ASEAN Cybersecurity Cooperation Strategy: Combating Cyber Terrorism and Hackers Through CERT Coordination
Abstract
Cyber terrorism poses a significant threat to ASEAN’s digital infrastructure, particularly as the region becomes increasingly reliant on digital economies and interconnected systems. This paper examines the role of hackers in cyber terrorism and evaluates ASEAN's efforts to address these threats through the establishment of Computer Emergency Response Teams (CERTs). While the effectiveness of CERT coordination is still evolving, the initiative holds promise in enhancing regional responses to cyberattacks. Key challenges, such as disparities in CERT capabilities among member states and legal barriers to cross-border coordination, are highlighted. This paper also explores potential solutions, including expanding CERT capabilities in less-developed member states, fostering public-private partnerships to leverage technical expertise, and increasing international cooperation with global cybersecurity organizations. The findings suggest that while ASEAN’s CERT initiative shows potential, further investment and collaboration are required to ensure a robust and unified regional cybersecurity framework capable of addressing the growing threat of cyber terrorism.
Downloads
References
J. M. Kizza, “Cyber Crimes and Hackers,” in Computer Network Security, New York: Springer-Verlag, 2005, pp. 131–162.
N. Veerasamy, “Cyberterrorism – the spectre that is the convergence of the physical and virtual worlds,” in Emerging Cyber Threats and Cognitive Vulnerabilities, Elsevier, 2020, pp. 27–52.
J. P. Sims, Y.-T. Lee, and B. T. F. Lee, “New Chinese Economic Policy to Latin America? A QCA Approach to the Belt and Road Initiative,” Chinese Political Science Review, Jul. 2023.
H. Ouyang, C. Li, G. Liu, M. Zhang, and B. T. F. Lee, “Development Zones and Firm Innovation: Evidence from Shanghai,” Chinese Journal of Urban and Environmental Studies, vol. 10, no. 04, Dec. 2022.
B. T. F. Lee, S. A. Bettani, and J. P. Sims, “Rise of China: Harmony or Hegemony?,” Chinese Political Science Review, 2024.
H. Al Asyari, “The Evolution Of Cyberterrorism: Perspectives And Progress From The European Union And Association of Southeast Asian Nation,” Jurnal Hukum Ius Quia Iustum, vol. 29, no. 1, pp. 1–23, Jan. 2022.
H. Primawanti, A. Subagyo, and W. Dermawan, “ASEAN 4.0. ERA: DEVELOPMENT IN DIGITAL ECONOMY AND TRADE SECTOR,” Jurnal Dinamika Global, vol. 7, no. 02, pp. 329–345, Dec. 2022.
B. T. F. Lee, A. Asihaer, J. P. Sims, and S. Ali, “The Interplay of Public Health, Politics, and Economics in COVID-19 Border Control Strategies: A Comparative Study of Brunei Darussalam, UK, China, Germany, and Australia,” Unnes Political Science Journal, vol. 7, no. 2, 2023.
N. Demeure and B. T. F. Lee, “Effect of the zero-covid policy on Chinese FDI inflows and government’s response: Has the Pandemic led to distinctive paradigm change in China’s hypergrowth approach to development?,” Journal of Strategic and Global Studies, vol. 6, no. 2, Jul. 2023.
J. K. Brekke, “Hacker-engineers and Their Economies: The Political Economy of Decentralised Networks and ‘Cryptoeconomics,’” New Political Economy, vol. 26, no. 4, pp. 646–659, Jul. 2021.
L.-C. Herrera and O. Maennel, “A comprehensive instrument for identifying critical information infrastructure services,” International Journal of Critical Infrastructure Protection, vol. 25, pp. 50–61, Jun. 2019.
ASEAN CCS, “ASEAN Cybersecurity Cooperation Strategy (2021 – 2025),” ASEAN. [Online]. Available: https: //asean.org/wp-content/uploads/2022/02/01-ASEAN-Cybersecurity-Cooperation-Paper-2021-2025_final-23-0122.pdf. [Accessed: Sep. 18, 2024].
R. Brewer, “Ransomware attacks: detection, prevention and cure,” Network Security, vol. 2016, no. 9, pp. 5–9, Sep. 2016.
G. Kumar, “Denial of service attacks – an updated perspective,” Systems Science & Control Engineering, vol. 4, no. 1, pp. 285–294, Jan. 2016.
S. Collins and S. McCombie, “Stuxnet: the emergence of a new cyber weapon and its implications,” Journal of Policing, Intelligence and Counter Terrorism, vol. 7, no. 1, pp. 80–91, Apr. 2012.
S.-C. Hsiao and D.-Y. Kao, “The static analysis of WannaCry ransomware,” in 2018 20th International Conference on Advanced Communication Technology (ICACT), IEEE, Feb. 2018, pp. 153–158.
L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
C. D. Crumpton, S. Wongthanavasu, P. Kamnuansilpa, J. Draper, and E. Bialobrzeski, “Assessing the ASEAN Smart Cities Network (ASCN) via the Quintuple Helix Innovation Framework, with Special Regard to Smart City Discourse, Civil Participation, and Environmental Performance,” International Journal of Urban Sustainable Development, vol. 13, no. 1, pp. 97–116, Jan. 2021.
T. Riebe, “Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level,” in Technology Assessment of Dual-Use ICTs, Wiesbaden: Springer Fachmedien Wiesbaden, 2023, pp. 191–220.
T. Riebe, M.-A. Kaufhold, and C. Reuter, “The Impact of Organizational Structure and Technology Use on Collaborative Practices in Computer Emergency Response Teams: An Empirical Study,” Proc ACM Hum Comput Interact, vol. 5, no. CSCW2, pp. 1–30, Oct. 2021.
A. Öztürk, “State of research: Relevance of Computer Emergency Response Teams in Operational Technology,” European Conference on Cyber Warfare and Security, vol. 23, no. 1, pp. 724–732, Jun. 2024.
B. Bartlett, “Why do states engage in cybersecurity capacity-building assistance? Evidence from Japan,” The Pacific Review, vol. 37, no. 3, pp. 475–503, May 2024.
A. S. Salsabila, M. D. Fikri, M. S. Andika, and N. A. Harahap, “Potential and Threat Analysis Towards Cybersecurity in South East Asia,” Journal of ASEAN Dynamics and Beyond, vol. 1, no. 1, p. 1, Dec. 2020.
M. R. K. Ariffin and M. Letchumanan, “Status of Cybersecurity Awareness Level in Malaysia,” in Innovations in Cybersecurity Education, Cham: Springer International Publishing, 2020, pp. 343–359.
C. Y. Luk, “Strengthening Cybersecurity in Singapore,” 2019, pp. 96–128.
A. Hern, “Philippine electoral records breached in ‘largest ever’ government hack,” The Guardian, 2016. [Online]. Available: https: //www.theguardian.com/technology/2016/apr/11/ philippine-electoral-records-breached-government-hack. [Accessed: Sep. 18, 2024].
J. Berlinger, “Singapore hack affects 1.5 million – including Prime Minister,” CNN, 2018.
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer, “Google Android: A Comprehensive Security Assessment,” IEEE Security & Privacy Magazine, vol. 8, no. 2, pp. 35–44, Mar. 2010.
G. Tajadod, L. Batten, and K. Govinda, “Microsoft and Amazon: A comparison of approaches to cloud security,” in 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, IEEE, Dec. 2012, pp. 539–544.
P. Morrison, B. H. Smith, and L. Williams, “Measuring Security Practice Use: A Case Study at IBM,” in 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in Industry (CESI), IEEE, May 2017.
C. Pauletto, “Information and telecommunications diplomacy in the context of international security at the United Nations,” Transforming Government: People, Process and Policy, vol. 14, no. 3, pp. 351–380, May 2020.
J. Eggenschwiler, “Expert commissions and norms of responsible behaviour in cyberspace: a review of the activities of the GCSC,” Digital Policy, Regulation and Governance, vol. 22, no. 2, pp. 93–107, May 2020.
D. Štitilis, P. Pakutinskas, and I. Malinauskaitė, “EU and NATO cybersecurity strategies and national cyber security strategies: a comparative analysis,” Security Journal, vol. 30, no. 4, pp. 1151–1168, Oct. 2017.
H. Carrapico and A. Barrinha, “European Union cyber security as an emerging research and policy field,” European Politics and Society, vol. 19, no. 3, pp. 299–303, May 2018.
C. Yuan and B. T. F. Lee, “From Rivals To Partners: The Evolution Of Environmental Cooperation Among China, Japan, and Korea,” Global: Jurnal Politik Internasional, vol. 25, no. 1, Jun. 2023.
B. T. F. Lee and J. P. Sims, “Redefining Regional Development: The Case for an ASEAN Development Bank,” Journal of Political Issues, vol. 6, no. 1, pp. 1–19, Jul. 2024.
B. T. F. Lee and J. P. Sims, “The BRICS+ Expansion, Global Trade Dynamics, and the Dedollarization Phenomenon,” Unnes Political Science Journal, vol. 8, no. 1, 2024.
B. T. F. Lee and J. P. Sims, “ASEAN at the Crossroads of US-China Rivalry: The Role of Majority Voting and the Introduction of a Permanent Secretary-General,” International Journal of Law and Public Policy (IJLAPP), vol. 6, no. 1, pp. 8–18, Mar. 2024.
B. T. F. Lee and J. P. Sims, “Legitimacy through Diversity: China’s Leadership in the BRICS+ Expansion for Global Balance,” Fudan Journal of the Humanities and Social Sciences, 2024.
J. P. Sims, Y.-T. Lee, and B. T. F. Lee, “New Chinese Economic Policy to Latin America? A QCA Approach to the Belt and Road Initiative,” Chinese Political Science Review, Jul. 2023.













