National Security Policy and Strategy and Cyber Security Risks

Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.

2016 ◽  
pp. 100-128
Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2021 ◽  
pp. 84-94
Author(s):  
Mohammed. I. Alghamdi ◽  

The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.


Author(s):  
Oleksandr Klevtsov ◽  
Artem Symonov ◽  
Serhii Trubchaninov

The chapter is devoted to the issues of cyber security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPP). The authors examined the main types of potential cyber threats at the stages of development and operation of NPP I&C systems. Examples of real incidents at various nuclear facilities caused by intentional cyber-attacks or unintentional computer errors during the maintenance of the software of NPP I&C systems are given. The approaches to vulnerabilities assessment of NPP I&C systems are described. The scope and content of the assessment and periodic reassessment of cyber security of NPP I&C systems are considered. An approach of assessment to cyber security risks is described.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


Author(s):  
Ruslan Pliushch ◽  
◽  
Viktoriia Filippova ◽  
Oksana Pronina ◽  
◽  
...  

Globalization has become one of the factors that led to the formation of a new concept of national security, according to which it is an integral part of the system of the highest level (regional, international, global security), which is a consequence of the integration of the world community in an effort to overcome common threats and challenges. Provision of national security is the main task of the foreign policy of the state, the aim of the national security policy is protection of the state and society from external threats. It is established that national security is a process that includes various measures that guarantee the long and free existence and national (state) development, including the protection and defense of the state as a political institution, and the protection of people and the entire society, their benefits and the natural environment from threats that significantly limit its functioning or harm the benefits subject to special protection. The analysis of the process of formation and development of ideas and views on the problem of defining the essence and content of national security showed that national security acts as an extremely complex, contradictory and long-term, but very important and necessary process to ensure sustainable development of society and state, the preconditions of which were established in different historical eras. It has been proved that national security policy and strategy should define the roles and boundaries of different actors of the country's security, appropriate mechanisms of coordination of their activities and rules of interagency support. In the context of globalization, national security strategies should include a realistic assessment of the costs and sustainability of security institutions and plan their development, in addition, national security strategies and policies are not static and require periodic updating.


2021 ◽  
Vol 9 (2) ◽  
pp. 477-492
Author(s):  
Tarun Dhar Diwan, Et. al.

Network protection includes of the strategies and procedures implemented in this paper to avoid and monitor intrusion attempts, infringement, manipulation or violation of a computer system and services accessed by the network. Network protection applies to the different countermeasures put in place to secure or flow through the network and data collected on or through it. Protection for web applications is the method of securing websites and internet resources from multiple security attacks that target weaknesses in an application. Security for web apps is a data management division that primarily deals with the security of websites, web applications and web services. Risks to cyber security include a broad range of allegedly criminal practices on the web. For years, computer security risks against utility assets were identified, cyber-attacks arising from the exploitation of data device weaknesses by unauthorized access users This study is a cyber infrastructure assault, vulnerability and vulnerabilities, including hardware and software devices, networks, business networks, intranets, and cyber intrusion usage. Only big organisations are at risk of cyber-attacks, a widespread misunderstanding. Even then, the targeting of small and medium sized enterprises has seen a large improvement. This is since less-sophisticated cyber defence mechanisms appear to be used by these smaller organisations. As many as 50% of all cyber-attacks hit small companies, wasting $200,000 on average, sufficient to get out of business for less-established entities. an enterprise-grade protection device and awareness of the various forms of cyber threats facing corporations in 2025 to safeguard company from hacking attacks. fight cyber threats successfully and decrease the exposure of enterprise.  


2019 ◽  
Author(s):  
◽  
Kristofas Barakat

The growing danger of cyber-threats has forced many states to develop and strengthen their cyber-security capabilities. The complex nature of cyber-threats has a profound impact on traditional international relations, as many states today consider cyberspace as the greatest challenge to their national security. Research literature on cyberspace and cyber-threats is particularly limited in the case of Lebanon, despite Lebanon’s interesting cyber-threats history. The domination of traditional security dilemmas have restricted Lebanon from developing a successful cyber-security. The lack of attention and development for cyber-security has made Lebanon an appealing target for various actors to conduct their cyber-operations. The objective of the thesis is to determine whether Lebanon has the ability to defend itself from cyber-threats in spite of a missing cyber-security policy. The thesis offers an analysis of Lebanon’s current conditions with regard to cyber-security at various levels. The thesis employs the international legal framework on cybercrime, the Budapest Convention, in order to assess Lebanon’s capabilities to counter cyber-threats. Furthermore, this study utilizes Estonia, a small Baltic nation considered as one of the leaders in the field, as a comparative case to further examine Lebanon’s cyber-security and identify areas that would bolster Lebanon’s capabilities.


Sign in / Sign up

Export Citation Format

Share Document