Fortress or Fragile? “Unlocked” and The Cybersecurity Challenges of Global Interdependence

Written by Leila Keumala Raseuki

Lee Na Mi, a digital marketer thriving at a small startup, clutched her phone like a talisman. It was not just a device, it was a portal to her entire world. Stacks of work deadlines, friendships bloomed in chat threads, and even her love life swiped right on the tiny screen. Lee Na Mi craved the constant connection, practically she is living through her small screen, watching all the sidekicks gossip and tortures from works from it. Her phone was not just for fun, it was like a secret safe. It held all her deepest secrets, proudest moments, and the picture-perfect life she built for everyone to see online. This character brings us some tingling sensation, doesn’t it? We practically see ourselves in her phone-obsessed life. But have you ever stopped to think what would happen if your own little digital safe, filled with secrets and precious moments, had an intruder and uninvited guest on it?

This movie is raising awareness of how our phones could bring us to our dead-end. Highlighting the importance of cybersecurity, “Unlocked” teaches us the lesson to be aware of our phones. Cybersecurity has been one of the most important issues that we have faced in the digitalization era. The Information and Communications Technology (ICT) industry has undergone a remarkable transformation in the past five decades. Technological advancements have provided accessibility, making ICT an inseparable part of our lives. These advancements, however, have created a complex ecosystem where ICT devices and components are highly interdependent. Even a minor disruption within an ICT system can have widespread consequences, impacting numerous functions. Recognizing this interconnectedness, experts and policymakers have voiced escalating concerns regarding the protection of ICT systems from cyberattacks. These attacks are anticipated to rise in both frequency and severity over the coming years (Fischer, 2014).

Cybersecurity is like your digital suit of armor, safeguarding your precious programs, networks, and data from the prying eyes and malicious fingers of unauthorized intruders. To prevent cybersecurity attacks, a mere of functional needs and knowledge about risks is not enough. To effectively detect threats or vulnerabilities, deep analysis of cybersecurity data is crucial. Developing the right tools to process this data is equally important (O’Connell, 2012). In the interconnected digital age, a cyberattack on one nation’s critical infrastructure, a data breach exposing sensitive information, or the actions of globalized cybercriminals can trigger a domino effect on disruptions across borders, threatening national security, economic stability, and individual privacy.

There is a variety of cybersecurity attacks or even cyber crime categories. There is data crime, network crime, access crime, and related crime. However, we will be focusing more on data crime and access crime. The data crime includes data interception, In a data interception attack, an attacker eavesdrops on data streams flowing between a target and another source (like a server). Their goal is to steal information, either for a later attack or as the ultimate prize. Often, they’ll “sniff” network traffic, but they might also target radio waves or other data channels. Most attackers passively observe existing communication. However, some might try to initiate a data exchange or manipulate what’s being transmitted. The key point is, the attacker isn’t supposed to receive this data. Unlike some data leaks that focus on indirect clues (like increased communication volume), interception attacks focus on grabbing the actual content flowing through these channels (CAPEC, 2010).

The second one is data modification, keeping your messages private is important. We don’t want anyone peeking or changing the information while it travels online. This is especially true when using many different computers and networks (distributed environments). Hackers might try to mess with the data in these situations (Oracle, 2003).

The last one is data theft, the unauthorized acquisition of information from a business or individual. This information can unfold personal details like passwords, social security numbers, or credit card data. Confidential corporate information may also be targeted. Since this act constitutes a violation of the law, perpetrators face the possibility of severe legal consequences (Computer Hope, 2012). It’s a big deal because it can cause a lot of trouble, like someone stealing your identity or draining your bank account. Hackers can steal information in many ways, by tricking you, finding weak passwords, or even just snatching your phone! To stay safe, use strong passwords, keep your computer protected, and be careful what you click online.

Meanwhile, access crime includes unauthorized access and virus dissemination. Based on the University of Tennessee at Knoxville, unauthorized access often referred to as “hacking,” occurs when someone gains entry into a computer system or network without permission. This can happen in various ways, but it usually involves exploiting weaknesses in the system’s defenses. Common methods include taking advantage of unpatched software vulnerabilities (security holes that haven’t been fixed yet) or using stolen passwords. Unlike the image of a lone hacker in a dark room, unauthorized access can also be more subtle, with malicious insiders or even seemingly harmless software malfunctions creating backdoors for unauthorized users. On the other hand, virus dissemination is malicious software, often called malware, can disrupt a victim’s system in various ways. Some malware, like viruses and worms, do indeed “attach” themselves to other programs to spread and potentially damage the system. Examples include viruses infecting legitimate software and replicating themselves, while worms exploit network connections to spread to other devices (Virus Glossary, 2006).

“Unlocked” represented the data theft and unauthorized access cases. Oh Joon Yeong, the hackers, did his deed in the most dangerous and worst way. While a precise number of hacked individuals annually is uncertain, the sheer volume of cyberattacks paints a concerning picture. With roughly 2,200 attacks happening daily, estimates suggest over 800,000 people could fall victim each year (Norton [Security], 2024). One of the most shocking case that ever happened in the hacking history is Yahoo Data Breach. Four individuals, including Russian intelligence officers, were accused for hacking Yahoo and stealing information from over 500 million user accounts. They used this data to access other email services and steal financial information. One defendant even exploited access for personal gain by searching for credit card numbers and redirecting web traffic. Russian hackers exploited backdoors, stolen backups, and access cookies to gain records from every Yahoo user account (UpGuard, 2024).

The digital age is a double-edged sword, fostering global connection while creating vulnerabilities. Like a single unlocked phone exposing a world of secrets, ‘Unlocked’ lays bare the vulnerabilities of our interconnected digital world. This film can be a wake up call for international collaboration. By fostering information sharing, establishing common security protocols, and uniting against cyber threats, nations can build a stronger digital infrastructure. Only through this collective effort can we ensure that the advantages of globalization outweigh the ever-present cybersecurity risks. Preventive ways could be done by starting from small step such as strengthened your password using two-ways of authentication could be very helpful in this case. Through the movie of “Unlocked” we get the snaps of alert and awareness about the importance of cybersecurity and cybercrime.

References

CAPEC. 2010. CAPEC-117: Data Interception Attacks, Available at: http://capec.mitre.org/data/definitions/117.html, Visited: 24/04/2024.

Computer Hope. 2012. Data Theft, Available at: http://www.computerhope.com/jargon/d/ datathef.htm, Visited: 28/01/2012.

Fischer, E. A. 2014. Cybersecurity issues and challenges: In brief.

Norton [Security]. 2024. 115 cybersecurity statistics + trends to know in 2024. https://us.norton.com/blog/emerging-threats/ransomware-statistics

O’Connell, M.E. 2012. Cyber security without cyber war. J. Confl. Secur. Law, 17, 187–209.

Oracle. 2003. Security Overviews, Available at: http://docs.oracle.com/cd/B13789_01/ network.101/ b10777/overview.htm, Visited: 24/04/2024.

University of Tennessee at Knoxville. “Unauthorized Access.” Tennessee Tech Cybersecurity Education and Awareness. Available at: https://security.tennessee.edu/unauthorized-access/. Visited: 24/04/2024.

UpGuard. 2024. Biggest Data Breaches in US History. https://www.upguard.com/breaches

Virus Glossary. 2006. Virus Dissemination, Available at: http://www.virtualpune.com/citizen-centre/html/cyber_crime_glossary.shtml, Visited: 24/04/2024.

--

--

Foreign Policy Community of Indonesia chapter UGM

“Shape & promote positive Indonesian internationalism throughout the nation & the world.” | Instagram: @fpciugm | LINE: @toh2615q | LinkedIn: FPCI Chapter UGM