Other
BibTex RIS Cite
Year 2020, Volume: 2 Issue: 2, 98 - 111, 31.12.2020

Abstract

References

  • Xiaoxing, S., 2017. The Theatre Times. [Online] Available at: https://thetheatretimes.com/cyber-theatre-china-performance-action/ [Accessed 27 January 2019].
  • Chatzichristodoulou, M., n.d. Cymposium.net. [Online] Available at: http://www.cyposium.net/wp-content/uploads/2012/09/maria_text.pdf [Accessed 27 January 2019].
  • Osho, O. & Onoja, A. D., 2015. National Cyber Security Policy and Strategy of Nigeria: a Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), pp. 120-443.
  • Luiijf, E., Besseling, K. & Patrick, d. G., 2013. Nineteen National Cyber Security Strategies. International Journal of Critical Infrastructure, 9(1/2), pp. 3-31. Department of Defence, 2018. Department of Defence Cyber Strategy, Washington DC: DoD.
  • Porup, J., 2017. CSO. [Online] Available at: https://www.csoonline.com/article/3242690/data-protection/what-is-cyber-security-how-to-build-a-cyber-security-strategy.html [Accessed 27 January 2019].
  • Mansbach, W. R. & Taylor, L. K., 2012. Introduction to Global Politics. 2nd ed. New York: Routledge.
  • Cambridge University Press, 2020. Cyber. [Online] Available at: https://dictionary.cambridge.org/dictionary/english/cyber [Accessed 23 September 2020].
  • Kaspersky, 2020. What is Cyber Security?. [Online] Available at: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [Accessed 23 September 2020].
  • Merriam-Webster, 2020. Cyberattack. [Online] Available at: https://www.merriam-webster.com/dictionary/cyberattack [Accessed 23 September 2020].
  • Sheldon, J. B., 2016. Cyberwar. [Online] Available at: https://www.britannica.com/topic/cyberwar [Accessed 23 September 2020].
  • BBC, 2020. US charges Chinese Covid-19 research 'cyber-spies'. [Online] Available at: https://www.bbc.com/news/world-us-canada-53493028 [Accessed 23 September 2020].
  • Lenthang, M., 2020. China, Russia and Iran 'have deployed spies to steal US vaccine research in an intelligence war targeting biotech companies and university research centres'. [Online] Available at: https://www.dailymail.co.uk/news/article-8703843/China-Russia-Iran-deployed-spies-steal-vaccine-research-intelligence-war.html [Accessed 23 September 2020].
  • De Groot, J., 2020. What is Cyber Security? Definition, Best Practices & More. [Online] Available at: https://digitalguardian.com/blog/what-cyber-security [Accessed 23 September 2020].
  • Dennis, M. A., 2020. Cybercrime. [Online] Available at: https://www.britannica.com/topic/cybercrime#ref235699 [Accessed 24 September 2020].
  • enisa, 2019. National Cybersecurity Strategies. [Online] Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies [Accessed 28 January 2019].
  • Trump, D. J., 2018. NATIONAL CYBER STRATEGY of the United States of America. [Online] Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf [Accessed 24 September 2020].

Cyber Theatre: a fifth domain of international politics

Year 2020, Volume: 2 Issue: 2, 98 - 111, 31.12.2020

Abstract

The cyberspace has now become a space theatre that enshrines activities such as cyber strategy, cybersecurity, cyber defence, and cyberwar. The cyberspace is a realm likened to the global arena where involved or interested actors are spurred by one interest or the other. The challenge in such a realm is the lack of a central authority to enforce order. This explains why the cyberspace will remain an arena of cyberwar since no state nor individual has a monopoly over the internet. Issue of anonymous identity in the cyberspace has proven to be a challenge without a solution in sight as National Cyber Securities are infiltrated by trojans and cyber-actors. However, national cybersecurity has made success in identifying the source or location of a cyber-threat or attack, but identifying the attacker or hacker remains unattainable due to the anonymity of the attackers who have perfected the art of hiding their identity during cyber-attacks, although there are success stories of hackers being identified, this remains scanty. The cyberspace is a double-edged sword at the individual unit, state and global levels. Cyberwar can only come to an abrupt opt when morality becomes a norm. Cyberwar is a means to an end in the hands of cyber-actors. China, Russia, North Korea, Iran, America, terrorist networks, individuals, investors, universities, companies, and other stakeholders have prioritised the use of cyberspace due to its efficiency and accuracy. The cyberspace has presented itself to humanity as a viable alternative to land, water, and space.

References

  • Xiaoxing, S., 2017. The Theatre Times. [Online] Available at: https://thetheatretimes.com/cyber-theatre-china-performance-action/ [Accessed 27 January 2019].
  • Chatzichristodoulou, M., n.d. Cymposium.net. [Online] Available at: http://www.cyposium.net/wp-content/uploads/2012/09/maria_text.pdf [Accessed 27 January 2019].
  • Osho, O. & Onoja, A. D., 2015. National Cyber Security Policy and Strategy of Nigeria: a Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), pp. 120-443.
  • Luiijf, E., Besseling, K. & Patrick, d. G., 2013. Nineteen National Cyber Security Strategies. International Journal of Critical Infrastructure, 9(1/2), pp. 3-31. Department of Defence, 2018. Department of Defence Cyber Strategy, Washington DC: DoD.
  • Porup, J., 2017. CSO. [Online] Available at: https://www.csoonline.com/article/3242690/data-protection/what-is-cyber-security-how-to-build-a-cyber-security-strategy.html [Accessed 27 January 2019].
  • Mansbach, W. R. & Taylor, L. K., 2012. Introduction to Global Politics. 2nd ed. New York: Routledge.
  • Cambridge University Press, 2020. Cyber. [Online] Available at: https://dictionary.cambridge.org/dictionary/english/cyber [Accessed 23 September 2020].
  • Kaspersky, 2020. What is Cyber Security?. [Online] Available at: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [Accessed 23 September 2020].
  • Merriam-Webster, 2020. Cyberattack. [Online] Available at: https://www.merriam-webster.com/dictionary/cyberattack [Accessed 23 September 2020].
  • Sheldon, J. B., 2016. Cyberwar. [Online] Available at: https://www.britannica.com/topic/cyberwar [Accessed 23 September 2020].
  • BBC, 2020. US charges Chinese Covid-19 research 'cyber-spies'. [Online] Available at: https://www.bbc.com/news/world-us-canada-53493028 [Accessed 23 September 2020].
  • Lenthang, M., 2020. China, Russia and Iran 'have deployed spies to steal US vaccine research in an intelligence war targeting biotech companies and university research centres'. [Online] Available at: https://www.dailymail.co.uk/news/article-8703843/China-Russia-Iran-deployed-spies-steal-vaccine-research-intelligence-war.html [Accessed 23 September 2020].
  • De Groot, J., 2020. What is Cyber Security? Definition, Best Practices & More. [Online] Available at: https://digitalguardian.com/blog/what-cyber-security [Accessed 23 September 2020].
  • Dennis, M. A., 2020. Cybercrime. [Online] Available at: https://www.britannica.com/topic/cybercrime#ref235699 [Accessed 24 September 2020].
  • enisa, 2019. National Cybersecurity Strategies. [Online] Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies [Accessed 28 January 2019].
  • Trump, D. J., 2018. NATIONAL CYBER STRATEGY of the United States of America. [Online] Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf [Accessed 24 September 2020].
There are 16 citations in total.

Details

Primary Language English
Journal Section Research Articles
Authors

Lukman Adewale Quadrı 0000-0002-1352-030X

Monsuru Olaitan Rasaq 0000-0002-3849-1234

Publication Date December 31, 2020
Published in Issue Year 2020 Volume: 2 Issue: 2

Cite

APA Quadrı, L. A., & Rasaq, M. O. (2020). Cyber Theatre: a fifth domain of international politics. Akdeniz Havzası Ve Afrika Medeniyetleri Dergisi, 2(2), 98-111.

Article acceptance continues forupcoming 2024 issues.