Edudorm Facebook

International Cyber Security Threats

            International Cyber Security Threats

            Chapter 1. Introduction

The interment is increasingly becoming the central part of individual’s lives today. Nations are now reliant on technology particularly cyberspace (Aloul et al., 2012). This is comprised in every activity that is delivered on daily basis. Ranging from instant texting, purchases, traveling, learning and financial transactions, it is apparent that the internet has now transformed every aspect of life. With the increasing internet utilization by individuals, guarding important data has thus become a necessity and a priority for national and international governments. As technology continuously empowers growth it becomes apparent that individuals are more vulnerable to cyber threats. People today are in need of liberty and enablement to utilize technology while being guarded against any spiteful activity (Aloul et al., 2012). Cyber threats are currently developing rather rapidly thus creating the necessity to create and stiffen security protections to ensure adequate guard for everyone utilizing these cyberspaces. The escalation of cyber threats in varying rates and differences has resulted in prime security threats thus the necessity for better security protection application to hinder the occurrence of such threats which might not only affect national but also international socio-economic performance (Aloul et al., 2012). Most institutions and individuals globally are faced with major challenges while attempting to maintain cyber-security based on monetary and technology assets limitation. This research paper is objected at analyzing the need and the importance of cyber-security in the contemporary, globalized internet era.

Chapter 2. Literature Review

According to Cavelty, (2013) cyber-security mainly relates to the creation of self-reliance and safety in regard to the utilization of information in the quest of ensuring a conviction by the information society. In other words, it is an intervention in the contemporary society whose objective is to lower and hinder any risk and susceptibilities in relation to cyberspace safety. Similarly, Byres& Lowe, (2004) cyber-security in this context, therefore, encompasses basically everyone and every activity globally. It offers tremendous opportunities for improving human development and obtaining more improved assimilation in the data society. Cyber-security supports extensive acquisition to knowledge as well as learning in regard to schemes and policies evolution. More so, it develops fresh kinds of profitable, social and expert models which creates a number of practical and lawful issues that should be that should be handled on the ground of valuing its unique nature and concerns. This, therefore, implies that based on the evolution different measures and distinct strategies contrary to those that have been acquired prior to the information era of technology are necessary (Cavelty, 2013).

Possibly the most dominant and dangerous cyber-security threat is cyber-terrorism. The rate of the recent terrorist owned attacks globally has raised concerns among professions on the intimidations that is faced by nations (Aloul et al., 2012). Cyber-terrorism is an organized attack against computer-based information systems. In this context, terrorists mainly seek to destruct the existing information structure in a country so as to intimidate national security, ruin public trust, deteriorate the economy and cause unrepairable damages. Most of such attacks are fueled politically and normally result in violence (Cavelty, 2013). While in most cases these attacks are aimed at destroying the security systems the economy is the most affected due to destructions and instabilities. It is worth noting that terrorists normally necessitate minimal period to access critical data and destroying security. As most states are developing fresh technologies without considering adequate security needs this is creating even wider opportunities for a security attack. The security and communication network of any country can be impacted greatly by terrorists hacking. For the United States and the globe, September 11 offered the most suitable example of the damages that can arise (Cavelty, 2013).

Ericsson (2010) notes that, nevertheless, most administrations and societies are existing in terror of the undesirable effects of information technology based on the experienced socio-economic and security threats. In accordance, the absence of cyber-security within most environments degrades information security confidence. This is usually the scenario with most intrusions globally leading to the loss of finances (Aloul et al., 2012). In the administrative, supervisory and law organizations the absence of cyber-security lowers the actualization of utmost possibility in regard to information technology. This, therefore, means that unique measures are necessitated to stop cyberspace from becoming a root of threats for an administration’s citizen while avoiding the occurrence of cyber criminality. Most governments have as per today, adopted distinct measures that seek to improve cyber-security for its citizens but most of them have proved to be less effective (Ericsson, 2010).

The utilization of cyber instruments in the acquisition of data has increased being part of international intelligence services. In addition, most foreign countries are particularly working even more in the creation of information system and agreement that would increase the possibility for sole institutions to acquire severe effects by destroying distributions, economic and relationship systems (Ericsson, 2010). These aspects are particularly essential for the military authority and security in general which would, in turn, impact individual’s lives nationally and globally. According to Javaid et al, (2012) the increasing state of national and foreign enemies are eyeing information systems that might incorporate computer, communication and internet systems in an essential sector. In that, the attackers might destroy the systems to acquire information that is necessary for the transferring data to different networks that are ruled by foreign or national enemies thus creating threats (Javaid et al, 2012).

Apart from the criminal groups, cyber terrorists and international intelligence departments, insiders can be an additional cause of cyber-security intimidation (Javaid et al, 2012). Insiders normally necessitate increased knowledge in regard to interruptions generated by computers given that they have information about their targets infrastructure (Probst, 2010). This, therefore, permits those to acquire any kind of information which might also include copying and destroying of data at wish from their unauthorized control (Ericsson, 2010). Contractors can also be the sources of such attacks because they understand almost every aspect of the systems. In that organizations are required to employ experts to assist them with their security installment and if the professions are not, therefore, driven by positive purposes the opportunity can be utilized in accessing vital content regarding such institutions and placing it, the government and society in actual threats. The rise of cyber threats has affected business relations and productivity for a significant period with has resulted in collaboration amid countries globally. Simultaneously, policy developers, professions, and researchers are consistently outlining the significance of collaboration amid different countries and their administrations to respond to the issues levied by the nature of cyberspaces so that cyber safety can be achieved. Actually, it is uncertain that any given country has the capability to guard itself against cyber threats without collaborating with different countries.

Based on Kritzinger & Solms, (2010) the hacking of fundamental information, computer infections, and any additional cyber-connected threats impacts the lives of individuals ranging from small inconveniences to severe loss cases. Today's cyber threat is usually caused by susceptibilities and carelessness or in other cases unplanned accidents. Nevertheless, the cases can be organized ones such as hacking or information access without any authorization. The primary objectives of such cases are related to stealing fundamental data in order to develop unlawful monetary transfers that are aimed at destruction. In other words, the development of technology has placed most individuals under threats which affect security (Kritzinger & Solms, 2010). In other words, cyber security can best be described as a mode of offering protection to any existing data from unauthorized destruction. This can also be described as any measure and activity that is applied to lower risks and any type of susceptibility and the enforcement of the needed regulation for safety (Mo et al., 2012).

Rowe, Lunt & Ekstrom,(2011) notes that in the dynamic world today, Cyber-security is vital for societies, nations, and organizations that are involved in the gathering and storage of wider data varieties on networks and computers (Mo et al., 2012). For most families across the globe, the need to guard their members and particularly unsuspecting children from the negative effects of cyber use has grown to be of adequate significance. In regard to personal lives, people are more focused on guarding information that would have direct effects on the social existence and financial stability. The internet cannot be rejected because it has positively transformed every life’s aspect and the persisting threats can be handled adequately (Rowe, Lunt & Ekstrom, 2011). Technology has offered varied and stable grounds for learning but the threats are still present. Data such as photos that are shared individually within the social internet platforms such as Twitter can be utilized by other unauthorized persons unsuitably thus resulting in severe and intimidating situations.

According to Probst, Hunker, Gollmann, & Bishop, (2010) today, social networking platforms are considered to be the most recognized mediums for interactions and sharing of data globally. However, despite the benefits, the platforms have generated numerous opportunities for cyber criminality, conceded personal individualities and data outflow. Thus, it is important for persons to comprehend on the manner in which they can guard themselves against cyber threats and should always understand the general distinction amid actual and computer-generated word (Kritzinger & Solms, 2010). Apart from the fact that the government is needed to install measures that seek to enhance technology liberty and safety individuals should in general know how they should guard their important information and also participate in ethical online conducts in the quest of eradicating cyber threats evolution thus generating a safer online surrounding Von (Solms & Niekerk, 2013).

International business institutions, particularly SMEs are faced with severe challenges while attempting to protect their data. Having low monetary and technology materials makes it even worse for those organizations to improving their security systems and maintain technology improvements (Probst, Hunker, Gollmann, & Bishop, 2010). Cyber-crime has been existence for the longest period since the initiation of technology but despite the need to addressing the issue in order to improve the standard of individual’s life and create safety, it is on the rise. However, having adequate awareness in regard to cyber-security and adequate organization can be useful can be essential for organizations and individuals in general (Solms & Niekerk, 2013). Cyber-security has equal prominence for the local and international governments because most of the operative organizations keep extensive amounts of confidential reports regarding the associated nations and its citizens. Regardless, most of the governmental institutions experience challenges in regard to guarding their confidential information (Wang & Lu, 2013). The unlawful acquisition of delicate data technologically by terrorists from administration owned institutions and internet spying can result in severe threats on a nation. For this rationale, cyber-security is of dominant significance for all kinds of institutions and a fundamental asset to any given state. The intensifying utilization of the contemporary internet and the rising cyber-crimes has created more cyber-security importance than ever before (Wang & Lu, 2013).

Based on Yan, Qian, Sharif, & Tipper, (2012) for the impacts of cyber-security intimidations to be lowered, the United States, for instance, has created several measures to avoid such outcomes. It is admirable, that America utilizes billion dollars each year that are aimed at improving the secretive and public protection against the rising violence and equipped international cyber intimidations. However, the existing measures are inadequate to fight the rapidly rising threats against the nation’s security (Probst, 2010). With the rising use of internet networks in different countries, it is essential for all the state to combine their capabilities in the fight against cyber-security intimidations. According to Wei, Lu, Jafari, Skare, & Rohde, (2010) it is worthless for any given nation to assert that it is committed to fighting cyber-crime solely because systems are now accessible from any region globally. The most suitable approach would be America adopting global control. In this process, the administration will gain more safety and the potential to establish, situate cyber criminals and penalize them methodically (Donaldson, Siegel, Williams & Aslam, 2015).

Chapter 3. Methodology

The aim of this research was to establish the existing cyber-security threats and the significance of cyber safety in the national and global context. In addition, the search sought to investigate the effectiveness of the existing international cyber-security interventions in creating technology autonomy and enhancing security.

Research Method and Design

This study utilized a quantitative study which involved analyzing and review findings from existing studies under a descriptive design. The method and design were selected because they are cost and time effective. In addition, contrary to a qualitative research, a quantitative study has the capability of generating maximum information to support all the raised claims and the research question (Lim, 2013). In addition, quantitative study generates computable as measurable results. Its only disadvantages are that it normally limits the scope of the study on the set frameworks (Tavakoli, 2013). The study is not vulnerable to biases and opinions because the arguments are acquired from authoritative sources. In other words, quantitative findings are more accurate and reliable because the researcher has the opportunity of testing the hypothesis, remain objective and make dependable recommendations (Tavakoli, 2013).

Research Strategy and Approach

The investigation that was utilized with respect to this research was a practical one and not new. The study utilized different existing literature that regards the role of cyber-security measures of security and the increasing cyber threats globally. In this context, the research created fresh ideas that are grounded in existing literature. The study utilized an inductive investigation strategy. This approach involves the researcher creating specific observations which are in turn utilized for the development of research theories (Tavakoli, 2013). This approach was utilized because the research was a quantitative one.

Data Collection and Tools

Quantitative data was mainly acquired from the online surveys and analysis. Secondary information was acquired particularly from books, articles, and journals. The sources were only included if they addressed the issue of cyber threat in the global context. The collection methods mainly depended on random sampling in order to eliminate any cases of biases which would, in turn, affect the dependability and accuracy of the study. Information was acquired, summarized and then assessed in order to form a uniform study pattern that supports the research objective. On the other hand, online surveys were examined to offer primary data to support the raised claims for genuineness.

Data Analysis

Content analysis was the utilized approach for evaluating information gathered from secondary sources. This refers to the mode of study where the acquire information is classified in regard to concepts to permit the development of firm grounds (Tavakoli, 2013). This approach is beneficial because it assists in the simplification and mini minimization of the gathered data. The approach is an objective one but prone to human mistakes (Tavakoli, 2013).

Research Limitations and Ethical Considerations

The primary limitation of this study was time and information analysis challenge because the subject of cybercrime has been largely discussed thus requiring more analyzing time on the large content. Since the study handles a sensitive issue regarding national and foreign security confidentiality was upheld.

Conclusion

It is apparent from the analysis above that today’s cyber-security terrorizations are severely harmful to the nations and international security. The primary issue is that technology is progressing rather fast on everyday basis thus creating more sophisticated fresh ways for terrorists and hackers for getting through cyber-security. An attack on confidential data regarding a country can offer unauthorized information acquisition thus threatening the safety of a nation in general. Equally, internet users create cyber-security intimidations solely based on the information shared on the sites. It is particularly challenging to determine the motives of the internet users which is threatening the existence of every individual. It is based on such challenges that it becomes necessary for any administration to apply all that is in its exposure to create harmless cyberspaces for every individual. It is essential to create mutual objectives globally in regard to cyber threats reduction based on the reliant nature of communication systems and economies globally.

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1-6.

Byres, E., & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.

Ericsson, G. N. (2010). Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507.

Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 585-590). IEEE.

Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847.

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., & Sinopoli, B. (2012). Cyber–physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195-209.

Probst, C. W., Hunker, J., Gollmann, D., & Bishop, M. (2010). Aspects of insider threats. In Insider Threats in Cyber Security (pp. 1-15). Springer US.

Rowe, D. C., Lunt, B. M., & Ekstrom, J. J. (2011). The role of cyber-security in information technology education. In Proceedings of the 2011 conference on Information technology education (pp. 113-122). ACM.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & security, 38, 97-102.

Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.

Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber-attacks. In Innovative Smart Grid Technologies (ISGT), 2010 (pp. 1-7). IEEE.

Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials.

Probst, C. W. (2010). Insider threats in cyber security. New York: Springer.

Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Enterprise cyber-security: How to build a successful cyberdefense program against advanced threats.

Tavakoli, H. (2013). A dictionary of research methodology and statistics in applied linguistics. Tehran: Rahnamā.

Lim, W. M. (2013). Research methodology: A toolkit of sampling and data analysis techniques for quantitative research. Place of publication not identified: Grin Verlag.

 

 

 

 

 

 

 

3087 Words  11 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...