Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
GlobalTrendsinCybersecurity
19
Heldemphasizesthattheaforementionedprocesses“areconnectedtotech-
nologicaldevelopment,whichmadethempossibleinthefirstplace.Theresult
isincreasingglobalinterdependenceandcomplexity.”8
Twootherscholarsrecognizemilitaryglobalizationas“long-distancenetworks
ofinterdependenceinwhichforce,andthethreatorpromiseofforce,areemployed.”9
Asthemostrecognizedauthorsagreethattheprocessofmilitaryglobaliza-
tionbeganlongtimeago,somestatethatitwasfirstobservedwithEuropean
colonialempiresintroducedmilitaryoperationsontheglobalscaleduringthe
AgeofDiscovery.FurthermoreEuropean“imperialrivalryledtotheFirstWorld
War,whichwasthefirstglobalconflictinworldhistory.”10Otherspecialists
datemilitaryglobalizationasasoldasduringthetimeofAlexandertheGreat’s
conquests.11Theauthorsofthisarticleagreewithaforementionedviewsthat
globalizationhasveryancientrootsandwillconstantlyevolveandwouldlike
toemphasizethatdespiteofthefactthatglobalizationrelatedtocybersecurity
isforobviousreasons(creationandpopularizationofinternet)quitearecent
phenomenaitisimportanttorememberofitslonghistory.
Asmentionedbeforeglobalizationprocessesnowadayshavetotallydifferent
extendthanbeforetheinternetandcomputerswerecreated.Thishelpedtospeed
upwork,increasetheexchangeofinformationandenabledcooperationtothe
levelneverseenbefore.Atthesametimethatcreatednewkindsofthreats,i.e.
thecyberattackconductedin2015onSonyPictures,intendedtopreventitfrom
releasingthemovie“TheInterview”-combinedwiththreatsofphysicalattacks
oncivilianswasagreatexampleonhowimportantiscybersecurity.Ithasbeen
revealedthatNorthKoreauseditscybercapacitiesinordertoattackthatUS
company.Howthiskindofattackshouldbetreated-shouldUSreactsifit
wasawarfareactivityagainstaneconomicentityregisteredonitsterritory?Of
courseanattackonacompanythatisnotanelementofcriticalinfrastructure
mightbetreateddifferently-stillasitwillbedescribedinthefurtherpartofthis
article-therearemanycaseswhentheelementsofcriticalinfrastructureinone
countryaresubjecttocyberattacksconductedbyindividalsfromanothercountry.
Thecomplexityanddangersincyberspaceareevergrowing.Atthesame
timetheweaknessesinprotectingprivatecompaniesandstatesincyberspaceof
isevident,whichisapplicablenotonlytoobtainingandanalyzingdatainorder
topreparepreventiveactivitiesbutalsoinrepellingtheattack,resistingitnot
8
Ibidem,p.89.
9
R.Keohane,J.Nye,PowerandInterdependence,Boston:Little,BrownandCo,2002,p196.
10
A.Krishnan,WarsasBusiness:TechnologicalChangeandMilitaryServiceContracting,London
&NewYork:Routledge,2008,p158.
11
R.Keohane,PowerandGovernanceinaPartiallyGlobalizedWorld,London&NewYork:
Routledge,2002,p.195.