New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare

New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare

Nika Chitadze
DOI: 10.4018/978-1-6684-6092-4.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The end of the Cold War has given rise to a fresh set of security challenges that today pose a threat to the stability of any state. The focus is now as much on threats arising due to inter-state rivalries based on balance of power as on intra-national and transnational security threats that cannot be classified into the traditional security studies framework. Covering a wide range of situations, these non-traditional security threats have real consequences towards human, national, and environmental security. This chapter seeks to understand some of the most critical non-traditional security threats faced by international community on the example of cyber warfare.
Chapter Preview
Top

Introduction

The socioeconomic well-being, health, and life of every citizen largely depend on the security of information systems and electronic services. Cyber-attacks have a great impact on all sectors of the economy, hinder the normal functioning of the economic space, reduce public confidence in electronic services and threaten the development of the economy through the use of information and communication technologies. Against the backdrop of global cyber threats, when cyber attacks, cyber espionage, cyber terrorism, and disinformation are carried out daily, the development, implementation, and development of new protection mechanisms is an important issue. It is noteworthy that NATO – together with other appropriate international institutions, such as EU etc. plays an important role in cyber security issues. This Euro-Atlantic Institution itself is a kind of security umbrella for both member countries and partner countries.

Every age comes with its problems. Cybercrime has become one of the most dangerous phenomena of the 21st century, with many people, private companies, and government agencies suffering every day. Billions of dollars are already being spent on defense.

Discussing again NATO, it should be pointed out, that all NATO concepts and doctrines emphasize that, based on basic principles, no member state should be forced to rely solely on its forces. The Alliance's strategy allows each member state to pursue national security goals by collective means.

Every leading country in the world has a national cybersecurity strategy that is a defining factor in public policy. The national security strategy aims to identify, prevent, reduce and eliminate existing threats. Cooperation with partner countries and organizations is of great importance for many countries in the world.

In the face of existing threats and challenges, many countries have effective protection systems, such as the functioning of the Cyber ​​Security Bureau and the Data Exchange Agency, and other relevant structures. As stated in the national security strategies of various countries, the goal of a particular country is to become a regional provider of cybersecurity services and develop the necessary infrastructure to operate the communication systems of other countries located on its territory. This is impossible without the development of cooperation with partner countries.

For example, taking as an example the former soviet republic – of Georgia, reports from the Georgian Security Service (which was the victim of Russian aggression in 2008) indicate that hacking by foreign intelligence agencies, cyberattacks on government infrastructure, and cyber-surveillance operations pose a significant security risk to the country (Jiadze, 2022).

Threats cannot be avoided without modern technologies, professional personnel, and cooperation with leading states. Therefore, the only way is international cooperation. For same Georgia, in terms of security, cooperation with NATO and the intelligence services of leading countries should be strengthened to take timely preventive measures. Closer cooperation with the security services of neighboring states is also necessary (Jiadze, 2022).

Why it is important for Georgia to cooperate with NATO on Cyber security issues, its should be underlined that, NATO is the organization with the technical, financial, or human resources to counter cyber threats. Therefore, it is important to study, analyze, and explore the current situation and plans for the future from a practical point of view. The researchers argue that if the scientific approach is correct, the results of cyberbullying will not be as devastating as in previous years.

Key Terms in this Chapter

Cyber Space: A virtual and dynamic environment comprised of electronics and communication devices over various networks to store and utilize electronic data. The cyberspace structure is like the structure of a human brain.

Cyber-Warfare: Is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.

Cyber Attack: An assault launched by cybercriminals using one or more computers against single or multiple computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyber attack, including malware, phishing, ransomware, and denial of service, among other methods.

Behaviorism: Is a theory of learning based on the idea that all behaviors are acquired through conditioning, and conditioning occurs through interaction with the environment. Behaviorists believe that our actions are shaped by environmental stimuli.

Complete Chapter List

Search this Book:
Reset