Cyber Security Has Become Critical For National Security

Dependence on Information and Communications Technology (ICT) is a defining feature of a modern, interconnected and knowledge-based economy. The stability, safety and resiliency of any country's ICT  is a national security issue, as the vulnerabilities of the cyberspace can be exploited to impair or destroy the critical infrastructures of a state, highly reliant on its communications networks and services.

Reliable ICT networks are critical infrastructures and are crucial in ensuring public welfare, economic stability, law enforcement and defence operations. Societies increasingly depend on public ICT networks and their services. 

Many governments have given cyber security a high designation relative to national security. Theses critical infrastructures comprise the physical, non-physical and cyber resources or services that are fundamental to the minimum functioning of a society and its economy. Today, nobody can doubt the importance of cybersecurity.

Background

The Internet was first developed as part of a country’s national defence project and it has its origin in the efforts to build and interconnect computer networks. This arose from research and development in the US and involved international collaboration. Now usage of the same technology has become a significant part of our everyday life.

National security is a broader all-encompassing term most commonly embodying the military aspects and understood as such; it also intersects with economic and financial security, health security, among others. Critical national infrastructure (including sensitive government and public assets and installations) are all connected through the Internet and have  become increasingly susceptible to predatory cyber attacks. Cyber security has become an integral part of national security.

​What Is Milliary Cyber Security?

Apart from the obvious cyber component of military hardware and weaponry, a cyber battlefield could involve the following: 

  • Intelligence collection by way of exploitation of captured digital media, exploration of data feeds of adversaries’ unmanned aerial systems (UAVs) and securing operational friendly UAVs. 
  • Accessing closed networks in or near the area of operations, using electronic warfare systems as delivery platforms for precision attacks.
  • Conducting cyberspace intelligence, surveillance, and reconnaissance (ISR) operations and launching offensive social media operations, among others.

India Vs. China

India has been described as one of the most frequently attacked nations and China is often attributed as the source of cyber attack and online espionage. In recent years, the Chinese have devised ingenious ways of making inroads into the cyber systems containing Indian users’ data. Now, instead of Chinese companies directly attempting to steal Indian user data, several Chinese state-backed businesses are effectively doing the same thing by way of making huge investments into Indian companies. 

Chinese companies are making investments selectively into large firms with enormous consumer traction which would allow them access to vast amounts of data on Indian users. Therefore, an investment or a partnership with Indian companies gives them ready access to this data which is sent to servers in China for further misuse and manipulation. 

The Chinese military could potentially use that data to map Indian people’s habits, movements, networks and locations that relate to key public and private installations in major cities, strategic towns and resource centres. 

Given that information, misinformation, disinformation and propaganda are tools of modern war, such prior information advantage could add to the Chinese firepower in the eventuality of a real war between the two countries.

Future Challenges 

The need for an integrated single point of command which can promulgate common standards and protocols. In particular, there is a need for a centralised command to have oversight and to coordinate and synchronise efforts to handle larger cyber security issues. 

Furthermore, a trusted partnership between the government and the private cyber community and experts needs to be developed. The private sector, needs to reshape their cyber defence framework also constrain their sharing of information with government agencies in case of a breach. From a government standpoint, sharing of information would potentially compromise intelligence sources and methods.  A healthy collaboration between the government and the private must show the way forward.

AFCEA:           Springer:         Entrepreneur:         DCSI:        Symantec

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« Donald Trump Had His Twitter Account Hacked
A ‘FunnyDream’ From China »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.

Maveris

Maveris

Maveris is an IT and cybersecurity company committed to helping organizations create secure digital solutions to accelerate their mission.