Cyber Security Has Become Critical For National Security

Dependence on Information and Communications Technology (ICT) is a defining feature of a modern, interconnected and knowledge-based economy. The stability, safety and resiliency of any country's ICT  is a national security issue, as the vulnerabilities of the cyberspace can be exploited to impair or destroy the critical infrastructures of a state, highly reliant on its communications networks and services.

Reliable ICT networks are critical infrastructures and are crucial in ensuring public welfare, economic stability, law enforcement and defence operations. Societies increasingly depend on public ICT networks and their services. 

Many governments have given cyber security a high designation relative to national security. Theses critical infrastructures comprise the physical, non-physical and cyber resources or services that are fundamental to the minimum functioning of a society and its economy. Today, nobody can doubt the importance of cybersecurity.

Background

The Internet was first developed as part of a country’s national defence project and it has its origin in the efforts to build and interconnect computer networks. This arose from research and development in the US and involved international collaboration. Now usage of the same technology has become a significant part of our everyday life.

National security is a broader all-encompassing term most commonly embodying the military aspects and understood as such; it also intersects with economic and financial security, health security, among others. Critical national infrastructure (including sensitive government and public assets and installations) are all connected through the Internet and have  become increasingly susceptible to predatory cyber attacks. Cyber security has become an integral part of national security.

​What Is Milliary Cyber Security?

Apart from the obvious cyber component of military hardware and weaponry, a cyber battlefield could involve the following: 

  • Intelligence collection by way of exploitation of captured digital media, exploration of data feeds of adversaries’ unmanned aerial systems (UAVs) and securing operational friendly UAVs. 
  • Accessing closed networks in or near the area of operations, using electronic warfare systems as delivery platforms for precision attacks.
  • Conducting cyberspace intelligence, surveillance, and reconnaissance (ISR) operations and launching offensive social media operations, among others.

India Vs. China

India has been described as one of the most frequently attacked nations and China is often attributed as the source of cyber attack and online espionage. In recent years, the Chinese have devised ingenious ways of making inroads into the cyber systems containing Indian users’ data. Now, instead of Chinese companies directly attempting to steal Indian user data, several Chinese state-backed businesses are effectively doing the same thing by way of making huge investments into Indian companies. 

Chinese companies are making investments selectively into large firms with enormous consumer traction which would allow them access to vast amounts of data on Indian users. Therefore, an investment or a partnership with Indian companies gives them ready access to this data which is sent to servers in China for further misuse and manipulation. 

The Chinese military could potentially use that data to map Indian people’s habits, movements, networks and locations that relate to key public and private installations in major cities, strategic towns and resource centres. 

Given that information, misinformation, disinformation and propaganda are tools of modern war, such prior information advantage could add to the Chinese firepower in the eventuality of a real war between the two countries.

Future Challenges 

The need for an integrated single point of command which can promulgate common standards and protocols. In particular, there is a need for a centralised command to have oversight and to coordinate and synchronise efforts to handle larger cyber security issues. 

Furthermore, a trusted partnership between the government and the private cyber community and experts needs to be developed. The private sector, needs to reshape their cyber defence framework also constrain their sharing of information with government agencies in case of a breach. From a government standpoint, sharing of information would potentially compromise intelligence sources and methods.  A healthy collaboration between the government and the private must show the way forward.

AFCEA:           Springer:         Entrepreneur:         DCSI:        Symantec

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« Donald Trump Had His Twitter Account Hacked
A ‘FunnyDream’ From China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.