Cyber Security Has Become Critical For National Security

Dependence on Information and Communications Technology (ICT) is a defining feature of a modern, interconnected and knowledge-based economy. The stability, safety and resiliency of any country's ICT  is a national security issue, as the vulnerabilities of the cyberspace can be exploited to impair or destroy the critical infrastructures of a state, highly reliant on its communications networks and services.

Reliable ICT networks are critical infrastructures and are crucial in ensuring public welfare, economic stability, law enforcement and defence operations. Societies increasingly depend on public ICT networks and their services. 

Many governments have given cyber security a high designation relative to national security. Theses critical infrastructures comprise the physical, non-physical and cyber resources or services that are fundamental to the minimum functioning of a society and its economy. Today, nobody can doubt the importance of cybersecurity.

Background

The Internet was first developed as part of a country’s national defence project and it has its origin in the efforts to build and interconnect computer networks. This arose from research and development in the US and involved international collaboration. Now usage of the same technology has become a significant part of our everyday life.

National security is a broader all-encompassing term most commonly embodying the military aspects and understood as such; it also intersects with economic and financial security, health security, among others. Critical national infrastructure (including sensitive government and public assets and installations) are all connected through the Internet and have  become increasingly susceptible to predatory cyber attacks. Cyber security has become an integral part of national security.

​What Is Milliary Cyber Security?

Apart from the obvious cyber component of military hardware and weaponry, a cyber battlefield could involve the following: 

  • Intelligence collection by way of exploitation of captured digital media, exploration of data feeds of adversaries’ unmanned aerial systems (UAVs) and securing operational friendly UAVs. 
  • Accessing closed networks in or near the area of operations, using electronic warfare systems as delivery platforms for precision attacks.
  • Conducting cyberspace intelligence, surveillance, and reconnaissance (ISR) operations and launching offensive social media operations, among others.

India Vs. China

India has been described as one of the most frequently attacked nations and China is often attributed as the source of cyber attack and online espionage. In recent years, the Chinese have devised ingenious ways of making inroads into the cyber systems containing Indian users’ data. Now, instead of Chinese companies directly attempting to steal Indian user data, several Chinese state-backed businesses are effectively doing the same thing by way of making huge investments into Indian companies. 

Chinese companies are making investments selectively into large firms with enormous consumer traction which would allow them access to vast amounts of data on Indian users. Therefore, an investment or a partnership with Indian companies gives them ready access to this data which is sent to servers in China for further misuse and manipulation. 

The Chinese military could potentially use that data to map Indian people’s habits, movements, networks and locations that relate to key public and private installations in major cities, strategic towns and resource centres. 

Given that information, misinformation, disinformation and propaganda are tools of modern war, such prior information advantage could add to the Chinese firepower in the eventuality of a real war between the two countries.

Future Challenges 

The need for an integrated single point of command which can promulgate common standards and protocols. In particular, there is a need for a centralised command to have oversight and to coordinate and synchronise efforts to handle larger cyber security issues. 

Furthermore, a trusted partnership between the government and the private cyber community and experts needs to be developed. The private sector, needs to reshape their cyber defence framework also constrain their sharing of information with government agencies in case of a breach. From a government standpoint, sharing of information would potentially compromise intelligence sources and methods.  A healthy collaboration between the government and the private must show the way forward.

AFCEA:           Springer:         Entrepreneur:         DCSI:        Symantec

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« Donald Trump Had His Twitter Account Hacked
A ‘FunnyDream’ From China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

SecuLution

SecuLution

SecuLution is an Antivirus product using Application Whitelisting which offers much more protection than Virus Scanners ever can.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.