akan menjelaskan secara details strategi, tantangan serta aspek – aspek yang mendukung pengembangan ruang siber Malaysia guna mengamankan ruang siber Malaysia. Penelitian ini akan membahas lebih jauh strategi keamanan Malaysia melalui dokumen resmi strategi keamanan siber Malaysia yang nantinya akan di bedah melalui aplikasi MAXQDA dan GEPHI guna mengklasifikasikan berbagai kategori yang mendukung. Penelitian ini akan menggunakan konsep keamanan yang dipublikasikan oleh Hao Yeli dalam A Three – Perspective Theory of Cyber Sovereignty guna mengkasifikasikan gagasan dan data dengan menggunakan metode penelitian kuantitatif. Penelitian ini menemukan bahwa keamanan siber Malaysia perlu dikembangkan baik dari kapasitas maupun kapabilitas sehingga pemerintah Malasyaia perlu bekerjasama dengan berbagai pihak yang terkait.   Kata kunci: Cyber Security, Tantangan Keamanan Cyber, Kedaulatan


2020 ◽  
Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.


2020 ◽  
Author(s):  
Nasser AlAzwani ◽  
Tom Chen

Cyber deterrence by denial strategy can be practised by the state by making it hard for adversaries to succeed any attempt of attacking. It was practised during nuclear deterrence strategies as well as in many other conventional deterrence. This paper argues the functionality of cyber deterrence by denial in deterring cyber threats. In this paper, our attempt is to define cyber deterrence by denial, model it, explore operational roles of cyber security technologies in approaching deterrence by denial within cyber space. Model analysis shed lights over practicing deterrence by denial and its vital role in understanding how efficiently denial can work in maximize failure of any attack which will impact in maximizing cost of cyber attacks to the attacker. Due to limitations in cyber security technologies, unknown cyber threat might not be deterred with assumed approach. Proposed model confirmed that deterrence by denial strategy might works in deterring known cyber threats within instrumental model. As for the benefit of enhancing deterrence in cyber space there is a serious need to reduce the tendency to ignore exploring this strategy.


Author(s):  
Pavlo Katerynchuk

Cyber security and cyber space of Ukraine remained for a long time out of the attention of domestic researchers and, therefore, civil servants. For more than 20 years, the young Ukrainian state did not waste its efforts on the formation of not only effective and reliable troops, but also information security. The government did not endeavored to strengthen the country’s defense, and only weakened its lack of progress in fighting corruption and the dominance of Russian media and intelligence. As a result, in the spring of 2014, after a long confrontation between the regime of Viktor Yanukovych and the citizens of Ukraine, Russia failed to conduct special operations with the aim of annexing the Crimea and facilitate the war in Donbas. Not the least role in this played a raid for information and factors cyber Russian hackers for the purpose of paralyzing government agencies and influence on public opinion in Ukraine through Russian-controlled media. As a result of prolonged and massive cyber attacks, Ukrainian state structures, the banking system, industrial facilities and private business suffered significant material and reputational losses. At the same time in Ukraine began to realize the seriousness of cyber security as a component of national security and contribute to creating cyber police, national cyber security strategy, acceptance of a number of regulations on cyber security, strengthening public defense for the protection of domestic cyber space. At the moment, Ukraine is on the way to rethinking the role of cyber security and the formation of a national system of protection against cyber threats.


2012 ◽  
pp. 308-351
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President’s constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President’s powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


2020 ◽  
Vol 7 (1) ◽  
pp. 1-11
Author(s):  
Arjun Karki ◽  
Sudhamshu Dahal

The study explores the existing technological infrastructure in the proposed 'smart cities' in Nepal. It follows the proponents of structural existence and interactivity patterns according to the Structuration Theory by Anthony Giddens (1991). This study incorporating qualitative as well as quantitative data has attempted to compare the digital status of Nepal with Asian and South Asian countries. It is found that local administrations in towns and in villages are continuously working to bring their areas under connection by the installation of CCTVs, smart poles, smart maps, internet infrastructure and other ICT infrastructure. The study used content analysis of documents and survey conducted in Lalitpur Metropolitan City (LMC). The study recommends the four main areas viz., strict policies and practicable guidelines/directives; installation of ICT infrastructure; implanting skill and ICT qualified human resources and construction of robust websites. If the Government of Nepal works in these four areas then the country will step in the track of formation of ‘smart cities’ in Nepal. Int. J. Soc. Sc. Manage. Vol. 7, Issue-1: 1-11


2018 ◽  
Vol 4 (3) ◽  
pp. 145
Author(s):  
Mahendro Bhirowo ◽  
Fauzia Gustarina Cempaka Timur ◽  
Mardi Siswoyo

<p><span style="font-size: medium;"><span style="font-family: Times New Roman;"><span>E</span><span lang="EN-US">-Government is a government administration system that plays a vital role in the international global communication, and greatly determines the progress of a state. However, the government administration system that utilizes Information and Communication Technology may be exposed to threats, especially threats originating from cyberspace. This research was carried out with the aim to analyze Brunei Darussalam's E-Government strategy in overcoming cyber threats. This study uses descriptive qualitative research methods accompanied by data obtained from the presentations and interviews during the overseas field study visits in Brunei Darussalam by the representatives of the Ministry of Foreign Affairs and Trade (MOFAT), IT Protective Security Services (ITPSS), and the Prime Minister’s Office (PMO) of Brunei Darussalam, as part of a research related to Brunei Darussalam's e-Government strategy in overcoming cyber threats. The results of this study indicate that the Brunei Darussalam’s e-Government strategy in overcoming cyber threats was carried out by focusing on citizen-centric service delivery in stages. It begins with the establishment of a law on computer abuse in 2000, followed by the establishment of Brunei National Computer Emergency Response Team (BruCERT) in 2004, introduction of Internet Ethics and Cyber Security Awareness Program in 2009, and the development of a national cyber security framework in 2014. All are integrated into a common policy coined as Brunei Insight 2035. This can be an input for the implementation of e-Government in Indonesia, in order to improve the equality and openness of access to information and communication in Indonesia, without neglecting the principles of security and comfort in communicating and obtaining information.</span></span></span></p>


Sign in / Sign up

Export Citation Format

Share Document