The improvements that have been made in
information technology have led to the creation of new dangers for the national
security of several different countries. For the most part of military history,
there has been a huge power disparity between the two opposing sides. This has
been the case throughout the annals. This unequal allocation of resources might
have been caused by a variety of circumstances, including economic conditions,
advances in technology, or even just the disparities in the sizes of the
parties involved. The modern battlefield is increasingly shifting its emphasis
to one that is focused on information operations. In this particular arena, all
of the warriors are making use of the same kind of armament, which consists of
computers. These days, computers and network connections are what make up cyberspace,
and it serves as a battlefield for a war that is still going on. The legal
context in which this war will take place is currently being shaped by
international law, and its framework is still being formed. This conflict is
not just about collecting or protecting confidential material; it is also about
preserving the critical infrastructures and institutions that are responsible
for the preservation of domestic security and the economy. The stakes could not
possibly be any higher. The presentations that are going to take place today
are going to situate the work of defending our important infrastructures within
the context of the role that cyber security plays and the influence that it has
on economic security. This will take place in the context of the presentations
that are going to take place today.
References
[1]
McAfee (2020) The Economic Impact of Cybercrime and Cyber Espionage—Amazon Web Services, The Economic Impact of Cybercrime and Cyber Espionage.
https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/60396rpt_cybercrime-cost_0713_ph4.pdf
[2]
McAfee & Center for Strategic & International Studies (CSIS) (2018) The Economic Impact of Cybercrime—No Slowing Down: Economic Impact of Cybersecurity II.
https://www.mcafee.com/enterprise/en-us/assets/reports/rp-economic-impact-cybercrime.pdf
[3]
Wired UK (2017) NotPetya Malware Attack Cost TNT $300m in Lost Revenues Alone. https://www.wired.co.uk/article/notpetya-cyberattack-tnt-revenues
[4]
Fruhlinger, J. (2020) The OPM Hack Explained: Bad Security Practices Meet China’s Captain America. CSO Online.
https://www.csoonline.com/article/566509/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html
[5]
Lukic, D. (2020, September 22) Target Data Breach, How Target Almost Lost Everything. Data Breaches.
https://www.idstrong.com/sentinel/that-one-time-target-lost-everything/
[6]
Kamalnath, V., Lerner, L., Moon, J., Sari, G., Sohoni, V. and Zhang, S. (2023, December 5) Capturing the Full Value of Generative AI in Banking. McKinsey & Company. https://www.mckinsey.com/industries/financial-services/our-insights/capturing-the-full-value-of-generative-ai-in-banking
[7]
Katrakazas, C., et al. (2020) Cyber Security and Its Impact on CAV Safety: Overview, Policy Needs and Challenges. Advances in Transport Policy and Planning, 5, 73-94. https://doi.org/10.1016/bs.atpp.2020.05.001
[8]
Cavelty, D.M. and Wenger, A. (2022) Cyber Security Politics. Routledge, London & New York, Vol. 12, 141-160.
[9]
Cheng, S., Zhao, G., Gao, M., Shi, Y., Huang, M. and Marefati, M. (2021) A New Hybrid Solar Photovoltaic/Phosphoric Acid Fuel Cell and Energy Storage System; Energy and Exergy Performance. International Journal of Hydrogen Energy, 46, 8048-8066. https://doi.org/10.1016/j.ijhydene.2020.11.282
[10]
Quigley, K., Burns, C. and Stallard, K. (2015) “Cyber Gurus”: A Rhetorical Analysis of the Language of Cybersecurity Specialists and the Implications for Security Policy and Critical Infrastructure Protection. Government Information Quarterly, 32, 108-117. https://doi.org/10.1016/j.giq.2015.02.001
[11]
Alghamdi, M.I. (2021) Determining the Impact of Cyber Security Awareness on Employee Behaviour: A Case of Saudi Arabia. Materials Today: Proceedings, p. 122.
https://doi.org/10.1016/j.matpr.2021.04.093
[12]
Accenture (2020) Cost of Cybercrime Study: Insights on the Evolving Threat Landscape and Cost to Business.
https://www.accenture.com/_acnmedia/PDF-112/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf