The Threat of Cyber Warfare in the SADC Region

Author(s):  
Jeffrey Kurebwa ◽  
Kundai Lillian Matenga

This chapter is based on a study that sought to understand the threats of cyber warfare in Zimbabwe. The effects of cyber warfare, cyber intelligence mechanisms in place, and the status of the harmonization of laws and collaboration of SADC countries in efforts to address cyber threats were also covered. Qualitative research methodology was used to conduct the study. A total of 15 key respondents drawn from information technology experts, academia, top military personnel, and lawyers participated in the study. The study revealed that Zimbabwe was vulnerable to cyber warfare due to increased use of technology and failure to keep up with technological advancements. The study noted that the current legislation does not explicitly address cyber warfare threats but focuses more on cybercrime. The study recommended that Zimbabwe enact effective legislation to curtail cyber warfare in order to enhance cyber security. Investment in cyber security in terms of research and human capital development should also be prioritized.

2020 ◽  
pp. 1485-1505
Author(s):  
Jeffrey Kurebwa ◽  
Kundai Lillian Matenga

This chapter is based on a study that sought to understand the threats of cyber warfare in Zimbabwe. The effects of cyber warfare, cyber intelligence mechanisms in place, and the status of the harmonization of laws and collaboration of SADC countries in efforts to address cyber threats were also covered. Qualitative research methodology was used to conduct the study. A total of 15 key respondents drawn from information technology experts, academia, top military personnel, and lawyers participated in the study. The study revealed that Zimbabwe was vulnerable to cyber warfare due to increased use of technology and failure to keep up with technological advancements. The study noted that the current legislation does not explicitly address cyber warfare threats but focuses more on cybercrime. The study recommended that Zimbabwe enact effective legislation to curtail cyber warfare in order to enhance cyber security. Investment in cyber security in terms of research and human capital development should also be prioritized.


2018 ◽  
pp. 30-38
Author(s):  
Valeriy Moskovchenko ◽  
Mikhail Gudkov ◽  
Oleg Lauta

The paper deals with the various aspects of cybernetic confrontation. The authors substantiate the urgency of creating a proactive protection management system and propose hardware and software solutions based on the development of a mobile robotic system. The paper describes the system designed to audit the stability of the network infrastructure to existing and prospective cyber threats, to its architecture and functionality. Cyber warfare marks a new level of armed confrontation. An urgent requirement of the time, taking into account the robotization of weapons and military equipment, is the revision of the principles of building automated control systems, information systems and communication networks from the viewpoint of ensuring cybersecurity. The co-evolution of the cybersecurity system should provide: the detection of new, previously unknown cyber threats (cyber attacks) during the monitoring (exploration) of cyberspace; the automatic selection of the parameters of the functioning of information systems and communication networks under the conditions of destructive effects without deterioration of their main characteristics (cognitive platforms for building information and telecommunication networks). Intelligence in cyberspace requires digital penetration into the network and control systems of a potential enemy and involves the use of completely new sources, forms and methods of data and information collection, development of new intelligence tools and technologies, tactical and technical techniques. Thus, the system of cyber security should be provided for the possibility of pre-emptive hardware and software effects (pre-emptive attacks) and active attacks on information systems and resources of the opposing side, as well as the ability to misinformation by the opposing side of the true properties and parameters of information systems and communication networks.


2017 ◽  
Vol 13 (10) ◽  
pp. 5923-5926
Author(s):  
Mrs. A. Lakshmi Priya ◽  
S. Letitia

Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking. 


ASJ. ◽  
2020 ◽  
Vol 1 (40) ◽  
pp. 53-57
Author(s):  
A.V. Kurbatov A.V., ◽  
L.A. Kurbatova

The continuing build-up in the speed of deepening of the global economic crisis, driven by just as fast drop in quantity of the external resources calculated per inhabitant of our planet, forces us to refer to internal resources in order to prevent the irreversible losses, to overcome the crisis and ensure the sustainable development. Beginning from the second half of the 20-th century, the hopes for efficient deployment of internal resources have been laid on the development of the human-capital theory. However, despite the intensive change in perception of the very concept of "human capital" and a wide scope of innovative models of its practical application, aimed at bringing the economy out of stagnation, the desired outcome is not achieved. The trend of transferring of the bulk of investments to human capital, at the expense of the share of investments spent on increased production, has proved insufficient. The analysis of causes of ultra-high risks of investments in increase of human capital has helped to determine that the models, which are used currently, do not take into account some of the fundamental patterns, which ensure the high efficiency of investment in human capital. Most of the models are based on application of the methods of situational governance, which, at best, have a short-term positive effect. This trend results from the insufficient awareness of managers of the fundamental patterns of human capital development, which deprives the investors of the possibility to benefit from the optimal combination of the situational governance with relevant long-term programs, which can steadily increase human capital. The researches of the fundamental patterns of human capital development have shown, that the main factor for achieving the high efficiency of investment in human capital is the correct organization of the processes of value determination of the subjects of economic activity and the transition from the value determination to value-semantic determination, thus ensuring guaranteed attainment of goals along with high dynamics of resources. The work presented here is dedicated to the method of managing the quality of human capital, which is hereafter referred to as value-semantic economy.


Sign in / Sign up

Export Citation Format

Share Document