Sun. May 29, 2016 Get Published  Get Alerts
HOME  |LOGIN
ABOUT | CONTACT US | SUPPORT US
Cyber Security – the biggest Global threat of our Time!

Comments(0)
Delhi hosted the 3rd Global Summit on Cyber Security in Oct 2012, which once again highlighted the complex security challenges that face the Cyber world. Advanced persistent threats (APT), Botnets, Hacktivists, Spies etc. are just among the daily headaches that put even top intelligence organizations to the test. But at least large organizations can afford to invest in cyber security solutions. Even more worrisome is the Norton 2012 Cybercrime report which states that 2 out of 3 adults online have been victims of cybercrime and each year the problem causes an estimated loss of about $ 110 billion. Every second, 18 adults become a victim of cybercrime with losses of an average $197 per victim annually. This yet does not take into account the emotional distress and dysfunction people suffer on account of cyber crime like hacking, information theft, invasion of privacy etc. Unlike large or even small organizations, individuals have rather limited access to any kind of advanced security solutions. The standard off the shelf security products have limited applicability and are not enough protection against even a slightly sophisticated attack. In countries like India, China etc. it is not easy to even register a cyber crime report and a response is almost unexpected. Furthermore, cyber criminals transcend boundaries, and international laws are inadequate to tackle the problem. As more and more of the world goes online in personal and professional sphere, cyber security is perhaps the number one challenge before the world yet we seem ill prepared to tackle it.

The Norton Cyber crime report for 2012 shows increased attacks in two areas as compared to 2011 – social networks and mobile networks. These are also the two areas where exciting new technological changes are happening everyday capturing more and more consumers. But as technological innovations are racing far ahead, the security systems seem to lag far behind. While most consumers seem aware of the new gizmos and apps being launched each day through mesmerizing ads, not enough are aware of the likely security threats or probable solutions. They rely on rudimentary knowledge making them easy targets for cyber criminals. They only seem to become aware once they have already become a victim. Awareness about security threats and probable solutions seems to be an issue at the individual level. Further, the technology business is no doubt driven by innovations which rake in the money but it would seem the security systems and innovations in those areas remain underinvested since they do not seem to be as lucrative an opportunity. Left to the private sector, this gap between galloping technology and lagging security systems is likely to remain or perhaps even widen. Unless a lot of awareness is generated about security issues and a lot more investment made into technological innovations in the cyber security area, this challenge will become a behemoth. At a larger level, the vulnerability of defense installations, transportation, power grids etc. to cyber attacks has always been a hot debate. Already some businesses and intelligence organizations have come to rely on paper records and safety vault systems for highly sensitive information. Could the severe lag on cyber security take us back to the paper and lock and key era?

Since hackers and other cyber criminals could be based in any country and launch an attack anywhere else, using already hacked systems, nabbing them would require a lot of trans-national cooperation. While there are summits and conferences - usually led by the industry, not much is being done at the government levels. Even international bodies like the UN are yet to get involved in this area and demand passing of international laws, leave alone seek cross country cooperation to enforce them. Lack of international cooperation thus remains another lacuna. To the contrary governments themselves are often involved in sponsoring spying and related hacking on other countries’ systems. The situation is worse in the developing world where even gruesome crime goes unpunished, so white collar cyber crime is unlikely to get any attention at all. A lot of attacks and spams originate from this part of the world where law enforcement remains a serious issue.

Given the alarming levels of cyber crime where 2 in 3 people online fall a victim to it, the apparent ignorance, grossly inadequate investment or innovations in security systems as well as weak law enforcement is even more worrisome. The problem plagues even top organizations like the FBI but they have a lot of resources at hand. However, it is often the individual or the common man who is most vulnerable to such attacks. They are often caught unawares and lacking access to any advanced help required to ward off the cyber crime or criminals, find themselves helpless in the face of it. Threatened cyber security and rising crime is perhaps staring the Technology horse in the mouth and could be its very nemesis. At the global level, the pan geographical origin of cyber attacks makes it a challenge very hard to tackle. At any rate, other than industry initiatives, not much is being done to raise the issue to the level of attention it deserves or requires. In a world relying more and more on technology, cyber security is the biggest global threat of our times yet it remains grossly under addressed at the international level and calls for greater focus and action.

Anuradha Kataria is an author and a consultant based in Delhi, India. She has published a book and editorials on the developing world issues. She also is a part of the growing statistic of 2 in 3 victims of cybercrime, having faced the hacking problem herself and seen the gaps in security systems or law enforcement process first hand.

Comments in Chronological order (0 total comments)

Report Abuse
Quick Links Twitter Face Book Get Alerts Contact Us Enter Ia-Forum Student Award Competition
ANNOUNCEMENTS
THE WORLD'S DISCUSSING...
05/27/2016: Banter #222: Tamra Ryan on the Women’s Bean Project More
05/27/2016: How to help close the tax gap More
05/27/2016: Child poverty in America is not a global embarrassment More
05/27/2016: Too Bad the Portman-Strickland Senate Race Has Turned into a China-Bashing Free-For-All More
05/27/2016: Africa in the news: Nigeria establishes flexible exchange rate, Kenya reaffirms plan to close Dabaab refugee camp, and AfDB meetings focus on energy needs More
05/27/2016: If US Won't Take More Syrian Refugees, Extend Trade Agreements to Those Who Do More
05/27/2016: Will ISIS and al-Qaida always be rivals? More
05/27/2016: Will ISIS and al-Qaida always be rivals? More
05/27/2016: Trade on Trial, Again More
05/27/2016: Overcoming barriers to a European digital single market More
05/26/2016: The incoherence of sustainability More
05/26/2016: Is there a shortcut to development for the Western Balkans? More
05/26/2016: Walk the line: The United States between Israel and the Palestinians More
05/26/2016: Long-range stand-off does not make sense, nor do its proposed numbers More
05/26/2016: Long-range stand-off does not make sense, nor do its proposed numbers More
05/26/2016: Long-range stand-off does not make sense, nor do its proposed numbers More
05/26/2016: Long-range stand-off does not make sense, nor do its proposed numbers More
05/26/2016: Hutchins Roundup: Labor market mobility, family disadvantage, and more More
05/26/2016: Hutchins Roundup: Labor market mobility, family disadvantage, and more More
05/26/2016: MSNBC's Morning Joe Whitewashes Bob Gates' Legacy More
05/26/2016: Voice, Exit, and Liberty: The Effect of Emigration on Origin Country Institutions More
05/26/2016: America's Doomed China Strategy More
05/26/2016: NATO Assesses Ukraine and Invites Montenegro: Who's Afraid of Vladimir Putin? More
05/26/2016: Blood and faith in Afghanistan: A June 2016 update More
05/26/2016: Blood and faith in Afghanistan: A June 2016 update More
05/26/2016: Blood and faith in Afghanistan: A June 2016 update More
05/25/2016: What might the drone strike against Mullah Mansour mean for the counterinsurgency endgame? More
05/25/2016: What might the drone strike against Mullah Mansour mean for the counterinsurgency endgame? More
05/25/2016: Monetary policy and financial stability More
05/25/2016: Monetary policy and financial stability More
05/25/2016: Behavioral interventions to increase tax-time saving: Evidence from a national randomized trial More
05/25/2016: Testimony before the European Parliament, Committee on International Trade More
05/25/2016: A Portrait in Courage More
05/25/2016: Don't Dilute Libertarianism Just to Beat Donald Trump More
05/25/2016: Is China Really That Dangerous? More
05/25/2016: For Southwest Corridor, Buses Would Be Better, Cheaper Than Light Rail More
05/24/2016: Dear Progressives: Using Uber Doesn't Make You a Monster More
05/24/2016: What Republicans for Trump Are Telling Me More
05/24/2016: A preview of the eighth U.S.-China Strategic and Economic Dialogue More
05/24/2016: How do we end energy poverty? More
05/24/2016: Show me the money: Fiscal and financial fundamentals of 21st century city governance More
05/24/2016: The U.S.-Saudi Arabia counterterrorism relationship More
05/24/2016: Not-so-great expectations: The G-7’s waning role in global economic governance More
05/24/2016: Implementing the European Union's Digital Single Market Strategy More
05/24/2016: Realism Restrained: the Washington Playbook Strikes Back More
05/24/2016: Hate Speech Laws: Ratifying the Assassin’s Veto More
05/24/2016: The European Union's Digital Single Market Strategy: A conflict between government's desire for certainty and rapid marketplace innovation More
05/23/2016: Putin battles for the Russian homefront in Syria More
05/23/2016: Putin battles for the Russian homefront in Syria More
05/23/2016: Don’t hold back on fighting the Taliban More
More...
About | Contact Us | Support Us | Terms and Conditions

All Rights Reserved. Copyright 2002 - 2016