Spydus Search Results - Anywhere: Cyber Defence (Keywords) https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/ALLENQ?QRY=GENBSOPAC%3A%20(CYBER%20%2B%20DEFENCE)&QRYTEXT=Anywhere%3A%20Cyber%20Defence%20(Keywords)&SETLVL=SET&SORTS=MAIN.CREATED_DATE.DESC%5DMAIN.CREATED_TIME.DESC&NRECS=20 Spydus Search Results en © 2022 Civica Pty Limited. All rights reserved. NATO - The largest military alliance in the world | DW Documentary https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/ERSENQ?SETLVL=&RNI=389220 <span style="HTML">The film embarks on a journey across the Alliance's territory. The filmmakers visit Tallinn, in Estonia, where NATO's Cyber Defence Centre is located. From here they travel on to Ulm, in Germany, where the deployment of troops and supplies is organized. The next stop is NATO headquarters in Brussels, where political decisions are made. The film hears from high-ranking current and former NATO generals and security experts along the way.</span> <span style="HTML">The film embarks on a journey across the Alliance's territory. The filmmakers visit Tallinn, in Estonia, where NATO's Cyber Defence Centre is located. From here they travel on to Ulm, in Germany, where the deployment of troops and supplies is organized. The next stop is NATO headquarters in Brussels, where political decisions are made. The film hears from high-ranking current and former NATO generals and security experts along the way.</span><br /><span style="font-weight:bold;">Resource type: </span>Video<br /> Defending our cyberspace https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=130397 <span style="font-weight:bold;">Author: </span>Singapore Armed Forces<br /><span style="font-weight:bold;">Published: </span>Singapore 2019<br />POINTER Monograph ; No. 13.<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Monographs/Supplements - Access resource<br /> The Challenges of Cyber Deterrence https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129582 In the cyber realm, there are three necessary pillars of cyber defence strategy—a credible defence, an ability to retaliate and a will to retaliate. The concept of cyber deterrence builds upon this strategy to alter an adversary’s actions for fear of an impossible counter-action. Cyber security is an expensive business and is a difficult strategy to achieve. Despite billions of dollars spent on cyber security, it did not stem the rise in cyber-attacks over the past five years. Cyber deterrence is impractical for most nations given today’s technology and the lack of common interpretation of the international law for the cyber domain. This essay presents obstacles such as attribution, diminishing capability to retaliate, unnecessary escalation, involvement of non-state actors and a potential legal issue that make cyber deterrence a less viable strategy to adopt. In the cyber realm, there are three necessary pillars of cyber defence strategy—a credible defence, an ability to retaliate and a will to retaliate. The concept of cyber deterrence builds upon this strategy to alter an adversary’s actions for fear of an impossible counter-action. Cyber security is an expensive business and is a difficult strategy to achieve. Despite billions of dollars spent on cyber security, it did not stem the rise in cyber-attacks over the past five years. Cyber deterrence is impractical for most nations given today’s technology and the lack of common interpretation of the international law for the cyber domain. This essay presents obstacles such as attribution, diminishing capability to retaliate, unnecessary escalation, involvement of non-state actors and a potential legal issue that make cyber deterrence a less viable strategy to adopt.<br /><span style="font-weight:bold;">Author: </span>MAJ Lee, Hsiang Wei<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41, No. 1<br />Pointer Article ; Vol. 41, No. 1<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> V41N1 - How a Good Offence is not the Best Defence An Analysis of SAF Approach to Cyber Warfare https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/DAENQ?SETLVL=&RI=72418 <span style="font-weight:bold;">Date created: </span>09 Apr 2015 - 12:00 AM<br /><span style="font-weight:bold;">File details: </span>Text (pdf) - 264.88 KB<br /><span style="font-weight:bold;">Document ID: </span>567<span style="font-weight:bold;"> - Version: </span>1<br /> How a Good Offence is not the Best Defence: An Analysis of SAF’s Approach to Cyber Warfare https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129579 Technological advancement has ushered in an era of network-centric warfare where cyberspace plays an instrumental role in military operations. Due to its integral nature to modern militaries, cyberspace offers the ideal platform on which military operators can conduct their missions. Cyber warfare refers to the military doctrines and tactics used by operators in their attempt to gain dominance in the realm of cyberspace. Through the analysis of the offensive and the defensive aspects of cyber warfare, this paper argues that the SAF should invest in cyber-defence rather than cyber-offence. In addition, it suggests that by focusing on cyber-defence, the SAF may not only deter potential military aggressions from state actors but also protect Singapore’s civilianinfrastructure and institutions from non-state entities. Technological advancement has ushered in an era of network-centric warfare where cyberspace plays an instrumental role in military operations. Due to its integral nature to modern militaries, cyberspace offers the ideal platform on which military operators can conduct their missions. Cyber warfare refers to the military doctrines and tactics used by operators in their attempt to gain dominance in the realm of cyberspace. Through the analysis of the offensive and the defensive aspects of cyber warfare, this paper argues that the SAF should invest in cyber-defence rather than cyber-offence. In addition, it suggests that by focusing on cyber-defence, the SAF may not only deter potential military aggressions from state actors but also protect Singapore’s civilian<br />infrastructure and institutions from non-state entities.<br /><span style="font-weight:bold;">Author: </span>LTA Ng, Yeow Choon<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41, No. 1<br />Pointer Article ; Vol. 41, No. 1<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> Cyber Threat - A Global Security Threat https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129563 The technology boom of the 21st century has led to the rapid rise and influence of the Internet on people around the world. Originally created to interconnect laboratories engaged in government research, the Internet has now become a universal information sharing platform that brings people from all walks of life closertogether. However, this increased interconnectedness of information sharing has its disadvantages and perils. International hacking groups like ‘Anonymous’ have increased efforts to obtain information through illegal and unethical means, while cyber threats like the Stuxnet Worm have become increasingly prevalent. As such, an increasing number of countries are investing more into cyber security to combat these cyber threats. This essay will delve deeper into the nature and extent of cyber threats and its impact on the military and potential cyber defence measures.Keywords: Cyber; Interconnect; Unethical; Security Threats; Information The technology boom of the 21st century has led to the rapid rise and influence of the Internet on people around the world. Originally created to interconnect laboratories engaged in government research, the Internet has now become a universal information sharing platform that brings people from all walks of life closertogether. However, this increased interconnectedness of information sharing has its disadvantages and perils. International hacking groups like ‘Anonymous’ have increased efforts to obtain information through illegal and unethical means, while cyber threats like the Stuxnet Worm have become increasingly prevalent. As such, an increasing number of countries are investing more into cyber security to combat these cyber threats. This essay will delve deeper into the nature and extent of cyber threats and its impact on the military and potential cyber defence measures.Keywords: Cyber; Interconnect; Unethical; Security Threats; Information<br /><span style="font-weight:bold;">Author: </span>ME5 Seah Ser Thong, Calvin<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41, No. 3<br />Pointer Article ; Vol. 41, No. 3<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> Will Strengthening The SAF Mean Strengthening Singapore's Deterrence As A Non-Nuclear State? https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129542 Since Singapore’s independence in 1965, protecting her land and sovereignty have remained crucial priorities of the Singapore government. Due to her inherent lack of natural resources, the Singapore Armed Forces has adopted the strategy of Deterrence and Diplomacy through the five pillars of Total Defence. Yet, in today’s world of increasingly unconventional threats such as terrorism and cyber terrorism, is Singapore’s deterrence capability capable and well-equipped to defend Singapore in times of need? This essay will define and explain what deterrence is, before continuing to debate whether the SAF can defend itself in times of need or, if it needs to strengthen itself further as a 3rd Generation Army. The essay will also highlight other important factors that contribute to Singapore’s deterrence strategy, such as the national willpower to fight and if the SAF is sufficiently communicating such messages to the public. Lastly, an evaluation on how the SAF can be strengthened further will also be suggested. Since Singapore’s independence in 1965, protecting her land and sovereignty have remained crucial priorities of the Singapore government. Due to her inherent lack of natural resources, the Singapore Armed Forces has adopted the strategy of Deterrence and Diplomacy through the five pillars of Total Defence. Yet, in today’s world of increasingly unconventional threats such as terrorism and cyber terrorism, is Singapore’s deterrence capability capable and well-equipped to defend Singapore in times of need? This essay will define and explain what deterrence is, before continuing to debate whether the SAF can defend itself in times of need or, if it needs to strengthen itself further as a 3rd Generation Army. The essay will also highlight other important factors that contribute to Singapore’s deterrence strategy, such as the national willpower to fight and if the SAF is sufficiently communicating such messages to the public. Lastly, an evaluation on how the SAF can be strengthened further will also be suggested.<br /><span style="font-weight:bold;">Author: </span>LTC Lee Li Huat<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41 No. 4<br />Pointer Article ; Vol. 41 No. 4<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> The IISS Shangri-La Dialogue 2016 https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129451 Programme content for 3 June 2016: Opening remarks; Keynote address.Programme content for 4 June 2016: Opening of the summit by Dr John Chipman; First plenary session - Meeting Asia's complex security challenges; Second plenary session - Managing military competition in Asia; Third plenary session - Making defence policy in uncertian times; Special session 1 - Containing the North Korean threat; Special session 2 - Military capability development: new technologies, limited budgets and hard choices; Special session 3 - The security challenges of irregular migration; Special session 4 - Enhancing cooperation against Jihadi terrorism in Asia; Special session 5 - Managing South China sea tensions; Special session 6 - Identifying common security interests in the cyber-domain.Programme content for 5 June 2016: Fourth plenary session - The challenges of conflict resolution; Fifth plenary session - Pursuing common security objectives. Programme content for 3 June 2016: Opening remarks; Keynote address.<br />Programme content for 4 June 2016: Opening of the summit by Dr John Chipman; First plenary session - Meeting Asia's complex security challenges; Second plenary session - Managing military competition in Asia; Third plenary session - Making defence policy in uncertian times; Special session 1 - Containing the North Korean threat; Special session 2 - Military capability development: new technologies, limited budgets and hard choices; Special session 3 - The security challenges of irregular migration; Special session 4 - Enhancing cooperation against Jihadi terrorism in Asia; Special session 5 - Managing South China sea tensions; Special session 6 - Identifying common security interests in the cyber-domain.<br />Programme content for 5 June 2016: Fourth plenary session - The challenges of conflict resolution; Fifth plenary session - Pursuing common security objectives.<br /><span style="font-weight:bold;">Author: </span>The Asia Security Summit. Shangri-La Hotel, Singapore 2016 15th<br /><span style="font-weight:bold;">Published: </span>Singapore : The International Institute for Security Studies, 2016<br />The IISS Shangri-La Dialogue<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - View Video Online<br />