News

CALL FOR PAPERS DECEMBER 2024

IJSAR going to launch new issue Volume 05, Issue 12, December 2024; Open Access; Peer Reviewed Journal; Fast Publication. Please feel free to contact us if you have any questions or comments send email to: editor@scienceijsar.com

IMPACT FACTOR: 6.673

Submission last date: 15th December 2024

Enhancing global security and peaceful coexistence: the imperatives of cyberseurity architecture

×

Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6609 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6609 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
Author: 
Emmanuel Eturpa SALAMI and Olusoji David POPOOLA
Page No: 
4676-4679

The greatest threat to world peace and security in recent times are those happening through the cyberspace. The sophistication and devastations of these threats recorded through cyberattacks across the world in recent times has brought to the fore the vulnerabilities of both strong and weak nations. Today warfare, whether political or economic between nations or states have metamorphosed from the conventional modes into a cyberwarfare which is more deadly and this has severely jeopardized global security and peace of humanity. This study examined how global security and peaceful coexistence can be enhanced through the sharpening of cybersecurity architecture. In the study, some incidences of cyberattacks across the world were examined, responses of the global community were reviewed, African nations experiences of cybersecurity threats were discussed among others. Standing on the game theory, (Non-zero Sum), the study suggested an integrated approach to formulating and implementing workable global cybersecurity architecture where the interests of all stakeholders are factored in and protected.

Download PDF: