It is a well-ingrained notion that generating a cybercrime is more difficult than defending it. But the truth is that defending a cybercrime is much more difficult than creating one. This particularly holds importance for the war-mongering parties who are at the helm of hoarding cyber nukes and also want to defend against cyber-attacks. The world has gone digital and guarantees a digital leeway into government systems and people's lives. The frequency of cyber-attacks has increased tremendously CyberEdge Group in its 2021 Cyberthreat Defense Report, mentioned that 86.2% of the surveyed organization were affected by cyberattacks. What makes the situation worse is that they are perpetrated at the behest of power holders. As per a Guardian report ransomware like WannaCry and NotPetya campaigns were orchestrated by nation-state actors. How can someone not expect cyber nuke-generated digital discord and be at "cyber-peace"?
Though there is not yet a large-scale consensus on what constitutes "cyber peace", the ITU, a United Nation agency for information technologies, has defined cyber-peace as a "universal order of cyberspace" built on a "wholesome state of tranquillity, the absence of disorder or disturbance and violence." The cyberworld is a transient world, unlike the physical one. In the digital world, the systems can be manipulated with just a few lines of code. Therefore, it is nothing less than foolishness to expect to achieve a state of tranquillity or the absence of disorder. What should be the plan of action? Countries have reacted to such problems in rather unconventional ways. For, e.g., the FBI adopted RAT malware to neutralize Russian advances in the cyber domain. And world organizations like United Nations have adopted digital peace as an invisible pillar for their SDG mission. A white paper on the Paris conference, published by Microsoft states that countries around the world are acquiring cyber-offensive capabilities. Indeed, nations need a cyber secure environment and having cyber nukes is akin to having nuclear capabilities. Though nuclear weapons are sparingly used by world countries, cyber weapons find frequent applications for apparent reasons. Just because of these reasons, experts opine that having a deterrent policy is difficult, if not impossible.
Cybercrimes are of abstract nature and behaviour driven. It is definitely a challenge for lawmakers to make enforceable rules unlike for tangible weapons, which go through strict regulatory mechanisms throughout the production cycle. It is absolutely difficult to control the people behind these cybercrimes and find a level playing field in the cyber security realm. However, the complexity of the circumstances should not deter the regulators from scaling back offensive cybersecurity technology, like what happened with nuclear technologies. Cyber dominant countries like China and Russia have been developing cyber-offensive technologies for years just to use when the time arrives. Nevertheless, the recent Russian deterrence for cyber warfare is a different story; Ukraine has been working on defending cyber-attacks for the last ten years.
Digital policies are often designed in isolation and defined by different stakeholders giving rise to multiple concepts of digital governance, with competing standards and approaches, lessening trust, and the lack of cooperation. Of late we are witnessing cooperation at the institutional and political level for a global internet governance model to address impending cyber dystopia. The Global Centre for Cyber Security set by World Economic Forum (WEF) in 2019 to serve as a worldwide platform for multi-stakeholder collaboration has emphasised multi-stakeholder collaboration, information exchange, and development to be able to counter organise against digital crime.
Meta vs Bitcoin: The Fall of AI Stocks Proves Crypto is Better
Instagram Automation is a Cool Way to Enhance Your Business Now
After Indian Web 3.0 Startups, Are Crypto Exchanges up for a Dubai Move?
Top 10 Platforms to Get Market-Best Freelance Data Scientist
Dark Data is Crushing the Cybersecurity Wall in Seconds
Top 10 Programming Languages Universities Suggest to Students
Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp
_____________
Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.