Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-l7hp2 Total loading time: 0 Render date: 2024-12-03T10:10:05.839Z Has data issue: false hasContentIssue false

10 - Cyber Security

Published online by Cambridge University Press:  21 October 2015

Nur Azha Putra
Affiliation:
National University of Singapore
Kevin Punzalan
Affiliation:
Nanyang Technological University, Singapore
Get access

Summary

The cyber-attacks on South Korea and the United States, as well as those on Georgia in 2008 and Estonia in 2007 have awakened a certain consciousness in the minds of the international community, particularly that of the security community. As if triggered by a sense of vulnerability, when these cyber-attacks managed to disrupt normal services, states were hard pressed to extend national security policies to the realm of cyberspace especially those with highly developed information and communication technology structures. This chapter traces the securitization of cyberspace and ponders its implications for human security.

The secretary-general of the United Nation's (UN) International Telecommunication Union (ITU), Dr Hamadoun Toure, warned that the next world war could take place in cyberspace. Speaking to stakeholders from across all sectors including heads of state, Dr Toure called for global cooperation across all industries and sectors to provide cyber security which includes the protection of children, businesses and governments. He stressed that cyber security could only be achieved within an international global framework comprising countries who are committed towards protecting their citizens and privacy. “The next world war could happen in cyberspace and that would be a catastrophe. We have to make sure that all countries understand that in that war, there is no such thing as a superpower”, said Dr Toure.

Although Dr Toure's remarks seem alarming, he is not alone. The proliferation of cyber wars and cybercrimes have driven multilateral institutions such as the European Union (EU), North Atlantic Treaty Organization (NATO) and the Association of Southeast Asian Nations (ASEAN) as well as national governments such as the United States (U.S.), the United Kingdom (UK), Australia, Malaysia and Singapore towards securing their cyberspace.

Anti-cybercrime laws empower the national cyber security agencies with the legal mandate to protect the state's critical information and communications technology (ICT) networks and infrastructure, particularly from international cyber criminals and cyber terrorists. The initial phase of delivering ICT infrastructures which drove the transformation from the Industrial Society to the Information Society has now been coupled with efforts to secure cyberspace. ICT, which was initially meant to reduce the spatial dimension and enhance global communication, has now taken the added burden of national security and sovereignty.

Type
Chapter
Information
Non-Traditional Security in Asia
Issues, Challenges and Framework for Action
, pp. 267 - 289
Publisher: ISEAS–Yusof Ishak Institute
Print publication year: 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×