Research Article | Open Access | Download Full Text
Volume 2 | Issue 2 | Year 2024 | Article Id: CYS-V2I2P103 DOI: https://doi.org/10.59232/CYS-V2I2P103
Navigating the Cyber Abyss: Safeguarding National Security in an Interconnected World
Samadrito Mukherjee, Chitra BT
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 08 Apr 2024 | 11 May 2024 | 01 Jun 2024 | 12 Jun 2024 |
Citation
Samadrito Mukherjee, Chitra BT. “Navigating the Cyber Abyss: Safeguarding National Security in an Interconnected World.” DS Journal of Cyber Security, vol. 2, no. 2, pp. 20-31, 2024.
Abstract
Keywords
Cybersecurity, National security, Inter-connected world, Cyber threats, Cyber governance, Policy recommendations.
References
[1]Pavel Polityuk, Oleg Vukmanovic, and Stephen Jewkes, Ukraine Power Outage Confirmed as Cyber Attack, Reuters, 2017. [Online]. Available: https://www.reuters.com/article/idUSKBN1521BB/
[2]Black Energy APT Attacks against Ukrainian Power Industry, ESET. [Online]. Available: https://www.welivesecurity.com/wp-content/uploads/2016/01/eset-blackenergy.pdf
[3]Cybersecurity & Infrastructure Security Agency (CISA), Indicators Associated With WannaCry Ransomware, 2018. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA17-132A
[4]Kaspersky, What is WannaCry ransomware?. [Online]. Available: https://www.kaspersky.com/resource-center/threats/ransomware-wannacry
[5]Symantec Security Response, What you need to know about the WannaCry Ransomware?, 2017. [Online]. Available: https://www.symantec.com/blogs/feature-stories/wannacry-ransomware-attack
[6]Symantec Security Response, Stuxnet: Anatomy of a Computer Virus. [Online]. Available: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
[7]Kaspersky, Stuxnet: Dissecting a Cyberwarfare Weapon. [Online]. Available: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07154753/KL_Stuxnet_Dossier_final.pdf
[8]The New Yorker, Stuxnet and the Future of Cyber War. [Online]. Available: https://www.newyorker.com/magazine/2011/11/21/cyber-sabotage
[9]Mandiant, The Sony Pictures Hack - A Case Study in the Need for Appropriate Cybersecurity Defences, [Online]. Available: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-sony-pictures-hack.pdf
[10]RAND Corporation, Sony Hack: A Case Study on Security & Privacy. [Online]. Available: https://www.rand.org/pubs/research_reports/RR1751.html
[11] Bloomberg, Inside the Hack of Sony Pictures. [Online]. Available: https://www.bloomberg.com/features/2016-sony-hack/
[12]Manish Gupta, and Sandeep Shukla, Indian Cyber Security Landscape: A Comprehensive Study of Emerging Threats and Mitigation Strategies.
[13]Ron Deibert “The Geopolitics of Cyberspace after Snowden,” Current History, vol. 114, no. 768, pp. 9-15, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[14]Marsh, and McLennan, World Economic Forum, The Global Cyber Risk Perception Survey, 2021.
[15]Shriti Sharma, Securing India’s Digital Future: Cybersecurity Urgency and Opportunities, The Diplomat, 2024. [Online]. Available: https://thediplomat.com/2024/01/securing-indias-digital-future-cybersecurity-urgency-and-opportunities/
[16]C. Arunkumar, and P. Sakthivel, “Challenges to National Security in India,” World Affairs: The Journal of International Issues, vol. 21, no. 1, pp. 114-121, 2017.
[17]National Cybersecurity Strategy, The White House, Washington, 2023. [Online]. Available: https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
[18]Cyber Warfare and National Security Challenges, Members’ Reference Service Larrdis Lok Sabha Secretariat, New Delhi, India, 2017. [Online]. Available: https://loksabhadocs.nic.in/Refinput/New_Reference_Notes/English/Cyber_Warfare_and_National_Security_Challenges.pdf
[19]Alık Naha, “Emerging Cyber Security Threats: India’s Concerns and Options,” International Journal of Politics and Security, vol. 4, no. 1, pp. 170-200, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20]Sushma Devi, “Cyber Security in the National Security Discourse,” World Affairs: The Journal of International Issues, vol. 23, no. 2, pp. 146-159, 2019.
[Google Scholar] [Publisher Link]
[21]B. Poornima, “Cyber Preparedness of the Indian Armed Forces,” Journal of Asian Security and International Affairs, vol. 10, no. 3, pp. 301-324, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22]India’s Cybersecurity Challenge: Threats and Strategies, Daily Updates, 2023. [Online]. Available: https://www.drishtiias.com/daily-updates/daily-news-editorials/india-s-cybersecurity-challenge-threats-and-strategies
[23]Kyle Chin, Top Cybersecurity Regulations in India, UpGuard, 2024. [Online]. Available: https://www.upguard.com/blog/cybersecurity-regulations-india
[24]Amit Kumar, As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying, Security Intelligence, 2016. [Online]. Available: https://securityintelligence.com/as-india-gears-up-for-cybersecurity-challenges-threats-are-multiplying/
[25]National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 2018. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
[26]S. Park, and S. Seo, “Resource Constraints in Implementing Cybersecurity Measures in Critical Infrastructure Sectors”, Journal of Cybersecurity, vol. 6, no. 3, pp. 215-230, 2020.
[27]J. Smith, “Emerging Threats and Adaptation Challenges in Cybersecurity Frameworks,” International Journal of Information Security, vol. 18, no. 4, 2019.