Cyber Security: Challenges and the Way Forward

Article

The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual, ...

Dr. Muhammad Riaz SHAD
National University of Modern Languages (NUML), Pakistan


Introduction

The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual, organizational and state-causes to label the contemporary era as “information age.“ This is particularly true for western industrialized nations, where critical infrastructures-communications, energy, transportation, banking, water and services-are increasingly dependent on Information Infrastructure. While the information revolution has created new opportunities, improved organizational efficiency and led to unprecedented global connectivity, it has brought about new unconventional vulnerabilities and threats bearing social, economic, political and security implications.

Cyber security, meaning the protection of computers, networks and data, is a serious concern of individuals and organizations, public and private as well as national and international. This concern becomes more serious as “the internet of things“ expands. As the technology advances with a rapid pace, innovations in cyber-crime also take place. Microsoft security bulletins regarding vulnerabilities of its products and services show an ever growing number of bugs, viruses and other threats to cyber security. Scope for cyber-threat increases as cyber-space remains unregulated and cyber-crime is simple as well as inexpensive to commit. Above all, cyber-attack poses a technical challenge of identification of the responsible as it is concealed through the use of several networks. Thus, an easy escape from this problem does not exist. However, serious cyber-attacks committed or backed by a state against another state can be prevented through international cooperation, if it could be achieved. This paper assumes that cyber security, apparently a technical issue, is to a great extent an economic and political matter. In view of this, the paper focuses on the social, economic and political, rather than technical, dimensions of cyber security.


1. Key Concepts

While the technical details of cyber security are beyond the scope of this study, the basic concepts are essential to understand in order to explain it as a socio-political phenomenon. These key concepts can be divided into two sets, each containing three interrelated concepts. First set comprises the concepts of cyber security, cyber space and cyber governance.

Cyber security, also called information technology security, refers to technologies, processes and practices “to prevent, detect and recover from damage to confidentiality, integrity and availability of information in cyberspace.“1 This general definition indicates that cyber security involves not only technical but also political and legislative measures.

Cyberspace refers to “the interaction of people, businesses and other entities over computer networks, namely electronic messages and commercial on-line services.“2 The most sizeable and visible manifestation of cyberspace is internet, which is ubiquitous as it is available everywhere at the same time.

Cyber (security) governance refers to “the development and application by Governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.“3 It aims to discipline
the behavior of internet developers and users through regulatory frameworks, involves both technical and legal measures, and operates within as well as between the states.

Second set comprises the concepts embodied in the nature and scope of cyber-attacks and the concept of critical infrastructure. Cyber-attack refers to “any act by an insider or an outsider that compromises the security expecta tions of an individual, organization, or nation.“4 Cyber-attacks can be categorized into four areas: cyber crime, cyber espionage, cyber terrorism and cyber war. It is useful to differentiate between these types of cyber attacks.

Cyber crime involves the use of computer networks by individuals alone or in groups to steal confidential data or cause disruption, mostly for financial gains. It includes criminal activities such as stealing of credit/debit card information and intellectual property theft as well as disruption to a website or service.

Cyber espionage refers to the use of computer networks to get unauthorized access to personal or confidential information held by individuals, governments or organizations for intelligence or certain operations.

Cyber terrorism is associated with a non-state actor/organization that uses computer networks for terrorist activities aimed at creating fear and panic or causing physical destruction.

Cyber war includes use of computer networks by a state against an adversary (state or non-state actor) for military operations designed to disrupt information systems or systems connected to information technology in view of political goals.

In technical terms, above-defined cyber-attacks take place in three forms: account takeover, impostor fraud and denial of service (DOS). Account takeover involves the use of malware to obtain a user’s confidential information-IDs, PINs and passwords-for transferring money or doing other frauds. In imposter fraud, a fraudster presents himself to an authorized user as a person who is trustworthy or an authority, and requests a bank transaction, which seems normal to the bank. Denial of service (DoS) is a cyber-attack which makes networks or systems unavailable.

Serious cyber-attacks target “critical infrastructures“ of an organization or a state. In this context, an infrastructure refers to “a framework of interdependent networks and systems, generally interlinked at many different levels, including industries, institutions and distribution capabilities that provide a flow of products or services.“5 Five broad sectors can be identified as critical infrastructures, particularly in modern developed countries: information and communication, banking and finance, energy, physical distribution (transpor tation networks) and human services.6 Among these, information and communication infrastructure are vulnerable to cyber-attacks. Since other critical infrastructures are interconnected through information and communication networks, they are also vulnerable to cyber risks.


2. Range of Cyber-Attacks and the Motivations

Vital social infrastructures-electricity, finance, water, transportation, health and food-are increasingly dependent on ICT networks for their functioning, distribution and interconnectedness. This dependence results in both opportunities and vulnerabilities which can be exploited by people ranging from individuals to governments. “Information revolution“ experienced by the contemporary world is boon as well as bane. It is bane because ICT has an “enabling function“ for disruption, crime and state-level aggression. ICT dependence becomes more prone to vulnerabilities in times of social unrest, political tensions and other appalling events. The spectrum of cyber-attacks is quite broad, from individual activity, to activities of groups and non-state actors, to governmental actions. These attacks are driven by a range of motivations-from ideological campaigns, to financial gain, to political objectives.

It is taken from TASAM Publishing's book named "Change in State Nature: Boundaries of Security".
This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 455 ) Actiivities ( 218 )
Areas
Africa 0 144
Asia 0 231
Europe 0 38
Latin America & Carribean 0 34
North America 0 8
Regions ( 4 Fields )
Action
 Contents ( 173 ) Actiivities ( 52 )
Areas
Balkans 0 93
Middle East 0 59
Black Sea and Caucasus 0 16
Mediterranean 0 5
Identity Fields ( 2 Fields )
Action
 Contents ( 175 ) Actiivities ( 74 )
Areas
Islamic World 0 146
Turkish World 0 29
Turkey ( 1 Fields )
Action
 Contents ( 219 ) Actiivities ( 57 )
Areas
Turkey 0 219

BM Genel Sekreter’i Antonio Guterres’in “Dünyanın buna her zamankinden daha fazla ihtiyacı vardı” ifadesi ile 22 Temmuz’da imzalanan, ilk etapta 120 gün boyunca uygulanacak, sonra yenilenecek olan Tahıl Koridoru Anlaşması’nı, her ne kadar, Rusya’nın Odesa saldırısı izlediyse de, dünya tahıl borsalar...;

Arktik Okyanusu son dönemlerde uluslararası siyasetin öne çıkan bölgelerinden birisi hâline gelmiştir. Dev buz kütlelerinin küresel ısınmayla birlikte büyük bir ekolojik değişim dönemine girmesi hem Kuzey Kutup Dairesi’ne hem de kıyıdaş ülkelere yeni fırsatlar sunarken, aynı zamanda bu fırsatları ko...;

Tarihte ilk millî marşlar Tanrı'ya adanmış ilahilerdir (örneğin, Hint şiirindeki Veddler). Daha sonra kurtuluş mücadelelerinde halka ilham vermek ve ulusal bilinci uyandırmak gibi amaçlar doğrultusunda millî marşlar ortaya çıkmıştır. Millî marşlar içeriğine ve müzikalitesine bağlı olarak didaktik ve...;

Türk Asya Stratejik Araştırmalar Merkezi TASAM, Dr. Cengiz Topel MERMER’in hazırladığı “Sri Lanka’nın Çöküşüne Küresel Siyaset Çerçevesinden Bir Bakış” isimli stratejik raporu yayımladı ;

Eski çağlardan beri insanlar ihtiyaç duydukları ancak üretemedikleri mal veya hizmetleri elde etmek için farklı yollara başvurmuşlardır. Başlangıçta ihtiyaçların örtüşmesi esasına dayalı olarak kullanılan takas yöntemi, zamanla yerini farklı ödeme şekillerine bırakmıştır. Takas yöntemi takip edilere...;

Yapay zekânın muharebenin gelişiminde kullanılması süreci hızla ilerliyor. Ukrayna, Azerbaycan, Suriye ve Etiyopya'da son dönemde yaşanan çatışmaların da işaret ettiği gibi otonom ve yarı otonom insansız hava araçlarının konvansiyonel hedefleri vurmak üzere giderek maliyetleri azalıyor ve kolay (edi...;

Osmanlı devrinde Sudan ve Türkiye arasındaki ilişkiler , Osmanlı Padişahı I. Selim'in (1467-1520) Mısır'ı Osmanlı Devleti'nin mülküne ilhak ettiği 16. yüzyılın ilk çeyreğine kadar uzanmaktadır. 1517'de Kahire'nin fethinden sonra Mısır'ın güney sınırlarını güvence altına almak, kaçan Memlûkleri orta...;

ABD, Japonya, Avustralya ve Hindistan arasındaki güvenlik diyalogu için oluşturulan mekanizmayı ifade eden QUAD, İngilizce bir sözcük olarak “Dörtlü” anlamına gelir. Söz konusu dört ülkenin liderleri, Ocak 2004’te Endonezya'yı sarsan deprem sonrasında oluşan tsunaminin Güneydoğu Asya’da neden olduğ...;

4. Denizcilik Ve Deniz Güvenliği Forumu 2022

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Askerî Müzesi ve Kültür Sitesi -
  • İstanbul - Türkiye

8. İstanbul Güvenlik Konferansı (2022)

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Askerî Müzesi ve Kültür Sitesi -
  • İstanbul - Türkiye

Dünya Türk Forumu Akil Kişiler Kurulu Toplantısı 5

Dünya Türk Forumu Akil Kişiler Kurulu’nun beşinci toplantısı 25 Mayıs 2023 tarihinde İstanbul’da 6. Dünya Türk Forumu marjında gerçekleştirilecektir.

  • 14 Jun 2023 - 14 Jun 2023
  • İstanbul - Türkiye

Türk Asya Stratejik Araştırmalar Merkezi TASAM, Dr. Cengiz Topel MERMER’in uzun araştırmalar sonunda hazırladığı “TEKNOLOJİK ÜRETİMDE BAĞIMSIZLIK SORUNU; NTE'LER VE ÇİPLER ÜZERİNDE KÜRESEL REKABET” isimli stratejik raporu yayımladı

Türk Asya Stratejik Araştırmalar Merkezi TASAM, Dr. Cengiz Topel MERMER’in hazırladığı “Sri Lanka’nın Çöküşüne Küresel Siyaset Çerçevesinden Bir Bakış” isimli stratejik raporu yayımladı.

Türk Asya Stratejik Araştırmalar Merkezi TASAM, Dr. Cengiz Topel MERMER’in uzun araştırmalar sonunda hazırladığı “MYANMAR; Büyük Oyunun Doğu Sahnesi” isimli stratejik raporu yayımladı

İngiltere’nin II. Dünya Savaşı sonrasında Hint Altkıtası’ndan çekilmek zorunda kalması sonucunda, 1947 yılında, din temelli ayrışma zemininde kurulan Hindistan ve Pakistan, İngiltere’nin bu coğrafyadaki iki asırlık idaresinin bütün mirasını paylaştığı gibi bıraktığı sorunlu alanları da üstlenmek dur...

Devlet geleneğimizde yüksek emsalleri bulunan Meritokrasi’nin tarifi; toplumda bireylerin bilgi, bilgelik, beceri, çalışkanlık, analitik düşünce gibi yetenekleri ölçüsünde rol almalarıdır. Meritokrasi din, dil, ırk, yaş, cinsiyet gibi özelliklere bakmaksızın herkese fırsat eşitliği sunar ve başarıyı...

Gündem 2063, Afrika'yı geleceğin küresel güç merkezine dönüştürecek yol haritası ve eylem planıdır. Kıtanın elli yıllık süreci kapsayan hedeflerine ulaşma niyetinin somut göstergesidir.

Geçmişte büyük imparatorluklar kuran Çin ve Hindistan, 20. asırda boyunduruktan kurtularak bağımsızlıklarına kavuşmuş ve ulus inşa sorunlarını aştıkça geçmişteki altın çağ imgelerinin cazibesine kapılmıştır.

Meritokrasi Devlet geleneğimizde yüksek emsalleri bulunan Meritokrasi’nin tarifi; toplumda bireylerin bilgi, bilgelik, beceri, çalışkanlık, analitik düşünce gibi yetenekleri ölçüsünde rol almalarıdır. Meritokrasi din, dil, ırk, yaş, cinsiyet gibi özelliklere bakmaksızın herkese fırsat eşitliği sunar...