The Cybersecurity, Cyber Threats, Cyberterrorism, and Cybersecurity Framework for Critical Information Infrastructure for the Ministry of Defence of Thailand
Main Article Content
Abstract
The current cyber threats pose a unique danger that differs from traditional threats, highly sophisticated, rapidly evolving, and not limited to external sources but can also originate within a country or organization. The impact can be severe, leading to chaos and disrupting the lives of people within the nation. Preventing and countering cyber threats is challenging due to the difficulty in identifying their precise origins and the interconnected nature of cyber threats, ranging from cybercrime and terrorism to cyberwarfare. This significantly affects various agencies, particularly the Ministry of Defense, as a critical information infrastructure agency responsible for ensuring cybersecurity. It is imperative to implement cybersecurity measures in accordance with international standards, following established practices and frameworks mandated by law. Continuous development and improvement of these standards are necessary to keep up with the rapidly changing cyber landscape and effectively address future cyber threats.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
บทความ ภาพ ตาราง กราฟ ข้อเขียน หรือความคิดเห็นในวารสารฉบับนี้เป็นของผู้เขียนไม่ผูกพันกับสถาบันวิชาการป้องกันประเทศ และทางวิชาการแต่อย่างใดReferences
Cherry, L. M., & Pascucci, P. P. (2023). International Law in Cyberspace. Retrieved May 26, 2023 from https://www.americanbar.org/groups/law_national_security/publications/aba-standing-committee-on-law-and-national-security-60-th-anniversary-an-anthology/international-law-in-cyberspace/
“Cyber Security Act B.E. 2562” (2019, 27 May). Government Gazette. No.136 Chapter 69 Kor. p.21.
“Cybersecurity Governance Committee announcement the Code of Practice and Cybersecurity Standards Framework for Government and Critical Information Infrastructure B.E. 2564” (2021, 6 September). Government Gazette. No.138 Special Chapter 208 Ngor. p.9-15.
Electronic Transactions Development Agency. (2023). APT group: SaintBear, Lorec53. Retrieved May 26, 2023 from https://apt.etda.or.th/cgi-bin/showcard.cgi?g=SaintBear%2C%20Lorec53&n=1
Federal Bureau of Investigation. (2002). The Terrorist Threat Confronting the United States. Retrieved May 26, 2023 from https://archives.fbi.gov/archives/news/testimony/the-terrorist-threat-confronting-the-united-states
Gilbert, B. (2021). Steganography: Why it Matters in a 'Post 911' World. Retrieved May 26, 2023 from https://sansorg.egnyte.com/dl/HMuLiHg6kM
Headquarters, Department of Army. (2021). FM 3-12 Cyberspace Operations and Electromagnetic Warfare. Washington D.C.: Department of Army.
Holmes, K. R. (2015). What is National Security. Washington D.C.: The Heritage Foundation.
Hutchins, E. M., Cloppert, M. J., & Armin, R. M., (2011). Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains (Leading Issues in Information Warfare & Security Research).
Kaspersky. (n.d.). What is a Whaling Attack?. Retrieved May 29, 2023 from https://www.kaspersky.com/resource-center/definitions/what-is-a-whaling-attack
Kerner, S. M. (2022). Colonial Pipeline hack explained: Everything you need to know. Retrieved May 29, 2023 from https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-need-to-know
Lincoln, A. (1862). Annual Message to Congress-Concluding Remarks. Retrieved May 26, 2023 from https://www.abrahamlincolnonline.org/lincoln/speeches/congress.htm
Maymi, F. & Harris, S. (2021). CISSP All-in-One Exam Guide (9th ed.). New York: McGraw Hill.
Morgan, S. (2022). 2022 Official Cybercrime Report. New York: Cybersecurity Venture.
Nakashima, E. (2011). Cyber-intruder sparks response, debate. Retrieved May 26, 2023 from https://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html
National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved May 26, 2023 from https://www.nist.gov/cyberframework/framework
Osborne, C. (2022). CaddyWiper: More destructive wiper malware strikes Ukraine. Retrieved May 26, 2023 from https://www.zdnet.com/article/caddywiper-more-destructive-wiper-malware-strikes-ukrainian-targets/
Qadir, S., & Quadri, S. M. K. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security, 7(3) Retrieved May 26, 2023 from https://scirp.org./journal/paparinformation.aspx?paperid=65521
RUSSIANGOST. (n.d.). GOST R ISO/IEC 27001-2006. Retrieved May 26, 2023 from https://www.russiangost.com/p-73178-gost-r-isomek-27001-2006.aspx
Secretariat of National Information Security Standardization Technical Committee. (2019). Introduction of Cyber Security National Standards.
World Economic Forum. (2023). The Global Risk Report 2023. Geneva: World Economic Forum.