Georgia’s Cybersecurity Environment in the AI Era

Vladimeri Napetvaridze

Abstract


This research paper explores the development of artificial intelligence (AI), international cyber threats, and Georgia's changing cybersecurity environment. This paper describes Georgia's transformation from a weak cybersecurity outpost to a nation that emphasizes promoting cybersecurity capabilities, drawing on theoretical frameworks and historical context.

Georgia experienced a paradigm shift after the 2008 cyberattack, seeing the link between cybersecurity requirements and national security. In this regard, legislative turning points were crucial in determining Georgia's cybersecurity laws. Important turning points were reached by adopting the "Law on Information Security" and ratifying the Council of Europe's cyber security convention, which laid the theoretical and practical groundwork for an all-encompassing governmental cybersecurity policy. This policy aimed to strengthen the country's national security apparatus and protect its digital infrastructure.

Georgia's efforts to strengthen its cybersecurity environment paid off over the next few years. The article details how Georgia has implemented action plans to incorporate cybersecurity concerns within the larger national security framework. Acclaim from international organizations like the International Telecommunication Union (ITU) confirmed Georgia's progress in the industry. However, the piece also gathers the ongoing weaknesses and vulnerabilities that must be addressed in the Georgian cybersecurity landscape. The cooperative endeavor yielded focused suggestions, stressing flexibility as a fundamental principle against ever-changing cyber threats.

The analysis offers valuable insights into Georgia's cybersecurity efforts and can guide other countries amidst the complex AI-driven cyber threats. The essay analyzes Georgia's strategy to defend itself against transnational cyber threats. This essay enhances knowledge of the complex interactions between transnational cyber threats and AI and the necessity of robust cybersecurity frameworks on a global scale.


Keywords


Artificial Intelligence; Cyber Security; Georgia.

Full Text:

PDF

References


Ba, M. H. N., Bennett, J., Gallagher, M., & Bhunia, S. (2021, December). A case study of credential stuffing attack: Canva data breach. In 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 735-740). IEEE.

Butler-Adam, J. (2018). The fourth industrial revolution and education. South African Journal of Science, 114(5-6), 1-1.

Canaday, J. (2017). How the democratization of technology enhances intelligence-led policing and serves the community. Homeland Security Affairs.

Erenoğlu, A. K., Erdinç, O., & Taşcıkaraoğlu, A. (2019). History of Electricity. In Pathways to a Smarter Power System (pp. 1-27). Academic Press.

Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, 28, 3629-3654.

International Telecommunication Union (ITU). (2015). Global cybersecurity index & cyberwellness profiles.

International Telecommunication Union (ITU). (2017). Global Cybersecurity Index (GCI) 2017

International Telecommunication Union (ITU). (2018). Global Cybersecurity Index (GCI)

Jewell, C., & Ng, A. (2019). Artificial intelligence: the new electricity. WIPO MAGAZINE, (3), 2-6.

Lauinger, T., Pankakoski, V., Balzarotti, D., & Kirda, E. (2010, April). Honeybot, Your Man in the Middle for Automated Social Engineering. In LEET (pp. 1-8).

Li, J. H. (2018). Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462-1474.

PMCG. (2021). Cybercrime in Georgia: Current challenges and possible developments. Retrieved from https://pmcg-i.com/publication/cybercrime-in-georgia-current-challenges-and-possible-developments/

Poudyal, S., & Dasgupta, D. (2020, December). AI-powered ransomware detection framework. In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1154-1161). IEEE.

Qiu, S., Liu, Q., Zhou, S., & Wu, C. (2019). Review of artificial intelligence adversarial attack and defense technologies. Applied Sciences, 9(5), 909.

Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2, 1-18.

Sharma, M., & Kaur, M. (2022). A review of Deepfake technology: an emerging AI threat. Soft Computing for Security Applications: Proceedings of ICSCS 2021, 605-619.

Sudmann, A. (2019). The democratization of artificial intelligence. Net politics in the era of learning algorithms. Transcript, Bielefeld.

Swanson, L. (2010). The era of cyber warfare: Applying international humanitarian law to the 2008 Russian-Georgian cyber conflict. Loy. LA Int'l & Comp. L. Rev., 32, 303.

Wang, Z., Zhang, Y., Tian, Z., Ruan, Q., Liu, T., Wang, H., ... & Shi, W. (2019). Automated vulnerability discovery and exploitation in the Internet of Things. Sensors, 19(15), 3362.


Refbacks

  • There are currently no refbacks.