The Role and Place of Cyber Warfare and Cyber Security in the World: Past, Present, Future

The Role and Place of Cyber Warfare and Cyber Security in the World: Past, Present, Future

Nika Chitadze
DOI: 10.4018/978-1-6684-8846-1.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Computer security, cyber security, or information security is the protection of computer systems and control points of networks from intrusion, unauthorized use, or damage to hardware, software, and electronic data, as well as from destruction and disruption of the services they provide to users. This area is becoming more and more important as a result of increasing dependence on computer systems, the internet, and wireless networks such as Bluetooth and Wi-Fi. Because of its complexity, in terms of politics and technology, cyber security is also one of the main challenges in modern life.
Chapter Preview
Top

Introduction

The development of digital technologies has covered all areas of human life. The technological revolution, which has brought great benefits to humanity, has increased cyber risks in virtual space. Currently, the geographical borders of the state do not represent a barrier to cyber attacks. Malicious cyber activities can be carried out covertly from anywhere in the world, by a person or groups of people from home, through a computer, without requiring special, expensive resources. It can have the same devastating effect as conventional warfare.

The speed of technology development has completely changed the international security landscape. The world is faced with massive cyber challenges. Cyber security is a global challenge that transcends state borders and requires collective international cooperation. Even though the world's leading countries, members of the European Union, and the alliance are trying to deal with cyber threats independently, none of the states has been able to effectively fight against cyber challenges. The fight against cybercrime at the international level is possible only with the collaboration of countries, with a collective approach.

At a time when many countries are constant targets of cyberattacks, information-psychological operations of the aggressor Russia, and a strong disinformation campaign by the Kremlin and its allies, the role of cyber security and the development of cyber capabilities in the national security policy of various countries is vital. The country's sovereignty, territorial integrity, and stability are achieved through integration into the democratic world. Although significant research has been conducted in the field of cyber security, because cyberspace is a new challenge of an unpredictable nature, which is becoming increasingly complex and large-scale with the rapid development of digital technologies, it can be said that the underlying causes of Countries cannot unite to fight cybercrime with all their might. What prevents them from cooperating on a global level? What methods can different countries deal with modern cyber challenges, which will become even more complex and unmanageable in the era of smart technologies, artificial intelligence, and quantum computers (Svanadze, 2015)?

Key Terms in this Chapter

Cyber Security or Information Technology Security (IT Security): Is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

Cyber Space: A concept describing a widespread interconnected digital technology.

Information Security: Sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management.

Cyber Warfare: The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.

Complete Chapter List

Search this Book:
Reset