Page 76 - Cyber Defense eMagazine January 2024
P. 76
Combating Terrorism Using Information
Protection
By Milica D. Djekic
The global landscape has changed significantly since a beginning of the new millennium as a threat to
everyday life and work is arising day by day causing a technological, physical, financial and health danger
to many. The security challenges of nowadays mainly choose an asymmetric tactic to attack and in such
a sense it is clear why their operations are such an impactful and fatal to the majority of people. In such
a case, it’s needed to make a focus on high-tech campaigns as a cyberspace is also an asymmetric
platform giving chance to assault using a minimum of the resources and getting in position to make harm
to the entire nations and their countries. The cases of the bioterrorism through the last two decades have
taught everyone the bio-weapon can kill many only give them an illness which can be treated, but in some
cases, it can lead to death. Also, the recent events in the Gaza Strip have shown that if intelligently
coordinated the physical offenses can lead to catastrophic consequences as the Hamas strategy has
demonstrated that the small spatial areas can be applied to threaten many simply making from such a
place the terrorist base which has dealt with a certain range and coverage in a fashion of the armed
force’s strikes. On the other hand, it is very well known that the cyberspace is a true technological field
of the asymmetric threats and in that case, there must be taken some steps in preventing, monitoring
and responding to those incidents as such technical advancements are in need for a better cyber defense
that should include a highly sophisticated cryptosystem solution. It’s easy to say, but extremely difficult
to obtain as any cryptosystem is supposed to cope with the good encryption and decryption which is not
always easy to produce. Some current experiences suggest the humankind is very close to make its first
steps in developing, designing and deploying the pioneering perfect secrecy crypto-algorithms that can
Cyber Defense eMagazine – January 2024 Edition 76
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.