Cyber Security Has Become Critical For National Security

Dependence on Information and Communications Technology (ICT) is a defining feature of a modern, interconnected and knowledge-based economy. The stability, safety and resiliency of any country's ICT  is a national security issue, as the vulnerabilities of the cyberspace can be exploited to impair or destroy the critical infrastructures of a state, highly reliant on its communications networks and services.

Reliable ICT networks are critical infrastructures and are crucial in ensuring public welfare, economic stability, law enforcement and defence operations. Societies increasingly depend on public ICT networks and their services. 

Many governments have given cyber security a high designation relative to national security. Theses critical infrastructures comprise the physical, non-physical and cyber resources or services that are fundamental to the minimum functioning of a society and its economy. Today, nobody can doubt the importance of cybersecurity.

Background

The Internet was first developed as part of a country’s national defence project and it has its origin in the efforts to build and interconnect computer networks. This arose from research and development in the US and involved international collaboration. Now usage of the same technology has become a significant part of our everyday life.

National security is a broader all-encompassing term most commonly embodying the military aspects and understood as such; it also intersects with economic and financial security, health security, among others. Critical national infrastructure (including sensitive government and public assets and installations) are all connected through the Internet and have  become increasingly susceptible to predatory cyber attacks. Cyber security has become an integral part of national security.

​What Is Milliary Cyber Security?

Apart from the obvious cyber component of military hardware and weaponry, a cyber battlefield could involve the following: 

  • Intelligence collection by way of exploitation of captured digital media, exploration of data feeds of adversaries’ unmanned aerial systems (UAVs) and securing operational friendly UAVs. 
  • Accessing closed networks in or near the area of operations, using electronic warfare systems as delivery platforms for precision attacks.
  • Conducting cyberspace intelligence, surveillance, and reconnaissance (ISR) operations and launching offensive social media operations, among others.

India Vs. China

India has been described as one of the most frequently attacked nations and China is often attributed as the source of cyber attack and online espionage. In recent years, the Chinese have devised ingenious ways of making inroads into the cyber systems containing Indian users’ data. Now, instead of Chinese companies directly attempting to steal Indian user data, several Chinese state-backed businesses are effectively doing the same thing by way of making huge investments into Indian companies. 

Chinese companies are making investments selectively into large firms with enormous consumer traction which would allow them access to vast amounts of data on Indian users. Therefore, an investment or a partnership with Indian companies gives them ready access to this data which is sent to servers in China for further misuse and manipulation. 

The Chinese military could potentially use that data to map Indian people’s habits, movements, networks and locations that relate to key public and private installations in major cities, strategic towns and resource centres. 

Given that information, misinformation, disinformation and propaganda are tools of modern war, such prior information advantage could add to the Chinese firepower in the eventuality of a real war between the two countries.

Future Challenges 

The need for an integrated single point of command which can promulgate common standards and protocols. In particular, there is a need for a centralised command to have oversight and to coordinate and synchronise efforts to handle larger cyber security issues. 

Furthermore, a trusted partnership between the government and the private cyber community and experts needs to be developed. The private sector, needs to reshape their cyber defence framework also constrain their sharing of information with government agencies in case of a breach. From a government standpoint, sharing of information would potentially compromise intelligence sources and methods.  A healthy collaboration between the government and the private must show the way forward.

AFCEA:           Springer:         Entrepreneur:         DCSI:        Symantec

You Might Also Read: 

The Emerging Domain Of  Cyber War:

 

« Donald Trump Had His Twitter Account Hacked
A ‘FunnyDream’ From China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Valeo Nertworks

Valeo Nertworks

Valeo Nertworks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.

RedArx Cyber Group

RedArx Cyber Group

At RedArx Cyber Group, our vision is to empower businesses with cutting-edge, proactive security solutions that safeguard their digital landscapes.