Synthesize Appropriate Defensive Controls and Processes for Significant Threats. Case Study – Financial Services Sector
Musa Adamou
USAF veteran with four years of experience in Federal contract administration and procurement. Currently pursuing a Ph.D. in Cybersecurity - cloud computing. Bilingual in English and French. NSLS member.
Introduction
??????????? Our economy, critical infrastructure, democracy, democratic institutions, data privacy, and national defense all depend on cybersecurity (The White House, 2023) Cybercrime has evolved from nuisance defacement to espionage. In the past few years, cyber-attacks have evolved to damages to critical infrastructure, ransomware attacks, and campaigns designed to undermine public trust. Foreign commercial spyware, once available only to a few well-resourced countries, is now widely accessible to everyone. Organizational criminal syndicates are becoming more sophisticated with these tools and services, and they can harm U.S. interests in cyberspace. In addition to China, Russia, Iran, North Korea, and other autocratic states with revisionist intentions, they aggressively use advanced cyber capabilities to pursue objectives that are contrary to our interests. Cyberspace abuse threatens U.S. national security and economic prosperity?(The White House, 2023).
The U.S., Russia, and China consider cyber a separate domain of conflict from land, sea, air, and space; therefore, it is a critical component of national defense.? They target U.S. military and defense systems, gather intelligence, engage in economic espionage, disrupt critical infrastructure, coerce and manipulate public discourse, and engage in psychological warfare. Russia, China, Iran, and North Korea use cyber capabilities to steal intellectual property and gather intelligence, while North Korea disrupts other countries' critical infrastructure. In addition, these countries engage in cyber-enabled influence campaigns to manipulate public opinion, as well as cyber as an instrument of strategic deterrence and national defense. Defending against significant threats to their critical infrastructure is a top priority for these countries. In order to protect their critical infrastructure, these countries have implemented defensive controls and processes. National security and mitigation of cyber risks require a robust cybersecurity infrastructure. Defense measures are prioritized in these countries as a means of safeguarding critical infrastructure and ensuring resilience and integrity. An example of cyberattacks was Russian interference with the 2016 presidential election.? The following measures can be implemented to improve resilience and integrity of critical infrastructure, against threats such as Russia?(www.cisa.gov, 2019):
1.???? Perform regular vulnerability assessments and penetration tests.
2.???? Enhance access controls and authentication protocols to limit unauthorized access.
3.???? Ensure swift recovery from cyberattacks with robust incident response plans.
4.???? Ensure government agencies, critical infrastructure operators, and cybersecurity experts collaborate and share information.
5.???? Protect against cyber threats by implementing advanced cybersecurity technologies and solutions, such as intrusion detection systems, firewalls, and encryption.
6.???? Reducing human error and insider threats by training employees.
Countries can protect critical infrastructure from cyberattacks by adopting these measures. There are real limits to the state's power in cyberspace due to its diffuse and virtualized nature (Weiss & Jankauskas, 2019). Online activities are diffused and virtualized, limiting governments' control and regulation of cyberspace. Decentralization makes it difficult for states to exert their power and authority in cyberspace because actions cannot be attributed to specific individuals or entities. Therefore, non-state actors and individuals can have a significant impact on cyberspace events and outcomes, challenging state-centric thinking.?Security of critical infrastructure undermines the political authority of sovereign nations. Security of critical infrastructure challenges the political authority of sovereign nations because it is essential for society. Collaboration and information sharing are emphasized to highlight the limitations of state-centric approaches and the important role played by non-state actors and individual users. A more decentralized and inclusive approach to cybersecurity is required.