Asia Pacific Security Magazine, May/June 2018

Page 48

Cyber Security

Ulf Lindqvist (Program Director, Computer Science Laboratory, SRI International), at the IEEE World Forum Internet of Thing ,on “Security and Privacy Regimes” was also a focal area. Photo Credit: SRI International

At the Asia Defence Expo & Conference 2018, Lieutenant Colonel Chris Walls, US Army, ÜS Army doctrinal approach to Cyberspace and electronic warfare operations). Photo Credit: Asia Defence Expo & Conference 2018

connectivity capability for cyberspace operations” and “many cyberspace operations occur in and through the space domain via the EMS (electromagnetic spectrum), resulting in an interdependent relationship between space and cyberspace.” Lieutenant Colonel Chris Walls, US Army, summed up very well at the Asia Defence Expo & Conference 2018 (Marina Bay Sands, Singapore 30-31 January 2018), “US Army doctrinal approach to Cyberspace and electronic warfare operations” that: “Cyberspace pervades the land, air, maritime, and space domains through the EMS and wired networks. Cyberspace enables integration across physical domains by moving data along transmission paths through links and nodes in cyberspace and the EMS.”. Internet-of-Things Indeed, as we become more inter-connected and the Internet of Things permeate our lives, what we commonly

48 | Asia Pacific Security Magazine

refer as Cyber Space will extend from ground-based assets to Space, which raises the question of jurisdiction and ownership, when it comes to building protection and defenses. Ulf Lindqvist (Program Director, Computer Science Laboratory, SRI International, said, at the IEEE World Forum Internet of Things “Security and Privacy Regimes” track (Marina Bay Sands, Singapore 6th -8th February 2018), “when the security of a single system is under consideration, then it’s easy to imagine that a portion of the system is responsible for limiting access and actions. In an IoT setting, it’s possible that some sensors and some actuators won’t be owned by the same organization.” As the boundary of Internet of Things expand, the questions of ‘To what extent can some control be shared with another entity?” and “If something goes wrong, who’s responsible for the real-world effects?” makes holistic approach an increasingly important one, but also cooperation between public and private sectors at national, and inter-national levels.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Asia Pacific Security Magazine, May/June 2018 by MySecurity Marketplace - Issuu