scholarly journals Indonesian Defense Diplomacy in Achieving Cyber Security Through ADMM-Plus 2014-2019

LITERATUS ◽  
2021 ◽  
Vol 3 (2) ◽  
pp. 152-158
Author(s):  
Samuel Mangara Sianturi

Cyber ??security issues began to emerge along with advances in the field of information technology and the rapid increase in internet use. However, the greater the need for the internet in the daily activities of the world community, the more potential international security threats arise from activities within the cyber scope. Given the "borderless" nature of cybercrime, it is necessary to deal with other countries. Indonesia's participation in ADMM-Plus illustrates Indonesia's efforts to achieve national interests, namely cyber security through the external environment. This study aims to discuss Indonesia's defense diplomacy in achieving cyber security through ADMM-Plus 2014-2019. By using defense diplomacy theory and qualitative methods, this research illustrates that Indonesia's diplomacy in ADMM-Plus is still at an early stage, so it is difficult to say that the diplomacy has not been maximized. However, the presence of ADMM-Plus has a positive impact on Indonesia, especially in terms of cyber security.

Author(s):  
Alika Guchua ◽  
Thornike Zedelashvili

The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using modern technologies, computer systems. The facts are many and we are often in the center of events. With the development of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becoming increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and problems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare. Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2015 ◽  
Vol 15 (3) ◽  
pp. 436
Author(s):  
Surender Kumar ◽  
M K Soni ◽  
D K Jain

<p>Cyber security has become a critical priority for electric utilities. With the increase in the use of intelligent measuring devices like PMUs and more advanced communications and information technology in smart grid, the overall attack surface has increased. Cyber attacks against synchrophasor system critical infrastructure are detrimental to the functioning of the society as a whole. This paper presents the latest on cyber security of synchrophasor system in smart grid, specifically; it focuses on the deep understanding of the risk in terms of threats, vulnerabilities and consequences that arise from cyber attacks. Since the research on cyber security for the smart grid is still in its early stage, our objective is to provide an overview, analyze potential cyber security threats, and review existing security solutions in the Wide Area Monitoring System.</p>


In the era of social media and the Internet, there has been an exponential increase in threats related to the privacy of user accounts and data. The confidentiality of personal data is compromised for various motives. This sudden increase in security threats has led to widespread problems. Our research is focused on analyzing the extent of cyber-attacks in various countries across the globe. We have proposed a novel approach for analyzing the tweets related to cyber-attacks and its surrounding fields. The analysis proves that Asian countries face more cyber security issues as compared to European countries. Further, it is also analyzed that developing countries like India are more prone to these issues as compare to developed countries like the United States or the United Kingdom.


Aspects of national security in the modern globalized world are analyzed, methods of influencing the factors of national security are studied, special attention is paid to the role of national interests in the context of national security, the issues of «legitimization of power» and «right of rebellion» as ones of the internal destabilizing factors of national security are analyzed. The main focus is given to the information and psychological confrontation in the media and its impact on human consciousness. The necessity of struggle against external influences for stable development and strengthening of own state sovereignty is analyzed. The document «On the National Security Strategy of Ukraine» is considered as a fundamental legislation that regulates and establishes the directions of threat to Ukraine in the context of information confrontation between states. The main elements of influence and their result on European countries are studied. Recent events in Belarus and the coronavirus pandemic are forcing more attention to national security issues and threats from outside players. The main factor in preserving sovereignty is the clear formulation of one's own national interests and defending them in the international arena. Extension of Ukraine’s cooperation with the world’s leading countries (especially in the field of cyber security and military cooperation) should help strengthen interstate ties and expand interstate partnerships in the field of economy and security. The main aspects of stability and instability among modern methods of political struggle are highlighted. The study of national security involves the analysis of current world political events and processes, namely – globalization, migration, economic crisis, technological development, etc. These processes are very interconnected and, to some extent, complement each other. We can see that global political change in the world at the beginning of the ХХІst century is the foundation for a new world order.


2021 ◽  
pp. 1-25
Author(s):  
Guangjun Li ◽  
Preetpal Sharma ◽  
Lei Pan ◽  
Sutharshan Rajasegarar ◽  
Chandan Karmakar ◽  
...  

With the development of information technology, thousands of devices are connected to the Internet, various types of data are accessed and transmitted through the network, which pose huge security threats while bringing convenience to people. In order to deal with security issues, many effective solutions have been given based on traditional machine learning. However, due to the characteristics of big data in cyber security, there exists a bottleneck for methods of traditional machine learning in improving security. Owning to the advantages of processing big data and high-dimensional data, new solutions for cyber security are provided based on deep learning. In this paper, the applications of deep learning are classified, analyzed and summarized in the field of cyber security, and the applications are compared between deep learning and traditional machine learning in the security field. The challenges and problems faced by deep learning in cyber security are analyzed and presented. The findings illustrate that deep learning has a better effect on some aspects of cyber security and should be considered as the first option.


2020 ◽  
Author(s):  
Pranav C

Abstract: With rapid computerisation of all walks of life, cyber security has become a major challenge to the mankind. Cyber security is all about security of anything in cyber realm, while information security is all about security of information regardless of the realm. Cybercrimes are perpetrated by using computers and related devices / networks by individuals with sophisticated knowledge in the field of computers. Cybercrime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cybercrime has assumed rather sinister implications. Cybercrime perpetrators are keeping pace with innovations in technology and are way ahead of security measures taken to curb them. With huge money involved in cybercrimes, it has become a major concern. This research paper briefly defines cyber security and deals in detail with cybercrime and five major cyber security threats currently plaguing the world.


Author(s):  
Norman Schneidewind

There is little evidence that the world is more secure from a major cyber attack than in 2000 because attacks on the Internet go on unabated . In addition to calling for new legislation and oversight, this chapter serves as a source of information about cyber security that domestic and international security analysts can use as a resource for understanding the critical issues and as a guide for preparing for hearings and legislative initiatives.


2021 ◽  
Vol 15 (1) ◽  
pp. 103
Author(s):  
Asep Kamaluddin Nashir ◽  
Yugolastarob Komeini ◽  
Hesti Rosdiana

Tulisan ini bertujuan untuk menjelaskan irisan dan keterkaitan erat antara lingkungan strategis, strategist, dan strategi dalam perkembangan isu-isu keamanan internasional. Selain itu, faktor national will setiap negara memberikan pemahaman berbeda tentang perspektif strategis dan perumusan strategi yang dihasilkan. Hasil dari tulisan ini menjelaskan bahwa lingkungan strategis menjadi preferensi strategist atau para pengambil kebijakan dalam merumuskan kebijakan atau strategi, dengan mempertimbangkan national will untuk menghadapi perkembangan lingkungan strategis. Dengan kata lain, identifikasi lingkungan strategis bagi aktor negara menjadi sebuah keharusan untuk menjamin tercapainya kepentingan nasional. Identifikasi tersebut berkonsekuensi pada pemahaman strategist dalam menyusun strategi untuk mencapai kepentingan nasional sebuah negara.Kata-kata kunci: Lingkungan strategis, National Will, Natuna, Indo-Pasifik This paper aims to explain the links between the strategic, strategic, and strategic environments in the development of international security issues. Furthermore, we seek to explain why a countries national will provide a different understanding of the resulting strategic perspective and strategy formulation. The results of this paper explain that the strategic environment becomes the preference of strategists or policymakers in formulating policies or strategies, taking into account the national will, to adapt to the development of the strategic environment. In other words, identifying the strategic environment for state actors is a must to ensure the achievement of national interests. This identification has consequences on strategic understanding in formulating strategies to achieve the national interest of a country.Keywords: Strategic environment, National Will, Natuna, Indo-Pacific


2018 ◽  
pp. 674-702 ◽  
Author(s):  
Kouroush Jenab ◽  
Sam Khoury ◽  
Kim LaFevor

A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.


Sign in / Sign up

Export Citation Format

Share Document