Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chap 11: how can we respond to the security impacts of globalisation?…
Chap 11: how can we respond to the security impacts of globalisation? cybersecurity
cyberspace
borderless
-exchange of ideas and info at a rapid pace, access to any kind of info that is in digital format, that includes private info
difficult to manage or control
-no nation state has full control/jurisdiction over cyberspace
-hence it is difficult to monitor and enforce rules in the whole of cyberspace
lawless
-ppl can put all kinds of claims or hoaxes
-diff to recognise facts
since anyone can post anything, one requires skill, effort and time to verify the facts. it will take time and verification before any kind of falsehood can be discovered, hence it is used by all kinds of criminals
cyber threats
-cyber threats refer to unauthorised access to online info systems and data -with advancements in digital technology, many of our daily activities are carried out online and improvements in technology have also made it easier for ppl to access and store info online
-this digital connectedness means the cybersecurity becomes an impt concern for countries, organisations and indivs
types of cyberattacks
a) website defacement
-cyberattack that changes the appearance and/or content of a website/webpage
-can be used to spread falsehoods and mislead ppl
b) phishing
-attempt to acquire sensitive data, such as bank acc numbers and passwords through fake emails or malicious links
-the attacker usually pretends to be a lawful business or trusted person
c) malware
-malware infection refers malicious software that affects the normal functioning of computers and their systems
-can also be referred to as computer virus such as ransomware
cyberattacks: actors and motives
-can be carried out by countries, organisations or indivs but at the same time, countries, organisations or indivs can also be the victims of cyberattacks
a) countries -launch cyberattacks to undermine other countries or organisations that they regard as threats
-engage in cyber espionage or spying to enhance their own security
-this involves gathering info of political or military value
b) organisations
-organisations that carried out cyberattacks are usually criminal or terrorist organisations that employ sabotage to achieve their aims
-businesses that try to steal trade secrets from competitors for profit or political reasons
c) hackers(indivs who launch)
-steal valuable info and sell it for profit or hold it for ransom
-commit cyberattacks in the name of perceived justice as so called 'hacktivist'
impacts:
-the more reliant actors are on digital info systems and connectivity, the more exposed they will be to cyber threats
-actors who are less familiar with digital technology may also be more vulnerable to cybercrimes
use of digital technology: threats vs oppo
oppo:
-ppl take advantage of digital technology to enjoy greater convenience in economic activities
-advanced countries and larger organisations may have more resources and expertise to develop responses to cyber threats
threats:
-certain population grps, such as the elderly may be targets of cybercrimes as they are perceived as easier prey since they may not be aware of ways to keep themselves safe online
-govt, organisations and indivs in advanced countries faced a higher risk of cyber threats as a greater proportion of their activities are conducted online
response to security impacts of cyberthreats
a) indivs -while indivs may not be cybersecurity experts, there are simple actions that they can take to protect themselves online
-collectively, they contribute to the security of Sg;s cyber landscape
b) countries - countries can set up dedicated agencies with the expertise and resources needed to investigate and handle cyberthreats
-Sg has set up Cyber Security Agency was established in 2015 as the national agency to oversee and coordinate all aspects of cybersecurity for the nation
-this is reflected in the Sg cybersecurity strategy 2021 document and this plan outlines Sg's plan to protect its cyberspace
cybersecurity strategy 2021
resilient infrastructure
-protect Sg's critical info infrastructure through strengthening security and resilience of our digital systems and networks that support the delivery of essential systems
safer cyberspace
-raising the general level of cybersecurity for businesses and indivs through security our core digital infrastructure and driving outreach programmes
international cyber cooperation
-contribute to international efforts to fight cross-border cyber threats
cybersecurity ecosystem
-innovating solutions for national cybersecurity
cyber talent pipeline
-developing and sustaining a strong cybersecurity workforce to meet our security and economic needs
c) cooperation among countries -countries can cooperate with one another to counter cyberthreats as many cybercrimes today can originate beyond a country's borders
-for eg, officers from Sg, malaysia and hk took part in a joint operation to crack down on a criminal involved in almost $20 mil worth of internet love scams
-the Asia Pacific Computer Emergency Response Team is an organisation in the Asia Pacific region that promotes regional cooperation on info security
-it alsi facilitates sharing on cyber threat data among countries in the region
-maintains a network of cybersecurity experts that helps to improve the region's awareness and competency in responding to cybersecurity challenged