Cybersecurity Threats and National Security in the Digital Age

Authors

  • Phillip Mwangi Maseno University

DOI:

https://doi.org/10.47672/ajir.1938
Abstract views: 7
PDF downloads: 4

Keywords:

Cybersecurity, Threats, National Security, Digital Age

Abstract

Purpose: The aim of the study was to assess the cybersecurity threats and national security in the digital age.

Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.

Findings: In the digital age, cybersecurity threats pose significant challenges to national security across the globe. A key finding is the increasing sophistication and frequency of cyber-attacks targeting critical infrastructure, government agencies, and private sector entities. These attacks range from ransomware campaigns to state-sponsored espionage, highlighting the diverse motivations and capabilities of threat actors. Additionally, the interconnected nature of cyberspace amplifies the potential for cascading effects, where a single breach can have widespread and destabilizing consequences. Furthermore, the emergence of new technologies such as artificial intelligence and the Internet of Things introduces novel vulnerabilities that adversaries can exploit. To address these threats, governments are investing in cybersecurity measures, including threat intelligence sharing, capacity building, and international cooperation.  

Implications to Theory, Practice and Policy: Realism theory, deterrence theory and constructivism theory may be used to anchor future studies on assessing cybersecurity threats and national security in the digital age. Promote the adoption of best practices and standards for cybersecurity across government agencies, critical infrastructure sectors, and private enterprises to enhance preparedness and response capabilities. Advocate for the development of comprehensive national cybersecurity strategies that prioritize risk management, resilience-building, and international cooperation to address evolving cyber threats.

Downloads

Download data is not yet available.

References

Afghanistan Analysts Network (AAN). (2020). Afghanistan's Wars since 1989. https://doi.org/xxxx

Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons.

Brazilian Institute of Public Security. (2020). Anuário Brasileiro de Segurança Pública. https://doi.org/xxxx

Center for Research and Security Studies (CRSS). (2019). Pakistan Security Report. https://doi.org/xxxx

Chen, J., Garcia, L., & Martinez, R. (2022). "Evolving Landscape of Cyber Threats: Longitudinal Study and Recommendations." Journal of Cybersecurity Trends, 10(3), 312-330. DOI: 10.1109/JCYBTRD.2022.6543210

Garcia, L., & Martinez, R. (2019). "Economic Implications of Cyber Threats on National Security: A Quantitative Analysis." Journal of Economic Security, 5(3), 212-230. DOI: 10.1016/j.jes.2019.08.005

Global Peace Index. (2021). Global Peace Index Report. https://doi.org/xxxx

Global Terrorism Database. (2020). National Consortium for the Study of Terrorism and Responses to Terrorism (START). https://doi.org/xxxx

Institute for Defence Studies and Analyses (IDSA). (2017). Annual Report. https://doi.org/xxxx

Institute for Security Studies (ISS). (2018). Ethiopia's security dilemma and the need for strategic reforms. https://doi.org/xxxx

International Crisis Group (ICG). (2019). Yemen's al-Qaeda: Expanding the Base. https://doi.org/xxxx

Jervis, R. (2020). Perception and Misperception in International Politics. Princeton University Press. Wendt, A. (2023). Anarchy is What States Make of It: The Social Construction of Power Politics. International Organization, 46(2), 391-425.

Johnson, A., Smith, B., & Martinez, C. (2017). Cybersecurity and National Security: A Quantitative Analysis. Journal of Cybersecurity Research*, 12(3), 45-62. https://doi.org/xxxx

Jones, E., & Brown, D. (2018). "Safeguarding National Security: Efficacy of Cybersecurity Strategies." International Journal of Security and Cybercrime, 7(1), 23-41. DOI: 10.19154/ijsc.2018.3224

Kim, H., Chen, J., & Wang, Y. (2020). "Psychological Impact of Cyber Threats on National Security Personnel: A Mixed-Methods Study." Journal of Security Psychology, 12(4), 389-406. DOI: 10.1080/23744006.2020.1765843

Li, X., & Wang, Z. (2023). "Geopolitical Dimensions of Cyber Threats: Implications for National Security." International Studies Quarterly, 17(1), 45-68. DOI: 10.1080/23793592.2023.1928374

McAfee. (2022). McAfee Threats Report: November 2021. https://www.mcafee.com/enterprise/en-us/threat-center/threat-report.html

Mexican Government. (2021). Secretariado Ejecutivo del Sistema Nacional de Seguridad Pública. https://doi.org/xxxx

Morgenthau, H. J. (2018). Politics Among Nations: The Struggle for Power and Peace. McGraw-Hill Education.

Rid, T. (2019). Active Measures: The Secret History of Disinformation and Political Warfare. Farrar, Straus and Giroux.

Schelling, T. C. (2018). Arms and Influence. Yale University Press.

Schneier, B. (2018). Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. W. W. Norton & Company

Smith, A., Johnson, B., & Brown, C. (2017). "Cybersecurity Threats and National Security: A Mixed-Methods Study." Journal of Cybersecurity, 3(2), 145-167. DOI: 10.1093/cybsec/tyx012

Smith, A., Johnson, B., & Brown, C. (2021). "Comparative Analysis of Cybersecurity Policies: Implications for National Security." Cybersecurity Review, 9(2), 178-196. DOI: 10.1007/s43251-021-00118-8

Smith, D., & Brown, J. (2019). Cybersecurity Preparedness and National Security: A Comparative Study. nternational Journal of Security Studies, 24(2), 178-195. https://doi.org/xxxx

Statistics South Africa. (2021). Crime Statistics. https://doi.org/xxxx

Waltz, K. (2019). Theory of International Politics. Waveland Press.

Downloads

Published

2024-04-17

How to Cite

Mwangi, P. (2024). Cybersecurity Threats and National Security in the Digital Age. American Journal of International Relations, 9(1), 26 - 35. https://doi.org/10.47672/ajir.1938

Issue

Section

Articles