Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 11 - The Security Impacts of Globalisation - Coggle Diagram
Chapter 11 - The Security Impacts of Globalisation
Chapter 11.1:
Security Impacts of Globalisation
Transnational Terrorism
Terrorism is an act of terror that is carried out to intimidate pr put fear in others. These acts are rooted in certain ideologies
Example:
The attacks on 11 September 2001
Result:
Bombings can lead to severe injuries, deaths and destruction of properties. Economic costs are incurred as businesses are disrupted and destroyed buildings need to be rebuilt. Hate crimes can occur as people have feelings of distrust, disrupting harmony and destabilising the country
As a result of the advancements in technology from globalisation, terrorist groups can easily spread propaganda material through social media platforms, growing their manpower through radicalisation, attain funds to grow the organisation and also attain weaponry
Cyber Threats
Motives
Countries may launch cyberattacks to undermine other countries undermine other countries or organisations they deem as threats or take place in cyber espionage, enhancing their own security. This involves gathering military or political value
Organisations that carry out cyberattacks are usually criminals or terrorist organisations that employ sabotage to achieve their aims or steal trade secrets from businesses for profit or political reasons
Hackers may steal valuable information and sell it for profit or ransom or commit cyberattacks in the name of "justice" (hactivists)
Methods
Website defacement is a cyberattack that changes the appearance and content on the page of a website or a webpage. It can be used for falsehoods and mislead people
Phishing is the attempt to attain sensitive data such as bank account numbers and passwords, through fake emails or malicious links. The attacker usually pretends to be a lawful business or a trusted person
Malware infection refers to malicious software that affects the normal functioning of a computer. An example is ransomware, where all of the stolen sensitive information is held at the hackers' side until the ransom is paid
Chapter 11.2 - Responses to Security Impacts of Globalisation
Vigilance by individuals
One can spot the signs of one undergoing radicalisation with the victim showing extreme behaviour, expressing support for terrorist groups and uploading pro-terrorist materials.
Setting strong passwords with 2-factor authentication, not clicking on suspicious links, ignoring calls made by people not in the person's contact list and ignoring suspicious messages
Security measures by governments
Monitoring and surveillance infrastructure for stricter security checks, use of biometrics to verify identity (ICA of SG), setting up firewalls to prevent spread of propaganda and educating citizens on how they can remain vigilant to scams
Cooperation among countries
INTERPOL is an organisation that works with 195 member countries to improve world security