Cyber Security Challenges and Wayforward for Developing Countries

被引:0
作者
Zareen, Muhammad Sharjeel [1 ]
Akhlaq, Monis [1 ]
Tariq, Muhammad [1 ]
Khalid, Umar [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
来源
2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA) | 2013年
关键词
cyber security framework; cyber threats; computer security incident response team; computer emergency response team; cyber security strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Twenty first century has seen a new dimension of warfare; the cyber warfare. Developed countries have started exploiting the vulnerabilities of cyberspace to gain supremacy and influence over the rivals and over countries. Projects like PRISM and Boundless Information and malwares like Stuxnet and Disttrack have surprised the world by revealing how the cyberspace is being exploited by developed countries. Reliance of developing countries on a reliable and secure cyberspace do not match with that of western world but still few of their critical organizations like national, military and private sector hold significant share in cyberspace. Mostly, these developing countries rely on the products developed by western world. The dependency has inherent vulnerabilities and opportunities which place their critical organizations vulnerable to cyber exploitation. This research focuses on the cyber security challenges foreseen by the developing countries, specifically the threats crafted to avoid conventional security measures, by adversaries who have attained credible technical advancement. Finally, the solution is proposed for the developing countries to tackle the issue administratively, and organizationally.
引用
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
[31]   Cyber Security Threats to IoT Applications and Service Domains [J].
Samuel Tweneboah-Koduah ;
Knud Erik Skouby ;
Reza Tadayoni .
Wireless Personal Communications, 2017, 95 :169-185
[32]   Cyber Warfare and National Security Modernizing Defense Strategies in the Context of China's Evolving Cyber Influence [J].
Khoirunnisa, Khoirunnisa ;
Indrawati ;
Ambarwati ;
Rahmadan, Yanuar ;
Jubaidi, Didi .
CHINA QUARTERLY OF INTERNATIONAL STRATEGIC STUDIES, 2025, 11 (01) :1-20
[33]   Cyber Security Framework for Vehicular Network Based on a Hierarchical Game [J].
Sedjelmaci, Hichem ;
Brahmi, Imane Horiya ;
Ansari, Nirwan ;
Rehmani, Mubashir Husain .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) :429-440
[34]   Sustainability as a Criterion for Information Security in Cyber-Physical Systems [J].
Zegzhda, D. P. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) :813-819
[35]   Cyber Physical Systems, a New Challenge and Security Issue for the Aviation [J].
Alrefaei, Faisal ;
Alzahrani, Abdullah ;
Song, Houbing ;
Zohdy, Mohamed ;
Alrefaei, Salma .
2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, :1105-1109
[36]   A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions [J].
Aslan, Omer ;
Aktug, Semih Serkant ;
Ozkan-Okay, Merve ;
Yilmaz, Abdullah Asim ;
Akin, Erdal .
ELECTRONICS, 2023, 12 (06)
[37]   Cyber Security Awareness Initiatives in South Africa: A Synergy Approach [J].
Dlamini, Zama ;
Modise, Mapule .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, :98-107
[38]   National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis [J].
Osho, Oluwafemi ;
Onoja, Agada D. .
INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2015, 9 (01) :120-143
[39]   Problems of Security in Digital Production and Its Resistance to Cyber Threats [J].
Vasil'ev, Yu. S. ;
Zegzhda, D. P. ;
Poltavtseva, M. A. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) :1090-1100
[40]   Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges [J].
Parkinson, Simon ;
Ward, Paul ;
Wilson, Kyle ;
Miller, Jonathan .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (11) :2898-2915