A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Author(s):  
Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the world. This chapter discusses emerging laws, policies, processes, and tools that are changing the landscape of cyber security. This chapter provides an overview of the research to follow which will provide an in depth review of mobile security, mobile networks, insider threats, and various special topics in cyber security.

2018 ◽  
pp. 173-180 ◽  
Author(s):  
Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the world. This chapter discusses emerging laws, policies, processes, and tools that are changing the landscape of cyber security. This chapter provides an overview of the research to follow which will provide an in depth review of mobile security, mobile networks, insider threats, and various special topics in cyber security.


2019 ◽  
Author(s):  
Azian Ibrahim ◽  
Noorfadhleen Mahmud ◽  
Nadrawina Isnin ◽  
Dina Hazelbella Dillah ◽  
Dayang Nurfauziah Fauz Dillah

This study analyzed the cyber warfare impact on national security and focusing on Malaysia experiences. The issues regarding cyber warfare have become a serious concern since it was a risk of national security in Malaysia. The objectives of the study are to analyze issues related to cyber warfare that affected Malaysian system security, to determine causes that caused to cyber warfare. This study used a qualitative research approach to evaluate the current defense approaches related to cyber warfare in Malaysia. The interviews were conducted with the respective respondents: the Senior Manager, Research Management Centre, Strategic Research, and Advisory Department of Cyber Security Malaysia Department. This study can contribute to expanding the security of national security by demanding the government to adopt a broad acquisition risk management strategy. It can assist in the development of highly effective aggressive and defensive methods to any company dealing with future cyber warfare challenges and risk.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


2020 ◽  
Author(s):  
Abhilasha Semwal

Interestingly art is full of reproductions. Some are replicas, like Mona Lisa and others are fake or forgeries, like the ‘Vermeers’ painted by Han van Meegeren that was sold for $60 million (Kreuger and van Meegeren 2010).Now the distinction between real and fake is based on the concept of authenticity. The question is, is this artefact what it claims to be? The answer seems simple, but in reality, things are complicated. Today, the painting of the forger John Myatt are so famous that they are valued at up to $40,000 each, as ‘genuine fake’ (Furlong 1986). So technically, they are not what they say they are, but they are authentically painted by him and not by any other forger. And they are beautiful, “a bit as if one were to utter a beautiful lie, not any ordinary lie.”According to research out of cyber security company, Deeptrace, the numbers of ‘deepfake’ videos on the internet have doubled in just nine months from 7,964 in December 2018 to 14,698. Of these ‘deepfakes’, 96% were pornographic, often with a face of a celebrity morphed onto the body of an adult actor engaged in sexual activity . Accordingly, Facebook has invested $ 10M into research effort to produce a database and benchmark for detecting deepfakes, and is partnering with top research institutions such as MIT, UC Berkeley, and Cornell Tech . It is clear that deepfakes are alarming and firms like Facebook are doing something about it, but the question is what are deepfakes? And why are they alarming?Due to increased concentration of users around social media and democratization of means by which deepfakes are produced, the web is seeing and increasing propagation of hyper-realistic deepfakes without technical understanding of machine learning, and their increased realism and scale is largely due to improvements in the organization of datasets being fed into machine learning algorithms, as well as the introduction of Generative Adversarial Network (GANs).When truths are indistinguishable from falsehoods, we put at risk our democracy, our ‘national security, and public safety. When the world of the ‘perfect’ deepfake, the waters of fact and fiction are muddled, creating a fog of questioning what’s real and what’s fake?How might deepfakes make us question our national security in times of war? Deepfakes sent from adversaries can show our soldiers killing civilian to invoke an environment of distrust and instability.


2013 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.


2017 ◽  
Vol 13 (10) ◽  
pp. 5923-5926
Author(s):  
Mrs. A. Lakshmi Priya ◽  
S. Letitia

Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking. 


2020 ◽  
Vol 9 (3) ◽  
pp. 111-119
Author(s):  
Yu.Yu. IERUSALIMSKY ◽  
◽  
A.B. RUDAKOV ◽  

The article is devoted to the study of such an important aspect of the activities of the World Russian People's Council (until 1995 it was called the World Russian Council) in the 90-s of the 20-th century as a discussion of national security issues and nuclear disarmament. At that time, a number of political and public figures actively called for the nuclear disarmament of Russia. Founded in 1993, the World Russian Council called for the Russian Federation to maintain a reasonable balance between reducing the arms race and fighting for the resumption of detente in international relations, on the one hand, and maintaining a powerful nuclear component of the armed forces of the country, on the other. The resolutions of the World Russian Council and the World Russian People's Council on the problems of the new concepts formation of foreign policy and national security of Russia in the context of NATO's eastward movement are analyzed in the article. It also shows the relationship between the provisions of the WRNS on security and nuclear weapons issues with Chapter VIII of the «Fundamentals of the Social Concept of the Russian Orthodox Church».


Author(s):  
María Cristina García

In response to the terrorist attacks of 1993 and 2001, the Clinton and Bush administrations restructured the immigration bureaucracy, placed it within the new Department of Homeland Security, and tried to convey to Americans a greater sense of safety. Refugees, especially those from Iraq, Afghanistan, and Syria, suffered the consequences of the new national security state policies, and found it increasingly difficult to find refuge in the United States. In the post-9/11 era, refugee advocates became even more important to the admission of refugees, reminding Americans of their humanitarian obligations, especially to those refugees who came from areas of the world where US foreign policy had played a role in displacing populations.


Sign in / Sign up

Export Citation Format

Share Document