International Cyber Security Challenges: I. Duić, V. Cvrtila, T. Ivanjko
International Cyber Security Challenges: I. Duić, V. Cvrtila, T. Ivanjko
Summary - The opportunities provided by the information the principles of a review and professional research paper,
and communications technology, with a special emphasis on this paper aims to show cyberspace, in terms of security
the Internet, have become an integral part of life. However, challenges, as a dimension in which international relations
are we sufficiently aware and prepared as individuals, unfold. It is necessary to distinguish the main subjects of
nations or the international community for the threats the international cyber security environment, analyze their
coming from cyberspace or for the denial of the use of that intentions and set a paradigm of the multipolarity of
dimension of communication, commerce and even warfare? cyberspace and analyze its uniqueness and principles.
Namely, despite the growing number of users, the Internet is
still beyond or below minimum regulation. Those are NATO's Strategic Concept, adopted at the end of 2010
precisely the conditions for the organization and realization at the Lisbon summit, determines that cyber-attacks have
of hostile action in cyberspace. There are security issues become more frequent, more organized and more
within the cyberspace that represent a security risk and expensive, causing damage to the government
challenge of modern times. administration, the business sector, economies, and
potentially to the transport and supply. It also states that
The development and application of the information and cyber-attacks can reach the level that threatens the
communications technology has created a new battleground. national and Euro-Atlantic prosperity, security, and
As a special challenge to international security, cyber
stability. Foreign military and intelligence services,
terrorism arises. Cyber security will significantly affect
international relations in the 21st century. This paper gives
organized criminals, terrorists and extremist groups are the
an overview of the concepts and principles of cyber threats potential sources of such attacks. What is also emphasized
that affect the safety and security in an international in the conclusions of the Lisbon summit is the need to
context. further develop the skills of prevention, recognition,
defense and recovery from cyber-attacks, including the
Keywords: cyberspace, cyber-attack, cyber terrorism and use of the NATO planning process for the advancement
crime, international security. and coordination of the national abilities of cyber
protection, assembling all NATO bodies under a
centralized cyber protection, and a better integration of the
I. INTRODUCTION NATO cyber awareness, warnings and common response
of the member states [1].
Cyber warfare and terrorism do not know borders. It should be borne in mind that the rapid development
Action in cyberspace requires the rejection of the common and adoption of technologies through their use in
assumptions related to time and space because such everyday life opens up many opportunities for the
attacks, by means of modern information and attackers, whether they are in the form of states, terrorists
communications networks, can be performed from or criminals, because they are always at an advantage in
anywhere in a very short time. The processes of cyberspace. We can therefore conclude that, a new
globalization did not have the impact only on the concept of cyber security in which prevention represents a
achievements of civilization, but also on the development significant portion is being created.
of new threats to the civilization. It is a fact that terrorism
and national threats changed under the influence of the The initial hypothesis is that cyberspace is a growing
globalization process and the Internet information security risk and challenge of modern times. Moreover,
revolution. Strategic advantage no longer lies in the cyber security will significantly affect international
fighting power or geographical location, but in the relations in the 21st century, while the threats and
information and knowledge. International cooperation and challenges will exponentially increase.
intelligence sharing are essential for an effective
The goal of this paper is the synthesis and analysis of
prevention of cyber threats. Even though cyber threats
knowledge based on a review of recent literature and
have in the recent years been specifically emphasized in
professional and scientific articles that problematize the
the modern military doctrines of great powers and NATO,
challenges of international security in cyberspace. The
they are still shrouded in secrecy. scientific work seeks to show cyberspace as an operational
The purpose of this paper is to draw attention to cyber dimension of international relations in terms of the cyber
threats, which endanger the safety of modern states, security challenges. With the systematization of the cyber
organizations and international relations. By combining warfare strategy and the very methods of attack, links with
REFERENCES
[1] NATO, “Strategic concept for the defence and security of the
members of North Atlantic Treaty Organization,” 2010, Available:
http://www.nato.int/nato_static/assets/pdf/pdf_publications/20120
214_strategic-concept-2010-eng.pdf (3.2.2017.)
[2] N. Choucri and D. Goldsmith, “Lost in cyberspace: harnessing the
Internet, international relations, and global security,” Bulletin of
the Atomic Scientists, vol. 68, no. 2, 2012, pp. 70-77.
[3] S. Tatalović, A. Grizold, and V. Cvrtila, Suvremene sigurnosne
politike. Zagreb: Golden marketing-Tehnička knjiga, 2008.
[4] H. Lin, “A virtual necessity: some modest steps toward greater
cybersecurity,” Bulletin of the Atomic Scientists, vol. 68, no. 5,
2012, pp. 75-87.
[5] L. J. Janczewski and A. M. Colarik, Cyber warfare and cyber
terrorism. Hershey: Information Science Reference, 2008.
[6] J. S. Nye, “Cyber war and peace,” 2012, Available:
http://www.project-syndicate.org/commentary/cyber-war-and-
peace (3.2.2017.)
[7] J. Carr, Inside cyber warfare, 1st ed. Sebastopol, CA: O’Reilly
Media, 2010.
[8] R. A. Clarke and R. K. Knake, Cyber war: the next threat to
national security and what to do about it. New York: Ecco, 2010.
[9] Risk Based Security, “A Breakdown and Analysis of the Sony
Hack,“ 2014, Available:
https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-
analysis-of-the-december-2014-sony-hack/#thebeginning
(9.4.2017.)
[10] G. Siboni and D. Siman-Tov, “Cyberspace Extortion: North Korea
versus the United States,“ INSS Insight No. 646, 2014, Available:
http://www.inss.org.il/uploadImages/systemFiles/No.%20646%20
-%20Gabi%20and%20Dudi%20for%20web.pdf (9.4.2017.)
[11] M. Petrović, “Obrana od cyber-napada”, Hrvatski vojnik, vol. 9,
no. 385, 2012, pp. 26-29.
[12] D. E. Sanger, “Obama order sped up wave of cyberattacks against
Iran,” The New York Times, 2012, Available:
www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-
wave-of-cyberattacks-against-iran.html?pagewanted=1 (3.2.2017.)