Tuesday, May 5, 2020

Human Security and Cyber Security

Question: Discuss about the Human Security and Cyber Security. Answer: 1. Many governments have taken steps together, over a past few decades, to draw a different range of institutions, functions and objectives under the view of national security. This drift is driven by two simple ideas, firstly, citizens and countries face many types of security threats and there is a need to take such threats seriously and give them priority. Secondly, government has many types of policies formulated that will help in the management of security threats. Hence, Governments should take appropriate steps to curb the national threats under the idea of National Security Strategy (Adger et al. 2014). This conceptual question draws a particular attention to human security as the first and most appropriate referent object among others that comprise security, because human security has basic elements to stop severe and escalation of threats. The thought of human security involves a revised identification of measures, instruments and activities. In recent times, the relevant responses to threat include protection of persons in a way that would lead to their empowerment and increase their strength in such a way that gives them the ability to avoid insecure situations. Retention of security and to reestablish compromised security is one of the greatest strength of human protection. Comprised human security means the incapability of human beings to be able to develop themselves and disability to keep them safe and secure. There is no coincidence that this idea was emergent in the years after the Cold War. For even more than forty years, there was one threat perception that overpowered the security issue. The policy instruments that supported the threat perceptions were intelligence forces and armed forces. Since the passage of this era, the voters, the policy makers and the governments were working on improving the threat exceptions and by this time people realized the need of protecting their security that was constantly at risk especially at the time of wars (Amar 2013). The word security can be understood under the light of two problems; firstly, it is applicable to so many things and secondly by applying it to certain things a lot of difference is created as to how we approach it (Adger et al. 2014). However, the word security can cover many things in its broadest sense, and it may include many threats ranging from individual wellbeing to economic wellbeing, interpersonal relationships and a sense of self realization and threats that are associated as part of a society. Therefore, security from a national point of view shall cover many security issues, which pose threat to the social, economic and cultural well being of the nation (Pietsch 2010). However, this only focuses on the threat in which the state is involved. If this question is seen from an opposite direction then it may be concluded that national security of the state is concerned with the individuals in it. This has become a very important factor in the recent decades especially in the development of the concept of human security. Hence, we may say that the most appropriate referent object of security in 21st century is human security (Kaldor, Martin and Selchow 2016). In the year 1990, the term human security was seen as a concept of social welfare of the people, however, as years passed by the meaning of the term was widened and the term included many other factors, such as the economic welfare, psychological welfare and social welfare of the people. The advocates who support the concept of human security have held that if the government focuses on improving the health, economy and social security of an individual then automatically his human security will improve (Chandler 2013). For example, at the time of the Asian Financial Crisis, 1998, the human security of individuals automatically came increased when the social and economic life of people improved. Hence, the overall human security has a lot to do with the health, social and economic improvement of persons. According to Liotta, the national and state security is interconnected with each other in many ways (Paris 2001). Many countries such as Canada see human rights security as part of hum an security. This is a recent notion that is adopted by the developed countries and is in fact the correct notion that should be adopted as part of human security (Adger et al. 2014). The hysteria of the refugees that took place in the United States brought heavy focus on the security after the attacks that took place in Paris and an increasing anti immigration attitude in Europe. This hibernation drift drew the attention of many refugee campaigns that held the view that there is a need to extend the idea of security from merely restricting it to military power of the nation. Security is no longer a product of military or armed forces that prevail in a country and there is much more associated with it in the recent decades (White 2012). Security should be considered and viewed from the angle of expansion and protection of human rights. Hence, the term human security can be understood to include the ideologies of conflict prevention, crisis management and civil military coordination. However, there may be many ideas associated with the concept of human security and this may include responsibility to protect, effective multilateralism and human development. The poin t to keep in mind is that threats are avoided or neutralized simply by protecting people from wars, genocide, radicalization, and tyrannies. The implication of providing protection is the instant avoidance of refugee crisis, challenge of peace and stability of the region, stop terrorism which is seems to be first step of securing interests. Based on the discussion that is stated above in favor of human security, the question that arises here is what is the advantage of human security paradigm and why is it the best security than any other security? If we highlight the importance of human security as a tool then it may have may have many uses, but one clear advantage of human security is the ability to highlight the complexity of a problem that leads to conflicts. This can be understood if one briefly understands the meaning and notion of culture and how this is associated with human security. Culture means a group of people who share similar values and beliefs. People have the tendency to mobilize and socialize with people having similar culture and beliefs and this in turn will allow creation of human security amongst them. This is where human security is regarded as a very helpful conceptual tool (Chandler 2013). As per UN defines human security and its elements, I can say that when group of people are denied those ba sic elements will be focused to react in ways that challenges the world stability in terms of security, economy and socialization. Example, Syrian crisis has been evident to have challenged the regions security, refugees crisis to Europe. Human security is most appropriate object of security because other objects are affected when it is challenged. Conclusively, it may be stated that human security helps an individual to nurture their social and mental well-being. The success of a countrys national security can be best understood and achieved by valuing the human security more than other objects of security. Nations are comprised of humans and individuals and if each of them is secured at their personal level, the growth and prosperity of the nations interests will automatically increase. This human security objectshould be appreciated as first step to providing security to all other means that the states value as their interests. 2. The use of internet all over the world has solved many issues and now it seems to be the promising thing for everyone and everything. From the perspective of global business, it lowers the cost of production while increasing innovation, effectiveness and invention. For many poor and rich countries, the internet has helped in the expansion of markets by providing a wider range of products and services. For people who are repressed, internet provides an outlet and inlet of expression. For communities that are large and small, the internet helps in enabling control over sewage systems, transportation and critical power (Mach 2014). However, as part of the community, we should not forget that internet give offers to terrorists, criminals and wrongdoers to commit wrong in the community by cheating, stealing and striking. While the ability to use the same medium for a positive use there is an associated risk that hampers the security of the nation and with the use of a high tech internet service, the security of the nation can be under threat. The 9/11 commission is a prime example of the misuse of technology and how internet can help the terrorists in the commission of crime. Thus, based on internet issues our future remains uncertain and unclear (Schirch 2013). One cannot devoid the use of internet, as the nations success in terms of economy, health and welfare depends mostly on the use of internet. However, the question that should be considered is whether the enemies can operate our nations system and make use of the services and information contained in them. Unfortunately, there is no clear answer to this question, and the future of the answer to this question shall remain unknown (Langer 2011). Therefore, it is difficult for the nations stakeholders, leaders and policy makers to ensure the people with the fact that the data of the nation remains completely untouched and unknown by outside resources. No guarantee can be provided regarding the adulteration of information and data. We are aware of the fact that cyber exploitation is increasing at a very high level and shall continue to grow knowing the dependency of the nation on the internet systems. Many professionals and academic researchers have identified the risks that are associate d with cyber security and are working on the risk management (Chang 2014). It is a difficult notion to develop a national plan for the protection of cyber threats. The National Cyber Study Group (NCSG) initiated such plans in the past. This body had taken the responsibility to provide protection to those nations who are at a very high risk of cyber threat. It was observed that there are end number of plans and actions that were developed for the protection of cyber threats however, at every level the security measures is seen to be failing and falling. A model was developed by the NCSG for the breakdown of the cyber security strategies comprised of three components Computer Network Operations, Computer Network Defense and Computer Network Exploitation. However, this model brown down very quickly and easily and the NCSG realized it soon that there is a need for the implementation of the policies that are made for cyber security. One might think that it is important to identify the threat to break it down and this can be regarded as a correct approach that c an be divided into three categories: terrorists, criminals and nation states (Tor 2015). If nations have proper defined branches for the functioning of the cyber policies then terrorist and criminal activity may be curbed. In cyberspace, the threat agents are the hackers, terrorist and criminals. The victims that are the threat vectors of such actions are also diversified. The threat actors may be involved in stealing the identity of the persons to commit fraud. In many cases, the victims are institutions and states who suffer due to stealing of identity of the crime perpetrators (Kuehn 2014). The unclear nature of national security in cyberspace has contributed to the debate about the extent of national security within the area of studies related to studies. On one side the studies related to security study focus on the ideologies of neo realists. Stephen Walt developed the ideology of neo realist. According to Walt (1991), the focus of studies related to security is related to the phenomenon of war. The supporters of the theory of neo realists state, that the security measures related to cyber crime should pertain to the impact that cyber attacks have on nations and the military capability of the nat ion to deter such criminal actions (Anand 2012). There has been an opposition to this theory by many researchers, and according to them the study of cyber security has something to do more than the just the military power of the nation. For example, they recognize security not only from the perspective of having appropriate military powers but also include actors such as states, communities and people (Singer, Peter and Friedman 2014). A weak social political cohesion shall be regarded as one of the most vulnerable threats to the security of the nation at all levels and from all sectors. When nations contain resources that are valuable in the eyes of others then that shall be regarded as one of the most vulnerable nation for a cyber threat crime (Anand 2012). This essay contained a brief discussion on the threats that are associated in cyberspace and how it can influence the nations security. Regarding the issues that are related to the national security, many perspectives shall be studied. This essay has discussed in brief about the ways in which cyber crimes should be deterred and prohibited and what appropriate steps are required to take for the restriction of such an application of threats. However, the concern related to the security of the nation from the perspective of cyber crime remains unclear and unsolved mystery. It is therefore advisable for the nations to create a more stringent set of laws for the protection of the nation from cyber threats. References: Adger, W. Neil, Juan M. Pulhin, Jon Barnett, Geoffrey D. Dabelko, Grete K. Hovelsrud, Marc Levy, . Oswald Spring, and Coleen H. Vogel. "Human security." (2014). Amar, Paul.The Security Archipelago: human-security States, sexuality politics, and the end of neoliberalism. Duke University Press, 2013. Amundson, Ronald, Asmeret Asefaw Berhe, Jan W. Hopmans, Carolyn Olson, A. Ester Sztein, and Donald L. Sparks. "Soil and human security in the 21st century."Science348, no. 6235 (2015): 1261071. Anand, Sudhir. "Human security and universal health insurance."The Lancet379, no. 9810 (2012): 9-10. Benedek, Wolfgang, Christopher Daase, Vojin Dimitrijevic, Petrus van Duyne, and Petrus van Duyne, eds.Transnational terrorism, organized crime and peace-building: human security in the Western Balkans. Springer, 2016. Chandler, David C.Freedom vs necessity in international relations: human-centred approaches to security and development. Zed Books, 2013. Chandler, David. "Resilience and human security: The post-interventionist paradigm."Security Dialogue43, no. 3 (2012): 213-229. Johns, Luke, Huong Le Thu, Roland Benedikter, Stefanie Kam, Claire Duncanson, David Morgan, Daniel Golebiewski et al. "A Critical Evaluation of the Concept of Human Security."Canterbury: University of Kent(2014). Kaldor, Mary, Mary Martin, and Sabine Selchow. 2016. "Human Security: A New Strategic Narrative For Europe". International Affairs 83 (2): 273-288. Mach, K., and M. Mastrandrea.Climate change 2014: impacts, adaptation, and vulnerability. Vol. 1. Cambridge, New York, NY: Cambridge University Press, 2014. Martin, Mary, and Taylor Owen.Routledge handbook of human security. Routledge, 2013. Paris, Roland. 2001. "Human Security: Human Paradigm Of Hot Air?". International Security Volume 26 (Issue 2): 87 - 102. Pietsch, Juliet. 2010. "Human Security In Australia: Public Interest And Political Consequences". Australian Journal Of International Affairs 64 (2): 225- 244. doi:10.1080/10357710903544361. Reardon, Betty A. "Women and human security: A feminist framework and critique of the prevailing patriarchal security system." InBetty A. Reardon: Key Texts in Gender and Peace, pp. 109-128. Springer International Publishing, 2015. Schirch, Lisa.Conflict assessment and peacebuilding planning: toward a participatory approach to human security. Boulder and London: Kumarian Press, 2013. Tripp, Aili Mari, Myra Marx Ferree, and Christina Ewig, eds.Gender, Violence, and Human Security: critical feminist perspectives. NYU Press, 2013. White, Hugh. 2012. "The Idea Of National Security: What Use Is It To Policymakers?". National Security College Occasional Paper, 10 - 20. "Cybersecurity Strategy: A Primer For Policy Makers And Those On The Front Line". 2016. JOURNAL OF NATIONAL SECURITY LAW POLICY 4 (27): 29 - 32. https://heinonline.org/HOL/License. Chang, Amy. 2014. "China's Cybersecurity Strategy". Warring State, 27 - 32. Kuehn, Andreas.Extending cybersecurity, securing private internet infrastructure: The US Einstein Program and its Implications for Internet Governance. Springer Berlin Heidelberg, 2014. Langer, Ralph. 2011. "Stuxnet: Dissecting A Cyberwarfare Weapon". Focus, 49 - 51. Singer, Peter W., and Allan Friedman.Cybersecurity: What Everyone Needs to Know. Oxford University Press, 2014. Tor, Uri. 2015. "Cumulative Deterrence As A New Paradigm For Cyber Deterrence". Journal Of Strategic Studies 19 (38): 15 - 19. doi:10.1080/01402390.2015.1115975.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.