Page 76 - Cyber Defense eMagazine January 2024
P. 76

Combating Terrorism Using Information


            Protection


            By Milica D. Djekic



            The global landscape  has changed  significantly since a beginning of the new millennium as a threat to
            everyday life and work is arising day by day causing a technological, physical, financial and health danger
            to many. The security challenges of nowadays mainly choose an asymmetric tactic to attack and in such
            a sense it is clear why their operations are such an impactful and fatal to the majority of people. In such
            a case,  it’s needed  to make  a focus  on high-tech  campaigns  as  a cyberspace  is also  an asymmetric
            platform giving chance to assault using a minimum of the resources and getting in position to make harm
            to the entire nations and their countries. The cases of the bioterrorism through the last two decades have
            taught everyone the bio-weapon can kill many only give them an illness which can be treated, but in some
            cases,  it  can  lead  to death.  Also,  the  recent  events  in the  Gaza  Strip  have  shown  that  if intelligently
            coordinated  the physical  offenses  can lead  to catastrophic  consequences  as the Hamas  strategy  has
            demonstrated  that the small spatial areas can be applied to threaten many simply making from such a
            place  the terrorist  base  which  has dealt  with  a certain  range  and coverage  in a fashion  of the  armed
            force’s strikes. On the other hand, it is very well known that the cyberspace is a true technological  field
            of the asymmetric  threats  and in that case,  there must be taken  some steps in preventing,  monitoring
            and responding to those incidents as such technical advancements are in need for a better cyber defense
            that should include a highly sophisticated  cryptosystem  solution. It’s easy to say, but extremely  difficult
            to obtain as any cryptosystem is supposed to cope with the good encryption and decryption which is not
            always easy to produce. Some current experiences suggest the humankind is very close to make its first
            steps in developing, designing and deploying the pioneering  perfect secrecy crypto-algorithms  that can




            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          76
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   71   72   73   74   75   76   77   78   79   80   81