Security

    Cards (21)

    • Transnational terrorism

      Violent attacks conducted by terrorist organisation(s) beyond their county's borders to achieve their objectives and operations
    • Transnational terrorist groups
      • Al Qaeda
      • Jemaah Islamiyah (JI)
      • ISIS
    • Transnational terrorist groups coordinate their operations globally using advanced communications and digital technology
    • Transnational terrorism

      • Can result in injuries, deaths and destruction of properties
      • Economic costs and losses as businesses are disrupted
      • Can lead to distrust, fears and tensions among different communities
      • Can lead to hate crimes towards ethnic communities that are of similar religious or ethnic backgrounds to the terrorist groups
      • Disrupt harmony and destabilise the country
      • Increase the threat of self-radicalisation (due to the influence of propaganda)
    • Cyber threats
      Unauthorised access to online information systems and data
    • Types of cyber threats

      • Website defacement
      • Phishing
      • Malware infection
    • Cyber attacks
      • Latitude Financial suffered a massive cyberattack that resulted data breach with customer records stolen from its system in 2023
      • Hackers infiltrated the database of patients in SingHealth in Singapore in 2018 through a malware-infected computer workstation
    • Cyber threats
      • Can lead to identity-theft
      • Can lead to economic losses
    • Signs of self-radicalisation

      • Collecting news articles on terrorist groups
      • Surfing on radical websites for religious content
      • Uploading pro-terrorist materials on social media
      • Attempts to radicalise others
    • What individuals can do
      • Stay vigilant to tell-tale signs of self-radicalisation (family members/friends)
      • Stay vigilant in public to keep a look out for suspicious items and characters
      • Report to the authorities (e.g. police) when there are sufficient grounds for suspicion
      • Join/take part in community programmes that promote social harmony
    • Regional Counter-Terrorism Node (RCTN)

      • Enables police units in the Asia-Pacific region to work together and encourages the transfer of intelligence concerning terrorist activities
      • Set up by the International Criminal Police Organisation (INTERPOL)
    • "Our Eyes" Initiative

      • Enhance strategic information-sharing on terrorism and radicalism
      • Set up by the Association of Southeast Asian Nations (ASEAN)
    • Cooperation among countries

      • The threats cannot be tackled by a country alone
      • Helped the countries to prevent possible terrorist attacks and respond swiftly during terrorist incidents
      • Improve the countries' competency and effectiveness in tackling transnational terrorism
    • Government measures within the country
      • Border-management measures (monitoring and surveillance infrastructure for stricter security checks; use of biometrics to verify identity)
      • Internal Security Act (ISA) (law used to investigate security threats like terrorism and acts of violen or hatred using race or religion; able to detain individuals who pose a security threat to Singapore)
    • Government measures within the country
      • Proactively prevent potential terrorist attacks from occurring within the country
      • Able to act swiftly and decisively against dangers to security of Singapore
      • Provide guidance and social support to reduce re-engagement in terrorist-related activities and remain resilient to radical influences
    • What individuals can do
      • Install, update and maintain firewalls, anti-virus programs and detection software that protect against spyware and malware
      • Create strong password such as at least 8 characters long that include numbers, symbols, uppercase and lowercase
      • Change passwords regularly
      • Be cautious when surfing websites by checking that it is secure (e.g. Lock symbol)
      • Do not click on instant messages, pop-ups and unexpected email links from unknown sources which may contain malware
    • What individuals can do

      • Ensure no security lapses and improve one's cybersecurity
      • Made it more difficult for hackers to access our account and hack into the system
      • Reduce vulnerability towards cyber attacks
      • Strengthen the security of cyber landscape for individuals, organisations and country
    • Cooperation between
      • Joint Operation between Singapore, Malaysia and Hong Kong Special Administrative Region (SAR) (cracked down on a criminal organisation involved in at least a hundred cases of Internet love scams across the 3 countries, used a system to share information on the criminals and their activities)
    • Cooperation among countries

      • The threats cannot be tackled by a country alone
      • Allowed the countries to have better information and worked to close in and arrest the criminals
      • Improve the region's awareness and competency in responding to cybersecurity challenges
      • Enhanced the ability of the different countries to tackle the cybersecurity challenges swiftly
      • Strengthen the country's and the region's protection against cyber threats
    • Government measures within the country
      • Cyber Security Agency of Singapore (CSA) (national agency to oversee and coordinate all aspects of cybersecurity, build resilient digital infrastructure to protect Critical Information Infrastructure(CII), enable a safer cyberspace for businesses and individuals, enhance international cyber cooperation, develop a vibrant cybersecurity ecosystem, grow a robust cyber talent pipeline)
    • Government measures within the country

      • Continue to stay up to date with security threats and responses
      • Enhance the cybersecurity and cyber-resilience of the country at different levels (from individuals, organisations to government)
      • Improve the country's ability to track respond swiftly to security threats
      • Reduce the opportunities for hacking and be resilient enough to withstand against the different cyber threats
    See similar decks