Cyber Security Strategy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3315 Experts worldwide ranked by ideXlab platform

Tri Joko Waluyo - One of the best experts on this subject based on the ideXlab platform.

  • PENGARUH Cyber Security Strategy AMERIKA SERIKAT MENGHADAPI ANCAMAN Cyber WARFARE
    2015
    Co-Authors: Moehammad Yuliansyah Saputera, Tri Joko Waluyo
    Abstract:

    This research describes United States of America’s Cyber Security Strategy facing the Cyber warfare threads from 2009 till 2014. The main goals are securing Cyber vital infrastructures and digital informations of United States. Vital infrastructures are composed of public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, postal and shipping, internet network, and many others. The method that is used in this research is qualitative research. Some of the datas are obtained from books, journals, articles, internet and other media. This research focuses on the influence of United State’s Cyber Security Strategy facing Cyber warfare threads. Using Strategy theory and securitization theory, this research will find out if US government successes to secure their Cyber environment or not. Cyber warfare is a thread, it can be a trigger to the physical war. Cyber attackers can compromise other computers or networks to use as intermediaries, or channel through anonymizing proxies that hide their Internet protocol (IP) address. Also, using underground internet or deep web can penetrate enemy’s database. Through the intelligence agencies, United States applied it. It has multy functions. Can be a tool for defense or securing Cyberspace and also can be a tool to attack. Keywords: Cyber Security Strategy, Cyber Warfare, Deep Web

  • pengaruh Cyber Security Strategy amerika serikat menghadapi ancaman Cyber warfare oleh moehammad yuliansyah saputera 1
    2015
    Co-Authors: Tri Joko Waluyo, Ilmu Politik, Kampus Bina
    Abstract:

    This research describes United States of America’s Cyber Security Strategy facing the Cyber warfare threads from 2009 till 2014. The main goals are securing Cyber vital infrastructures and digital informations of United States. Vital infrastructures are composed of public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, postal and shipping, internet network, and many others. The method that is used in this research is qualitative research. Some of the datas are obtained from books, journals, articles, internet and other media. This research focuses on the influence of United State’s Cyber Security Strategy facing Cyber warfare threads. Using Strategy theory and securitization theory, this research will find out if US government successes to secure their Cyber environment or not. Cyber warfare is a thread, it can be a trigger to the physical war. Cyber attackers can compromise other computers or networks to use as intermediaries, or channel through anonymizing proxies that hide their Internet protocol (IP) address. Also, using underground internet or deep web can penetrate enemy’s database. Through the intelligence agencies, United States applied it. It has multy functions. Can be a tool for defense or securing Cyberspace and also can be a tool to attack.

Kampus Bina - One of the best experts on this subject based on the ideXlab platform.

  • pengaruh Cyber Security Strategy amerika serikat menghadapi ancaman Cyber warfare oleh moehammad yuliansyah saputera 1
    2015
    Co-Authors: Tri Joko Waluyo, Ilmu Politik, Kampus Bina
    Abstract:

    This research describes United States of America’s Cyber Security Strategy facing the Cyber warfare threads from 2009 till 2014. The main goals are securing Cyber vital infrastructures and digital informations of United States. Vital infrastructures are composed of public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, postal and shipping, internet network, and many others. The method that is used in this research is qualitative research. Some of the datas are obtained from books, journals, articles, internet and other media. This research focuses on the influence of United State’s Cyber Security Strategy facing Cyber warfare threads. Using Strategy theory and securitization theory, this research will find out if US government successes to secure their Cyber environment or not. Cyber warfare is a thread, it can be a trigger to the physical war. Cyber attackers can compromise other computers or networks to use as intermediaries, or channel through anonymizing proxies that hide their Internet protocol (IP) address. Also, using underground internet or deep web can penetrate enemy’s database. Through the intelligence agencies, United States applied it. It has multy functions. Can be a tool for defense or securing Cyberspace and also can be a tool to attack.

Moehammad Yuliansyah Saputera - One of the best experts on this subject based on the ideXlab platform.

  • PENGARUH Cyber Security Strategy AMERIKA SERIKAT MENGHADAPI ANCAMAN Cyber WARFARE
    2015
    Co-Authors: Moehammad Yuliansyah Saputera, Tri Joko Waluyo
    Abstract:

    This research describes United States of America’s Cyber Security Strategy facing the Cyber warfare threads from 2009 till 2014. The main goals are securing Cyber vital infrastructures and digital informations of United States. Vital infrastructures are composed of public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, postal and shipping, internet network, and many others. The method that is used in this research is qualitative research. Some of the datas are obtained from books, journals, articles, internet and other media. This research focuses on the influence of United State’s Cyber Security Strategy facing Cyber warfare threads. Using Strategy theory and securitization theory, this research will find out if US government successes to secure their Cyber environment or not. Cyber warfare is a thread, it can be a trigger to the physical war. Cyber attackers can compromise other computers or networks to use as intermediaries, or channel through anonymizing proxies that hide their Internet protocol (IP) address. Also, using underground internet or deep web can penetrate enemy’s database. Through the intelligence agencies, United States applied it. It has multy functions. Can be a tool for defense or securing Cyberspace and also can be a tool to attack. Keywords: Cyber Security Strategy, Cyber Warfare, Deep Web

Akm Bahalul Haque - One of the best experts on this subject based on the ideXlab platform.

  • NEED FOR CRITICAL Cyber DEFENCE, Security Strategy AND PRIVACY POLICY IN BANGLADESH - HYPE OR REALITY?
    2019
    Co-Authors: Akm Bahalul Haque
    Abstract:

    Cyber Security is one of the burning issues in modern world. Increased IT infrastructure has given rise to enormous chances of Security breach. Bangladesh being a relatively new member of Cyber Security arena has its own demand and appeal. Digitalization is happening in Bangladesh for last few years at an appreciable rate. People are being connected to the worldwide web community with their smart devices. These devices have their own vulnerability issues as well as the data shared over the internet has a very good chances of getting breached. Common vulnerability issues like infecting the device with malware, Trojan, virus are on the rise. Moreover, a lack of proper Cyber Security policy and Strategy might make the existing situation at the vulnerable edge of tipping point. Hence the upcoming new infrastructures will be at a greater risk if the issues are not dealt with at an early age. In this paper common vulnerability issues including their recent attacks on Cyber space of Bangladesh, Cyber Security Strategy and need for data privacy policy is discussed and analysed briefly

Haque, Akm Bahalul - One of the best experts on this subject based on the ideXlab platform.

  • Need for Critical Cyber Defence, Security Strategy and Privacy Policy in Bangladesh - Hype or Reality?
    2019
    Co-Authors: Haque, Akm Bahalul
    Abstract:

    Cyber Security is one of the burning issues in modern world. Increased IT infrastructure has given rise to enormous chances of Security breach. Bangladesh being a relatively new member of Cyber Security arena has its own demand and appeal. Digitalization is happening in Bangladesh for last few years at an appreciable rate. People are being connected to the worldwide web community with their smart devices. These devices have their own vulnerability issues as well as the data shared over the internet has a very good chances of getting breached. Common vulnerability issues like infecting the device with malware, Trojan, virus are on the rise. Moreover, a lack of proper Cyber Security policy and Strategy might make the existing situation at the vulnerable edge of tipping point. Hence the upcoming new infrastructures will be at a greater risk if the issues are not dealt with at an early age. In this paper common vulnerability issues including their recent attacks on Cyber space of Bangladesh, Cyber Security Strategy and need for data privacy policy is discussed and analysed briefly.Comment: 14 Pages, 8 Figures , 1 Tabl