Spydus Search Results - Cyber Defence https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?QRY=BS%3A%20(CYBER%20%2B%20DEFENCE)&QRYTEXT=Cyber%20Defence&SETLVL=SET&CF=BIB&SORTS=DTE.DATE1.DESC&NRECS=20 Spydus Search Results en © 2022 Civica Pty Limited. All rights reserved. Defending our cyberspace https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=130397&CF=BIB <span style="font-weight:bold;">Author: </span>Singapore Armed Forces<br /><span style="font-weight:bold;">Published: </span>Singapore 2019<br />POINTER Monograph ; No. 13.<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Monographs/Supplements - Access resource<br /> The IISS Shangri-La Dialogue 2016 https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129451&CF=BIB Programme content for 3 June 2016: Opening remarks; Keynote address.Programme content for 4 June 2016: Opening of the summit by Dr John Chipman; First plenary session - Meeting Asia's complex security challenges; Second plenary session - Managing military competition in Asia; Third plenary session - Making defence policy in uncertian times; Special session 1 - Containing the North Korean threat; Special session 2 - Military capability development: new technologies, limited budgets and hard choices; Special session 3 - The security challenges of irregular migration; Special session 4 - Enhancing cooperation against Jihadi terrorism in Asia; Special session 5 - Managing South China sea tensions; Special session 6 - Identifying common security interests in the cyber-domain.Programme content for 5 June 2016: Fourth plenary session - The challenges of conflict resolution; Fifth plenary session - Pursuing common security objectives. Programme content for 3 June 2016: Opening remarks; Keynote address.<br />Programme content for 4 June 2016: Opening of the summit by Dr John Chipman; First plenary session - Meeting Asia's complex security challenges; Second plenary session - Managing military competition in Asia; Third plenary session - Making defence policy in uncertian times; Special session 1 - Containing the North Korean threat; Special session 2 - Military capability development: new technologies, limited budgets and hard choices; Special session 3 - The security challenges of irregular migration; Special session 4 - Enhancing cooperation against Jihadi terrorism in Asia; Special session 5 - Managing South China sea tensions; Special session 6 - Identifying common security interests in the cyber-domain.<br />Programme content for 5 June 2016: Fourth plenary session - The challenges of conflict resolution; Fifth plenary session - Pursuing common security objectives.<br /><span style="font-weight:bold;">Author: </span>The Asia Security Summit. Shangri-La Hotel, Singapore 2016 15th<br /><span style="font-weight:bold;">Published: </span>Singapore : The International Institute for Security Studies, 2016<br />The IISS Shangri-La Dialogue<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - View Video Online<br /> Will Strengthening The SAF Mean Strengthening Singapore's Deterrence As A Non-Nuclear State? https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129542&CF=BIB Since Singapore’s independence in 1965, protecting her land and sovereignty have remained crucial priorities of the Singapore government. Due to her inherent lack of natural resources, the Singapore Armed Forces has adopted the strategy of Deterrence and Diplomacy through the five pillars of Total Defence. Yet, in today’s world of increasingly unconventional threats such as terrorism and cyber terrorism, is Singapore’s deterrence capability capable and well-equipped to defend Singapore in times of need? This essay will define and explain what deterrence is, before continuing to debate whether the SAF can defend itself in times of need or, if it needs to strengthen itself further as a 3rd Generation Army. The essay will also highlight other important factors that contribute to Singapore’s deterrence strategy, such as the national willpower to fight and if the SAF is sufficiently communicating such messages to the public. Lastly, an evaluation on how the SAF can be strengthened further will also be suggested. Since Singapore’s independence in 1965, protecting her land and sovereignty have remained crucial priorities of the Singapore government. Due to her inherent lack of natural resources, the Singapore Armed Forces has adopted the strategy of Deterrence and Diplomacy through the five pillars of Total Defence. Yet, in today’s world of increasingly unconventional threats such as terrorism and cyber terrorism, is Singapore’s deterrence capability capable and well-equipped to defend Singapore in times of need? This essay will define and explain what deterrence is, before continuing to debate whether the SAF can defend itself in times of need or, if it needs to strengthen itself further as a 3rd Generation Army. The essay will also highlight other important factors that contribute to Singapore’s deterrence strategy, such as the national willpower to fight and if the SAF is sufficiently communicating such messages to the public. Lastly, an evaluation on how the SAF can be strengthened further will also be suggested.<br /><span style="font-weight:bold;">Author: </span>LTC Lee Li Huat<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41 No. 4<br />Pointer Article ; Vol. 41 No. 4<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> Cyber Threat - A Global Security Threat https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129563&CF=BIB The technology boom of the 21st century has led to the rapid rise and influence of the Internet on people around the world. Originally created to interconnect laboratories engaged in government research, the Internet has now become a universal information sharing platform that brings people from all walks of life closertogether. However, this increased interconnectedness of information sharing has its disadvantages and perils. International hacking groups like ‘Anonymous’ have increased efforts to obtain information through illegal and unethical means, while cyber threats like the Stuxnet Worm have become increasingly prevalent. As such, an increasing number of countries are investing more into cyber security to combat these cyber threats. This essay will delve deeper into the nature and extent of cyber threats and its impact on the military and potential cyber defence measures.Keywords: Cyber; Interconnect; Unethical; Security Threats; Information The technology boom of the 21st century has led to the rapid rise and influence of the Internet on people around the world. Originally created to interconnect laboratories engaged in government research, the Internet has now become a universal information sharing platform that brings people from all walks of life closertogether. However, this increased interconnectedness of information sharing has its disadvantages and perils. International hacking groups like ‘Anonymous’ have increased efforts to obtain information through illegal and unethical means, while cyber threats like the Stuxnet Worm have become increasingly prevalent. As such, an increasing number of countries are investing more into cyber security to combat these cyber threats. This essay will delve deeper into the nature and extent of cyber threats and its impact on the military and potential cyber defence measures.Keywords: Cyber; Interconnect; Unethical; Security Threats; Information<br /><span style="font-weight:bold;">Author: </span>ME5 Seah Ser Thong, Calvin<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41, No. 3<br />Pointer Article ; Vol. 41, No. 3<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> How a Good Offence is not the Best Defence: An Analysis of SAF’s Approach to Cyber Warfare https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129579&CF=BIB Technological advancement has ushered in an era of network-centric warfare where cyberspace plays an instrumental role in military operations. Due to its integral nature to modern militaries, cyberspace offers the ideal platform on which military operators can conduct their missions. Cyber warfare refers to the military doctrines and tactics used by operators in their attempt to gain dominance in the realm of cyberspace. Through the analysis of the offensive and the defensive aspects of cyber warfare, this paper argues that the SAF should invest in cyber-defence rather than cyber-offence. In addition, it suggests that by focusing on cyber-defence, the SAF may not only deter potential military aggressions from state actors but also protect Singapore’s civilianinfrastructure and institutions from non-state entities. Technological advancement has ushered in an era of network-centric warfare where cyberspace plays an instrumental role in military operations. Due to its integral nature to modern militaries, cyberspace offers the ideal platform on which military operators can conduct their missions. Cyber warfare refers to the military doctrines and tactics used by operators in their attempt to gain dominance in the realm of cyberspace. Through the analysis of the offensive and the defensive aspects of cyber warfare, this paper argues that the SAF should invest in cyber-defence rather than cyber-offence. In addition, it suggests that by focusing on cyber-defence, the SAF may not only deter potential military aggressions from state actors but also protect Singapore’s civilian<br />infrastructure and institutions from non-state entities.<br /><span style="font-weight:bold;">Author: </span>LTA Ng, Yeow Choon<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41, No. 1<br />Pointer Article ; Vol. 41, No. 1<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br /> The Challenges of Cyber Deterrence https://saftimi.spydus.com.sg/cgi-bin/spydus.exe/ENQ/WPAC/BIBENQ?SETLVL=&BRN=129582&CF=BIB In the cyber realm, there are three necessary pillars of cyber defence strategy—a credible defence, an ability to retaliate and a will to retaliate. The concept of cyber deterrence builds upon this strategy to alter an adversary’s actions for fear of an impossible counter-action. Cyber security is an expensive business and is a difficult strategy to achieve. Despite billions of dollars spent on cyber security, it did not stem the rise in cyber-attacks over the past five years. Cyber deterrence is impractical for most nations given today’s technology and the lack of common interpretation of the international law for the cyber domain. This essay presents obstacles such as attribution, diminishing capability to retaliate, unnecessary escalation, involvement of non-state actors and a potential legal issue that make cyber deterrence a less viable strategy to adopt. In the cyber realm, there are three necessary pillars of cyber defence strategy—a credible defence, an ability to retaliate and a will to retaliate. The concept of cyber deterrence builds upon this strategy to alter an adversary’s actions for fear of an impossible counter-action. Cyber security is an expensive business and is a difficult strategy to achieve. Despite billions of dollars spent on cyber security, it did not stem the rise in cyber-attacks over the past five years. Cyber deterrence is impractical for most nations given today’s technology and the lack of common interpretation of the international law for the cyber domain. This essay presents obstacles such as attribution, diminishing capability to retaliate, unnecessary escalation, involvement of non-state actors and a potential legal issue that make cyber deterrence a less viable strategy to adopt.<br /><span style="font-weight:bold;">Author: </span>MAJ Lee, Hsiang Wei<br /><span style="font-weight:bold;">In: </span>Pointer Vol. 41, No. 1<br />Pointer Article ; Vol. 41, No. 1<br /><br />SAFTI MI Library - (SAFTI MI) - Online Resources - POINTER Articles - Access resource<br />