DS Journal of Cyber Security (DS-CYS)

Research Article | Open Access | Download Full Text

Volume 2 | Issue 2 | Year 2024 | Article Id: CYS-V2I2P103 DOI: https://doi.org/10.59232/CYS-V2I2P103

Navigating the Cyber Abyss: Safeguarding National Security in an Interconnected World

Samadrito Mukherjee, Chitra BT

ReceivedRevisedAcceptedPublished
08 Apr 202411 May 202401 Jun 202412 Jun 2024

Citation

Samadrito Mukherjee, Chitra BT. “Navigating the Cyber Abyss: Safeguarding National Security in an Interconnected World.” DS Journal of Cyber Security, vol. 2, no. 2, pp. 20-31, 2024.

Abstract

The rapid proliferation of digital technologies has interconnected the world like never before, offering immense benefits but also exposing nations to unprecedented cyber threats. This paper delves into the complexities of safeguarding national security in this interconnected landscape, often referred to as “the cyber abyss”, by analyzing various aspects, including the evolving cyber threat landscape, the role of state and non-state actors, and the challenges in cybersecurity governance. This paper provides insights into navigating the cyber abyss to safeguard national security. Drawing on case studies and current trends, it offers recommendations for policymakers and stakeholders to enhance cybersecurity resilience and mitigate the risks posed by cyber threats.

Keywords

Cybersecurity, National security, Inter-connected world, Cyber threats, Cyber governance, Policy recommendations.

References

[1]Pavel Polityuk, Oleg Vukmanovic, and Stephen Jewkes, Ukraine Power Outage Confirmed as Cyber Attack, Reuters, 2017. [Online]. Available: https://www.reuters.com/article/idUSKBN1521BB/

[2]Black Energy APT Attacks against Ukrainian Power Industry, ESET. [Online]. Available: https://www.welivesecurity.com/wp-content/uploads/2016/01/eset-blackenergy.pdf

[3]Cybersecurity & Infrastructure Security Agency (CISA), Indicators Associated With WannaCry Ransomware, 2018. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA17-132A

[4]Kaspersky, What is WannaCry ransomware?. [Online]. Available: https://www.kaspersky.com/resource-center/threats/ransomware-wannacry

[5]Symantec Security Response, What you need to know about the WannaCry Ransomware?, 2017. [Online]. Available: https://www.symantec.com/blogs/feature-stories/wannacry-ransomware-attack

[6]Symantec Security Response, Stuxnet: Anatomy of a Computer Virus. [Online]. Available: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf

[7]Kaspersky, Stuxnet: Dissecting a Cyberwarfare Weapon. [Online]. Available: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07154753/KL_Stuxnet_Dossier_final.pdf

[8]The New Yorker, Stuxnet and the Future of Cyber War. [Online]. Available: https://www.newyorker.com/magazine/2011/11/21/cyber-sabotage

[9]Mandiant, The Sony Pictures Hack - A Case Study in the Need for Appropriate Cybersecurity Defences, [Online]. Available: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-sony-pictures-hack.pdf

[10]RAND Corporation, Sony Hack: A Case Study on Security & Privacy. [Online]. Available: https://www.rand.org/pubs/research_reports/RR1751.html

[11] Bloomberg, Inside the Hack of Sony Pictures. [Online]. Available: https://www.bloomberg.com/features/2016-sony-hack/

[12]Manish Gupta, and Sandeep Shukla, Indian Cyber Security Landscape: A Comprehensive Study of Emerging Threats and Mitigation Strategies.

[13]Ron Deibert “The Geopolitics of Cyberspace after Snowden,” Current History, vol. 114, no. 768, pp. 9-15, 2015.

[CrossRef] [Google Scholar] [Publisher Link]

[14]Marsh, and McLennan, World Economic Forum, The Global Cyber Risk Perception Survey, 2021.

[15]Shriti Sharma, Securing India’s Digital Future: Cybersecurity Urgency and Opportunities, The Diplomat, 2024. [Online]. Available: https://thediplomat.com/2024/01/securing-indias-digital-future-cybersecurity-urgency-and-opportunities/

[16]C. Arunkumar, and P. Sakthivel, “Challenges to National Security in India,” World Affairs: The Journal of International Issues, vol. 21, no. 1, pp. 114-121, 2017.

[Publisher Link]

[17]National Cybersecurity Strategy, The White House, Washington, 2023. [Online]. Available: https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf

[18]Cyber Warfare and National Security Challenges, Members’ Reference Service Larrdis Lok Sabha Secretariat, New Delhi, India, 2017. [Online]. Available: https://loksabhadocs.nic.in/Refinput/New_Reference_Notes/English/Cyber_Warfare_and_National_Security_Challenges.pdf

[19]Alık Naha, “Emerging Cyber Security Threats: India’s Concerns and Options,” International Journal of Politics and Security, vol. 4, no. 1, pp. 170-200, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[20]Sushma Devi, “Cyber Security in the National Security Discourse,” World Affairs: The Journal of International Issues, vol. 23, no. 2, pp. 146-159, 2019.

[Google Scholar] [Publisher Link]

[21]B. Poornima, “Cyber Preparedness of the Indian Armed Forces,” Journal of Asian Security and International Affairs, vol. 10, no. 3, pp. 301-324, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[22]India’s Cybersecurity Challenge: Threats and Strategies, Daily Updates, 2023. [Online]. Available: https://www.drishtiias.com/daily-updates/daily-news-editorials/india-s-cybersecurity-challenge-threats-and-strategies

[23]Kyle Chin, Top Cybersecurity Regulations in India, UpGuard, 2024. [Online]. Available: https://www.upguard.com/blog/cybersecurity-regulations-india

[24]Amit Kumar, As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying, Security Intelligence, 2016. [Online]. Available: https://securityintelligence.com/as-india-gears-up-for-cybersecurity-challenges-threats-are-multiplying/

[25]National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 2018. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.

[26]S. Park, and S. Seo, “Resource Constraints in Implementing Cybersecurity Measures in Critical Infrastructure Sectors”, Journal of Cybersecurity, vol. 6, no. 3, pp. 215-230, 2020.

[27]J. Smith, “Emerging Threats and Adaptation Challenges in Cybersecurity Frameworks,” International Journal of Information Security, vol. 18, no. 4, 2019.


Navigating the Cyber Abyss: Safeguarding National Security in an Interconnected World