Cyber Security: Challenges and the Way Forward


The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual, ...

Dr. Muhammad Riaz SHAD
National University of Modern Languages (NUML), Pakistan


The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual, organizational and state-causes to label the contemporary era as “information age.“ This is particularly true for western industrialized nations, where critical infrastructures-communications, energy, transportation, banking, water and services-are increasingly dependent on Information Infrastructure. While the information revolution has created new opportunities, improved organizational efficiency and led to unprecedented global connectivity, it has brought about new unconventional vulnerabilities and threats bearing social, economic, political and security implications.

Cyber security, meaning the protection of computers, networks and data, is a serious concern of individuals and organizations, public and private as well as national and international. This concern becomes more serious as “the internet of things“ expands. As the technology advances with a rapid pace, innovations in cyber-crime also take place. Microsoft security bulletins regarding vulnerabilities of its products and services show an ever growing number of bugs, viruses and other threats to cyber security. Scope for cyber-threat increases as cyber-space remains unregulated and cyber-crime is simple as well as inexpensive to commit. Above all, cyber-attack poses a technical challenge of identification of the responsible as it is concealed through the use of several networks. Thus, an easy escape from this problem does not exist. However, serious cyber-attacks committed or backed by a state against another state can be prevented through international cooperation, if it could be achieved. This paper assumes that cyber security, apparently a technical issue, is to a great extent an economic and political matter. In view of this, the paper focuses on the social, economic and political, rather than technical, dimensions of cyber security.

1. Key Concepts

While the technical details of cyber security are beyond the scope of this study, the basic concepts are essential to understand in order to explain it as a socio-political phenomenon. These key concepts can be divided into two sets, each containing three interrelated concepts. First set comprises the concepts of cyber security, cyber space and cyber governance.

Cyber security, also called information technology security, refers to technologies, processes and practices “to prevent, detect and recover from damage to confidentiality, integrity and availability of information in cyberspace.“1 This general definition indicates that cyber security involves not only technical but also political and legislative measures.

Cyberspace refers to “the interaction of people, businesses and other entities over computer networks, namely electronic messages and commercial on-line services.“2 The most sizeable and visible manifestation of cyberspace is internet, which is ubiquitous as it is available everywhere at the same time.

Cyber (security) governance refers to “the development and application by Governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.“3 It aims to discipline
the behavior of internet developers and users through regulatory frameworks, involves both technical and legal measures, and operates within as well as between the states.

Second set comprises the concepts embodied in the nature and scope of cyber-attacks and the concept of critical infrastructure. Cyber-attack refers to “any act by an insider or an outsider that compromises the security expecta tions of an individual, organization, or nation.“4 Cyber-attacks can be categorized into four areas: cyber crime, cyber espionage, cyber terrorism and cyber war. It is useful to differentiate between these types of cyber attacks.

Cyber crime involves the use of computer networks by individuals alone or in groups to steal confidential data or cause disruption, mostly for financial gains. It includes criminal activities such as stealing of credit/debit card information and intellectual property theft as well as disruption to a website or service.

Cyber espionage refers to the use of computer networks to get unauthorized access to personal or confidential information held by individuals, governments or organizations for intelligence or certain operations.

Cyber terrorism is associated with a non-state actor/organization that uses computer networks for terrorist activities aimed at creating fear and panic or causing physical destruction.

Cyber war includes use of computer networks by a state against an adversary (state or non-state actor) for military operations designed to disrupt information systems or systems connected to information technology in view of political goals.

In technical terms, above-defined cyber-attacks take place in three forms: account takeover, impostor fraud and denial of service (DOS). Account takeover involves the use of malware to obtain a user’s confidential information-IDs, PINs and passwords-for transferring money or doing other frauds. In imposter fraud, a fraudster presents himself to an authorized user as a person who is trustworthy or an authority, and requests a bank transaction, which seems normal to the bank. Denial of service (DoS) is a cyber-attack which makes networks or systems unavailable.

Serious cyber-attacks target “critical infrastructures“ of an organization or a state. In this context, an infrastructure refers to “a framework of interdependent networks and systems, generally interlinked at many different levels, including industries, institutions and distribution capabilities that provide a flow of products or services.“5 Five broad sectors can be identified as critical infrastructures, particularly in modern developed countries: information and communication, banking and finance, energy, physical distribution (transpor tation networks) and human services.6 Among these, information and communication infrastructure are vulnerable to cyber-attacks. Since other critical infrastructures are interconnected through information and communication networks, they are also vulnerable to cyber risks.

2. Range of Cyber-Attacks and the Motivations

Vital social infrastructures-electricity, finance, water, transportation, health and food-are increasingly dependent on ICT networks for their functioning, distribution and interconnectedness. This dependence results in both opportunities and vulnerabilities which can be exploited by people ranging from individuals to governments. “Information revolution“ experienced by the contemporary world is boon as well as bane. It is bane because ICT has an “enabling function“ for disruption, crime and state-level aggression. ICT dependence becomes more prone to vulnerabilities in times of social unrest, political tensions and other appalling events. The spectrum of cyber-attacks is quite broad, from individual activity, to activities of groups and non-state actors, to governmental actions. These attacks are driven by a range of motivations-from ideological campaigns, to financial gain, to political objectives.

It is taken from TASAM Publishing's book named "Change in State Nature: Boundaries of Security".
This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.


Continents ( 5 Fields )
 Contents ( 452 ) Actiivities ( 216 )
Africa 0 144
Asia 0 228
Europe 0 38
Latin America & Carribean 0 34
North America 0 8
Regions ( 4 Fields )
 Contents ( 173 ) Actiivities ( 51 )
Balkans 0 93
Middle East 0 59
Black Sea and Caucasus 0 16
Mediterranean 0 5
Identity Fields ( 2 Fields )
 Contents ( 175 ) Actiivities ( 71 )
Islamic World 0 146
Turkish World 0 29
Turkey ( 1 Fields )
 Contents ( 210 ) Actiivities ( 54 )
Turkey 0 210

Gerçekleşen her göç hareketi nedenleri ve sonuçlarıyla sadece göç eden toplumu değil, göç edilen toplumu da etkilemektedir. Suriye İç Savaşı sonucunda Türkiye’ye sığınan ve “Geçici Koruma Altına” alınan Suriyelilerin sayısı resmi rakamlara göre bugün 3,5 milyondur. ;

ABD ise geniş yüzölçümü, 330 milyonu yakın nüfusu, sanayileşme ve teknolojide elde ettiği ilerleme, büyüyen ve gelişen ekonomisi, doğal kaynakları, demografik yapısı, Birleşmiş Milletlerdeki veto gücü, IMF ve NATO içerisindeki yeri, uluslararası alandaki saygın konumu ile tüm dünyanın dikkatini her ...;

Küreselleşmenin ve gelişmiş iletişim teknolojilerinin dünyanın çehresini değiştirmesiyle uluslararası ilişkilerin devletlerarası ilişkiler ile tanımlı olduğu dönem sona ermiştir. ;

Askeri teknolojiye ağırlık veren Rusya, derin uzay aktiviteleri tam gaz devam ederken Amerika ve Çin’in gerisinde kaldı. Eski uzay gücü Sovyetler Birliği’nin mirasına Rusya sahip çıkamadı. ;

“Değişen devlet doğası” temelinde ulusal ve uluslararası güvenlik konuları ile küresel yönetişim mekanizma ve kurumlarını her yıl ayrı bir gündemle tartışmak üzere İstanbul merkezli oluşturulan İstanbul Güvenlik Konferansı’nın resmî internet sitesi ve adresi yenilendi.;

Dr. Serkan Cantürk’ün “Konvansiyonel Kalkınmadan Dijital Kalkınmaya Türkiye” isimli kitabı TASAM Yayınları tarafından kitap ve e-kitap olarak yayımlandı.;

İnsanoğlunun uzayla ilişkisini kabaca iki kategori altında incelemek mümkün. Bunlardan ilki yerküreye görece yakın mesafeleri kapsayan yörüngesel uzay. 1957 yılında uzaya fırlatılan Sovyet Sputnik uydusunu bugüne kadar 8.000’in üzerinde uydu takip etti ve Dünya’nın yörüngesindeki uydular artık moder...;

Meksika ise yaklaşık 2 milyon kilometrekarelik yüzölçümü ile Orta Amerika’daki stratejik konumu, 124 milyon civarındaki nüfusu, insan kaynağı, 1,223 trilyon GSYİH ile büyüyen ve gelişen ekonomisi, BM, Amerika Devletleri Örgütü (ADÖ), Rio Grubu, OECD, ANDEAN, Orta Amerika Entegrasyon Sistemi (SICA),...;

9. Dünya İslam Forumu

  • 23 Mar 2022 - 25 Mar 2022
  • CVK Park Bosphorus Oteli -
  • İstanbul - Türkiye

"Türkiye - Rusya İlişkileri" Konferansı

  • 22 Jun 2005 - 22 Jun 2005
  • İstanbul - Türkiye

3. Türkiye - Çin Forumu

  • 15 Oct 2018 - 20 Oct 2018
  • Pekin - Çin

İngiltere’nin II. Dünya Savaşı sonrasında Hint Altkıtası’ndan çekilmek zorunda kalması sonucunda, 1947 yılında, din temelli ayrışma zemininde kurulan Hindistan ve Pakistan, İngiltere’nin bu coğrafyadaki iki asırlık idaresinin bütün mirasını paylaştığı gibi bıraktığı sorunlu alanları da üstlenmek dur...

Devlet geleneğimizde yüksek emsalleri bulunan Meritokrasi’nin tarifi; toplumda bireylerin bilgi, bilgelik, beceri, çalışkanlık, analitik düşünce gibi yetenekleri ölçüsünde rol almalarıdır. Meritokrasi din, dil, ırk, yaş, cinsiyet gibi özelliklere bakmaksızın herkese fırsat eşitliği sunar ve başarıyı...

Gündem 2063, Afrika'yı geleceğin küresel güç merkezine dönüştürecek yol haritası ve eylem planıdır. Kıtanın elli yıllık süreci kapsayan hedeflerine ulaşma niyetinin somut göstergesidir.

Geçmişte büyük imparatorluklar kuran Çin ve Hindistan, 20. asırda boyunduruktan kurtularak bağımsızlıklarına kavuşmuş ve ulus inşa sorunlarını aştıkça geçmişteki altın çağ imgelerinin cazibesine kapılmıştır.

Meritokrasi Devlet geleneğimizde yüksek emsalleri bulunan Meritokrasi’nin tarifi; toplumda bireylerin bilgi, bilgelik, beceri, çalışkanlık, analitik düşünce gibi yetenekleri ölçüsünde rol almalarıdır. Meritokrasi din, dil, ırk, yaş, cinsiyet gibi özelliklere bakmaksızın herkese fırsat eşitliği sunar...

Türkiye ile Avrupa Birliği (AB) ilişkilerinin bugünü ve geleceğinin ele alındığı Avrupa Birliği Sempozyumu, Türk Asya Stratejik Araştırmalar Merkezi (TASAM) ile Türk Avrupa Bilimsel ve Eğitimsel Araştırmalar Vakfı (TAVAK) işbirliğinde 02 Şubat 2018’de İstanbul Taksim Hill Otel’de gerçekleştirildi.

Soğuk savaşın ardından, “yeni dünya düzeni“ olarak adlandırılan dönem, hegomonik bir güç olarak beliren ABD’nin “büyük vaadi“ ile başladı: “Demokrasiyi dünyada yaygınlaştırmak“. Bu “büyük“ vaad, yoksulluk, adaletsizlik ve şiddet dolu bir dünyayı kurmak biçiminde gerçekleşti ve iki “siyasi/askeri“ ar...

Somali Cumhuriyeti; Afrika’nın doğusunda yer almakta olup Afrika Boynuzu olarak adlandırılan ve dünya gündemine açlığın, kıtlığın ve bulaşıcı hastalıkların yol açtığı felaketler nedeniyle sık sık gelen bir bölgede konumlanmış durumdadır.