Cyber Security Challenges and Wayforward for Developing Countries

被引:0
|
作者
Zareen, Muhammad Sharjeel [1 ]
Akhlaq, Monis [1 ]
Tariq, Muhammad [1 ]
Khalid, Umar [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
来源
2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA) | 2013年
关键词
cyber security framework; cyber threats; computer security incident response team; computer emergency response team; cyber security strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Twenty first century has seen a new dimension of warfare; the cyber warfare. Developed countries have started exploiting the vulnerabilities of cyberspace to gain supremacy and influence over the rivals and over countries. Projects like PRISM and Boundless Information and malwares like Stuxnet and Disttrack have surprised the world by revealing how the cyberspace is being exploited by developed countries. Reliance of developing countries on a reliable and secure cyberspace do not match with that of western world but still few of their critical organizations like national, military and private sector hold significant share in cyberspace. Mostly, these developing countries rely on the products developed by western world. The dependency has inherent vulnerabilities and opportunities which place their critical organizations vulnerable to cyber exploitation. This research focuses on the cyber security challenges foreseen by the developing countries, specifically the threats crafted to avoid conventional security measures, by adversaries who have attained credible technical advancement. Finally, the solution is proposed for the developing countries to tackle the issue administratively, and organizationally.
引用
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
  • [1] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [2] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [3] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114
  • [4] Developing a Cyber Security Awareness Master Plan in Malaysia: A Focus Group Discussion Approach
    Yunos, Zahri
    Ab Hamid, Ramona Susanty
    Ahmad, Mustaffa
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 1, 2015, 10 : 164 - 168
  • [5] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [6] Aviation cyber security: legal aspects of cyber threats
    Michal Klenka
    Journal of Transportation Security, 2021, 14 : 177 - 195
  • [7] Aviation and Cyber security threats
    Lehto, Martti
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [8] Introducing the Six-Ware Cyber Security Framework Concept to Enhancing Cyber Security Environment
    Gultom, Rudy
    Midhio, Wayan
    Silitonga, T.
    Pudjiatmoko, S.
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 262 - 271
  • [9] Blueprint for Cyber Security Zone Modeling
    Gontarczyk, Andrew
    McMillan, Phil
    Pavlovski, Chris
    INFORMATION TECHNOLOGY IN INDUSTRY, 2015, 3 (02): : 38 - 45
  • [10] The Science of Social Cyber-Security
    Carley, Kathleen
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 459 - 459