Friday, August 24, 2012

Living with the reality of virtual threats


Cyberspace is too important for its security to be handed over to those who want to lock it up


The recent revelations of Pakistan-based websites unleashing doctored pictures of alleged atrocities against Muslims in order to inflame passions in India has once again drawn attention to the enormous potential of the Information Age to challenge our security assumptions.


The computer is the instrument of our age; cyberspace is the oxygen of the internet. So much in our interconnected, globalised, and technologically advancing world depends on cyberspace. From our mundane emails to social networking to high priority banking services, government systems, communications, transport, and perhaps most important, our military organisations, all increasingly place reliance on the World Wide Web and everything connected to it.


To a layman, cyber security means simple things: a password that is not stolen, a message that remains confidential, a child that is not exposed to a stalker or paedophile online. When they type in a web address, that is where they should go and not to a spam site. When they click a link that looks genuine, they should not be cheated by a plausible fraud. Their work online should not be tampered with, and so on. 


But cyber security ranges across wider terrain. The international relations theorist Joseph Nye has discerned four different types of threats to cyberspace. The most dramatic is Cyber War — the unauthorised invasion by a government into the systems or networks of another, aiming to disrupt those systems, to damage them partially, or to destroy them entirely. A specific target is to slow down if not curtail the military systems of the target state: there is no point having excellent missiles and weapons if the delivery systems can be paralysed. And as our military establishments become more and more dependent on sophisticated technologies, the risk of equally sophisticated attacks on them grows.

No comments:

Post a Comment

Categories

3G 4G Aakash Acer Aircel Airtel Amazon Android OS Apple Laptop Apple News Applications Ashok Leyland Aston Martin Cars Asus Asus Laptop Audi Audi Car Bajaj Bikes Bing Bitcoin Black Berry BMW Bose Browser BSNL Camara Camera Canon Car Chevrolet Computer Cyber Crimes Data Card Datsun Dell Dot DRDO Dropbox Ducati Ericsson Facebook News Ferrari Fiat Cars Ford Cars Four Wheeler Fujifilm G-mail Gadget Game Gameloft Gatget Gionee GM Gmail Google News Google Tablet Google Watch Hangouts Harley-Davidson HCL HCL Laptop HCL Tablet Hero Bikes Honda Bikes Honda Car HP HP Laptop HP Smartphone HP Tablet HTC Mobile Huawei Hyundai Cars iBall IBM Idea Indian IT Information Information Infosys Inmobi Innovations Intel Internet Intex Mobiles Ipad iPhone Isuzu Motors IT Information Jaguar Cars Jeep Joint Venture Karbonn Mobile Karbonn Tab Kawasaki Bikes Lamborghini Car land rover Laptop Lava Lava Phone Lava Tablet Law Suit Lemon Mobile Lenovo Lenovo Laptop Lenovo Mobile Lenovo Tablet LG LG Mobile LG Televisions Linked in info Mahindra Mahindra Car Mahindra Tractor Malware Maruti Suzuki Maxx Mobile McAfee Mercedes Benz Micromax Mobile Micromax News Microsoft News Microsoft Websites Mitsubishi Mobile Mobile Networks Moschips Motorola Motorola Watch MTS New Technology Nexus NIIT Nikon Camera Nissan Nokia Mobile Oracle OS Other Tablet Panasonic Panasonic Mmobile Passport Phablet Philips Piaggio Play Station Quadricycle Range Rover Reliance Renault Renault Scala Robot Rolls Rolls Royce Salora Mobile Samsung Samsung Mobile Samsung News Samsung Tablet Sandisk Scooter Sistema Skoda Car Smart Watch Smartphone smoking Snapdeal Software Sony Sony Mobile spice SUV Suzuki T-Mobile Tablet Tata Docomo Tata Motors Toyota car TRAI TVS Twitter Two Wheeler Unilever Verizon Vespa Videocon Viper Vizio Vodafone Volkswagen Volvo Website Wechat Whatsapp Wickedleak Inc Wifi Wikipedia Windows 8 Windows News Windows Phone Wipro Xbox Xolo Mobile Xolo Tablet Xperia Yahoo Yahoo News Yamaha Bikes Zen Mobile ZTE Mobiles Zync Mobiles