Cyber Security Challenges and Wayforward for Developing Countries

被引:0
作者
Zareen, Muhammad Sharjeel [1 ]
Akhlaq, Monis [1 ]
Tariq, Muhammad [1 ]
Khalid, Umar [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
来源
2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA) | 2013年
关键词
cyber security framework; cyber threats; computer security incident response team; computer emergency response team; cyber security strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Twenty first century has seen a new dimension of warfare; the cyber warfare. Developed countries have started exploiting the vulnerabilities of cyberspace to gain supremacy and influence over the rivals and over countries. Projects like PRISM and Boundless Information and malwares like Stuxnet and Disttrack have surprised the world by revealing how the cyberspace is being exploited by developed countries. Reliance of developing countries on a reliable and secure cyberspace do not match with that of western world but still few of their critical organizations like national, military and private sector hold significant share in cyberspace. Mostly, these developing countries rely on the products developed by western world. The dependency has inherent vulnerabilities and opportunities which place their critical organizations vulnerable to cyber exploitation. This research focuses on the cyber security challenges foreseen by the developing countries, specifically the threats crafted to avoid conventional security measures, by adversaries who have attained credible technical advancement. Finally, the solution is proposed for the developing countries to tackle the issue administratively, and organizationally.
引用
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
[21]   Australia’s cyber security reform—an update [J].
Dan Jerker B. Svantesson .
International Cybersecurity Law Review, 2023, 4 (3) :347-350
[22]   Cyber-Security Threats Origins and their Analysis [J].
Cerget, Maros ;
Hudec, Jan .
ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) :23-41
[23]   Leadership for Cyber Security in Public-Private Relations [J].
Kuusisto, Tuija ;
Kuusisto, Rauno .
PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, :173-181
[24]   Cyber Security Awareness, Knowledge and Behavior: A Comparative Study [J].
Zwilling, Moti ;
Klien, Galit ;
Lesjak, Dusan ;
Wiechetek, Lukasz ;
Cetin, Fatih ;
Basim, Hamdullah Nejat .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (01) :82-97
[25]   Cyber Security Threats in Russia in the Context of Digital Economy [J].
Vavilina, Alla Vladimirovna ;
Manakhova, Irina Viktorovna ;
Shcherbakova, Natalia Sergeevna .
EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, :10431-10444
[26]   PRECONDITIONS OF SUSTAINABLE ECOSYSTEM: CYBER SECURITY POLICY AND STRATEGIES [J].
Stitilis, Darius ;
Pakutinskas, Paulis ;
Malinauskaite, Inga .
ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, 2016, 4 (02) :174-182
[27]   CYBER (IN)SECURITY OF PERSONAL DATA AND INFORMATION IN TIMES OF DIGITIZATION [J].
Dvojmoc, Miha ;
Verboten, Mojca Tancer .
MEDICINE LAW & SOCIETY, 2022, 15 (02) :287-304
[28]   A FRAMEWORK FOR CYBER SECURITY AREAS EVALUATION IN FINANCIAL SECTOR [J].
Gavenaite-Sirvydiene, Julija ;
Miecinskiene, Algita .
TRANSFORMATIONS IN BUSINESS & ECONOMICS, 2023, 22 (03)
[29]   Strategic Cyber-Security Perspective in Smart Grids [J].
Canbek, Gurol ;
Sagiroglu, Seref .
2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, :178-183
[30]   Cyber Security Threats to IoT Applications and Service Domains [J].
Samuel Tweneboah-Koduah ;
Knud Erik Skouby ;
Reza Tadayoni .
Wireless Personal Communications, 2017, 95 :169-185