Fri. October 24, 2014 Get Published  Get Alerts
HOME  |LOGIN
ABOUT | CONTACT US | SUPPORT US
Cyber Security – the biggest Global threat of our Time!

Comments(0)
Delhi hosted the 3rd Global Summit on Cyber Security in Oct 2012, which once again highlighted the complex security challenges that face the Cyber world. Advanced persistent threats (APT), Botnets, Hacktivists, Spies etc. are just among the daily headaches that put even top intelligence organizations to the test. But at least large organizations can afford to invest in cyber security solutions. Even more worrisome is the Norton 2012 Cybercrime report which states that 2 out of 3 adults online have been victims of cybercrime and each year the problem causes an estimated loss of about $ 110 billion. Every second, 18 adults become a victim of cybercrime with losses of an average $197 per victim annually. This yet does not take into account the emotional distress and dysfunction people suffer on account of cyber crime like hacking, information theft, invasion of privacy etc. Unlike large or even small organizations, individuals have rather limited access to any kind of advanced security solutions. The standard off the shelf security products have limited applicability and are not enough protection against even a slightly sophisticated attack. In countries like India, China etc. it is not easy to even register a cyber crime report and a response is almost unexpected. Furthermore, cyber criminals transcend boundaries, and international laws are inadequate to tackle the problem. As more and more of the world goes online in personal and professional sphere, cyber security is perhaps the number one challenge before the world yet we seem ill prepared to tackle it.

The Norton Cyber crime report for 2012 shows increased attacks in two areas as compared to 2011 – social networks and mobile networks. These are also the two areas where exciting new technological changes are happening everyday capturing more and more consumers. But as technological innovations are racing far ahead, the security systems seem to lag far behind. While most consumers seem aware of the new gizmos and apps being launched each day through mesmerizing ads, not enough are aware of the likely security threats or probable solutions. They rely on rudimentary knowledge making them easy targets for cyber criminals. They only seem to become aware once they have already become a victim. Awareness about security threats and probable solutions seems to be an issue at the individual level. Further, the technology business is no doubt driven by innovations which rake in the money but it would seem the security systems and innovations in those areas remain underinvested since they do not seem to be as lucrative an opportunity. Left to the private sector, this gap between galloping technology and lagging security systems is likely to remain or perhaps even widen. Unless a lot of awareness is generated about security issues and a lot more investment made into technological innovations in the cyber security area, this challenge will become a behemoth. At a larger level, the vulnerability of defense installations, transportation, power grids etc. to cyber attacks has always been a hot debate. Already some businesses and intelligence organizations have come to rely on paper records and safety vault systems for highly sensitive information. Could the severe lag on cyber security take us back to the paper and lock and key era?

Since hackers and other cyber criminals could be based in any country and launch an attack anywhere else, using already hacked systems, nabbing them would require a lot of trans-national cooperation. While there are summits and conferences - usually led by the industry, not much is being done at the government levels. Even international bodies like the UN are yet to get involved in this area and demand passing of international laws, leave alone seek cross country cooperation to enforce them. Lack of international cooperation thus remains another lacuna. To the contrary governments themselves are often involved in sponsoring spying and related hacking on other countries’ systems. The situation is worse in the developing world where even gruesome crime goes unpunished, so white collar cyber crime is unlikely to get any attention at all. A lot of attacks and spams originate from this part of the world where law enforcement remains a serious issue.

Given the alarming levels of cyber crime where 2 in 3 people online fall a victim to it, the apparent ignorance, grossly inadequate investment or innovations in security systems as well as weak law enforcement is even more worrisome. The problem plagues even top organizations like the FBI but they have a lot of resources at hand. However, it is often the individual or the common man who is most vulnerable to such attacks. They are often caught unawares and lacking access to any advanced help required to ward off the cyber crime or criminals, find themselves helpless in the face of it. Threatened cyber security and rising crime is perhaps staring the Technology horse in the mouth and could be its very nemesis. At the global level, the pan geographical origin of cyber attacks makes it a challenge very hard to tackle. At any rate, other than industry initiatives, not much is being done to raise the issue to the level of attention it deserves or requires. In a world relying more and more on technology, cyber security is the biggest global threat of our times yet it remains grossly under addressed at the international level and calls for greater focus and action.

Anuradha Kataria is an author and a consultant based in Delhi, India. She has published a book and editorials on the developing world issues. She also is a part of the growing statistic of 2 in 3 victims of cybercrime, having faced the hacking problem herself and seen the gaps in security systems or law enforcement process first hand.

Comments in Chronological order (0 total comments)

Report Abuse
Quick Links Twitter Face Book Get Alerts Contact Us Enter Ia-Forum Student Award Competition
International Affairs
Forum - (2014 Issue 1)

Available Now
ANNOUNCEMENTS
THE WORLD'S DISCUSSING...
12/15/2014: Modern Times in North Korea: Scenes from its Founding Years, 1945-1950 More
12/01/2014: Waking from the Dream: the Struggle for Civil Rights in the Shadow of Martin Luther King More
11/30/2014: Reaching Across the Pacific: Latin America and Asia in the New Century More
11/17/2014: The Men Who Lost America: British Leadership, the Revolutionary World, and the Fate of Empire More
11/06/2014: Extreme Realities: Severe Weather, Climate Change, and Our National Security [Screening] More
10/28/2014: Bridging the Gap: A Conversation About Family Planning and Climate Change More
10/28/2014: FAPESP-U.S. Collaborative Research on the Amazon More
10/27/2014: Synchronized Factories: Latin America and the Caribbean in the Era of Global Value Chains More
10/27/2014: Sino-Soviet Relations and the Dilemmas of Socialist Bloc Cooperation: Czechoslovaks in Shanghai, 1956-57 More
10/23/2014: “A Sort of Chautauqua” More
10/23/2014: World Population and Human Capital in the Twenty-first Century (Book Launch) More
10/22/2014: Establishing China’s Modern Fiscal System More
10/22/2014: Can Oil Sanctions Push Russian Economy Into Recession? More
10/22/2014: Ukraine, Russia, and the International Order More
10/22/2014: The German Economy Needs Reforms, Not More Spending More
10/22/2014: Dairy Policy in Canada and the United States More
10/22/2014: Development blog: The Global Trade in Deforestation and Associated Emissions More
10/22/2014: From North Korean Captivity to Freedom: Jeffrey Fowle More
10/22/2014: US-Led Anti-ISIS Coalition Emboldens Iran and Alienates Allies More
10/22/2014: Global Implications of Data Flows between the U.S. and EU More
10/22/2014: Global Implications of Data Flows between the U.S. and EU More
10/22/2014: Negotiating Sino-Italian Normalization, 1968-1970 More
10/22/2014: Bipartisan Corporate Welfare More
10/22/2014: SSDI Reform: Promoting Gainful Employment while Preserving Economic Security More
10/22/2014: Xi Jinping's Inner Circle: Political Protégés from the Provinces More
10/21/2014: CGD Event: 2014 Commitment to Development Award Reception More
10/21/2014: Why China No Longer Wants Cheap Coal More
10/21/2014: The Complexity of Russia More
10/21/2014: Development blog: Saturday Night Live Satirizes Kinky Development More
10/21/2014: Development blog: Six Reasons an Ebola Travel Ban Makes Us No Safer — and No Sense More
10/21/2014: Saddam Husayn and Islam: Ba’thi Iraq 1968-2003 from Secularism to Faith More
10/21/2014: MENA Women's News Brief More
10/21/2014: Brazil’s Presidential Election: An Early Assessment of the Outcome and its Political, Economic and Foreign Policy Implications More
10/21/2014: What Goes into a Medal: Women's Inclusion and Success at the Olympic Games [pdf] More
10/21/2014: A Climate Agreement for the Decades More
10/21/2014: In China, Law Isn't Winning More
10/21/2014: Mexico's Involvement in UN Peacekeeping Operations More
10/21/2014: Cross-Border Data Flows, the Internet and What it Means for U.S. and EU Trade and Investment More
10/21/2014: Cross-Border Data Flows, the Internet and What it Means for U.S. and EU Trade and Investment More
10/21/2014: Global Prosperity Wonkcast: Who Pollutes Most? Surprises in a New US Database - Kevin Ummel More
10/21/2014: Will Japan Bet the Farm on Agricultural Protectionism? More
10/21/2014: Cato Institute Announces New Center for Monetary and Financial Alternatives More
10/21/2014: We Have No Idea if Universal Preschool Actually Helps Kids More
10/21/2014: Keep Your Eye on Swaziland More
10/20/2014: Global Health blog: UHC in Latin America: Learning from the Past, Planning for the Future More
10/20/2014: Mexico in Peacekeeping Operations: A Late and Controversial Decision - The Expert Take More
10/20/2014: The OAS Leadership Transition More
10/20/2014: Is China Unwinding its Foreign Exchange Reserves? Not Just Yet More
10/20/2014: Empowering Revolution: America, Poland, and the Moderates who Ended the Cold War More
10/20/2014: More Bad News for Airbnb More
More...
About | Contact Us | Support Us | Terms and Conditions

All Rights Reserved. Copyright 2002 - 2014