Cyber Security Challenges and Wayforward for Developing Countries

被引:0
作者
Zareen, Muhammad Sharjeel [1 ]
Akhlaq, Monis [1 ]
Tariq, Muhammad [1 ]
Khalid, Umar [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
来源
2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA) | 2013年
关键词
cyber security framework; cyber threats; computer security incident response team; computer emergency response team; cyber security strategy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Twenty first century has seen a new dimension of warfare; the cyber warfare. Developed countries have started exploiting the vulnerabilities of cyberspace to gain supremacy and influence over the rivals and over countries. Projects like PRISM and Boundless Information and malwares like Stuxnet and Disttrack have surprised the world by revealing how the cyberspace is being exploited by developed countries. Reliance of developing countries on a reliable and secure cyberspace do not match with that of western world but still few of their critical organizations like national, military and private sector hold significant share in cyberspace. Mostly, these developing countries rely on the products developed by western world. The dependency has inherent vulnerabilities and opportunities which place their critical organizations vulnerable to cyber exploitation. This research focuses on the cyber security challenges foreseen by the developing countries, specifically the threats crafted to avoid conventional security measures, by adversaries who have attained credible technical advancement. Finally, the solution is proposed for the developing countries to tackle the issue administratively, and organizationally.
引用
收藏
页码:7 / 14
页数:8
相关论文
共 50 条
[41]   Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach [J].
Al Mamun, Abdullah ;
Al Mamun, Md Abdullah ;
Shikfa, Abdullatif .
2018 INTERNATIONAL CONFERENCE OF ELECTRICAL AND ELECTRONIC TECHNOLOGIES FOR AUTOMOTIVE, 2018,
[42]   Assessment of Legal Challenges and Solutions to Cyber Threats in Hybrid Warfare [J].
Semenenko, Oleh ;
Nozdrachov, Oleksii ;
Dobrovolskyi, Uzef ;
Kliat, Yurii ;
Koverga, Viktoriia .
DEMOCRACY & SECURITY, 2025,
[43]   Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices [J].
Kumari, Swati ;
Tulshyan, Vatsal ;
Tewari, Hitesh .
INFORMATION, 2024, 15 (03)
[44]   A Comparative Analysis of Governance in Cyber Security Strategies of Australia and New Zealand [J].
Dori, Asaf U. ;
Thomas, Manoj A. .
PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS - PACIS 2021, 2021,
[45]   Electronic Healthcare Record and Cyber Security Threats: A Development of an Agile Framework [J].
Bouazzaoui, Sarah ;
Daniels, Charles .
PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, :67-71
[46]   Developing a Cyber Threat Intelligence sharing platform for South African Organisations [J].
Mutemwa, Muyowa ;
Mtsweni, Jabu ;
Mkhonto, Njabulo .
2017 CONFERENCE ON INFORMATION COMMUNICATION TECHNOLOGY AND SOCIETY (ICTAS), 2017,
[47]   Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains [J].
Sobb, Theresa May ;
Turnbull, Benjamin .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, :128-135
[48]   Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review [J].
Marican, Mohamed Noordin Yusuff ;
Abd Razak, Shukor ;
Selamat, Ali ;
Othman, Siti Hajar .
IEEE ACCESS, 2023, 11 :5442-5452
[49]   MetaHuman based phishing attacks in the metaverse realm: Awareness for cyber security education [J].
Manoharan, Agarsha ;
Sriskantharajah, Abiniah ;
Herath, H. M. K. K. M. B. ;
Guruge, L. G. P. K. ;
Yasakethu, S. L. P. .
EDUCATION AND INFORMATION TECHNOLOGIES, 2025, 30 (09) :12939-12965
[50]   The Affordability of Cybersecurity Costs in Developing Countries: A Systematic Review [J].
Uwaoma, Chinazunwa ;
Enkhtaivan, Ayush .
2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, :545-550