Fri. November 28, 2014 Get Published  Get Alerts
HOME  |LOGIN
ABOUT | CONTACT US | SUPPORT US
Cyber Security – the biggest Global threat of our Time!

Comments(0)
Delhi hosted the 3rd Global Summit on Cyber Security in Oct 2012, which once again highlighted the complex security challenges that face the Cyber world. Advanced persistent threats (APT), Botnets, Hacktivists, Spies etc. are just among the daily headaches that put even top intelligence organizations to the test. But at least large organizations can afford to invest in cyber security solutions. Even more worrisome is the Norton 2012 Cybercrime report which states that 2 out of 3 adults online have been victims of cybercrime and each year the problem causes an estimated loss of about $ 110 billion. Every second, 18 adults become a victim of cybercrime with losses of an average $197 per victim annually. This yet does not take into account the emotional distress and dysfunction people suffer on account of cyber crime like hacking, information theft, invasion of privacy etc. Unlike large or even small organizations, individuals have rather limited access to any kind of advanced security solutions. The standard off the shelf security products have limited applicability and are not enough protection against even a slightly sophisticated attack. In countries like India, China etc. it is not easy to even register a cyber crime report and a response is almost unexpected. Furthermore, cyber criminals transcend boundaries, and international laws are inadequate to tackle the problem. As more and more of the world goes online in personal and professional sphere, cyber security is perhaps the number one challenge before the world yet we seem ill prepared to tackle it.

The Norton Cyber crime report for 2012 shows increased attacks in two areas as compared to 2011 – social networks and mobile networks. These are also the two areas where exciting new technological changes are happening everyday capturing more and more consumers. But as technological innovations are racing far ahead, the security systems seem to lag far behind. While most consumers seem aware of the new gizmos and apps being launched each day through mesmerizing ads, not enough are aware of the likely security threats or probable solutions. They rely on rudimentary knowledge making them easy targets for cyber criminals. They only seem to become aware once they have already become a victim. Awareness about security threats and probable solutions seems to be an issue at the individual level. Further, the technology business is no doubt driven by innovations which rake in the money but it would seem the security systems and innovations in those areas remain underinvested since they do not seem to be as lucrative an opportunity. Left to the private sector, this gap between galloping technology and lagging security systems is likely to remain or perhaps even widen. Unless a lot of awareness is generated about security issues and a lot more investment made into technological innovations in the cyber security area, this challenge will become a behemoth. At a larger level, the vulnerability of defense installations, transportation, power grids etc. to cyber attacks has always been a hot debate. Already some businesses and intelligence organizations have come to rely on paper records and safety vault systems for highly sensitive information. Could the severe lag on cyber security take us back to the paper and lock and key era?

Since hackers and other cyber criminals could be based in any country and launch an attack anywhere else, using already hacked systems, nabbing them would require a lot of trans-national cooperation. While there are summits and conferences - usually led by the industry, not much is being done at the government levels. Even international bodies like the UN are yet to get involved in this area and demand passing of international laws, leave alone seek cross country cooperation to enforce them. Lack of international cooperation thus remains another lacuna. To the contrary governments themselves are often involved in sponsoring spying and related hacking on other countries’ systems. The situation is worse in the developing world where even gruesome crime goes unpunished, so white collar cyber crime is unlikely to get any attention at all. A lot of attacks and spams originate from this part of the world where law enforcement remains a serious issue.

Given the alarming levels of cyber crime where 2 in 3 people online fall a victim to it, the apparent ignorance, grossly inadequate investment or innovations in security systems as well as weak law enforcement is even more worrisome. The problem plagues even top organizations like the FBI but they have a lot of resources at hand. However, it is often the individual or the common man who is most vulnerable to such attacks. They are often caught unawares and lacking access to any advanced help required to ward off the cyber crime or criminals, find themselves helpless in the face of it. Threatened cyber security and rising crime is perhaps staring the Technology horse in the mouth and could be its very nemesis. At the global level, the pan geographical origin of cyber attacks makes it a challenge very hard to tackle. At any rate, other than industry initiatives, not much is being done to raise the issue to the level of attention it deserves or requires. In a world relying more and more on technology, cyber security is the biggest global threat of our times yet it remains grossly under addressed at the international level and calls for greater focus and action.

Anuradha Kataria is an author and a consultant based in Delhi, India. She has published a book and editorials on the developing world issues. She also is a part of the growing statistic of 2 in 3 victims of cybercrime, having faced the hacking problem herself and seen the gaps in security systems or law enforcement process first hand.

Comments in Chronological order (0 total comments)

Report Abuse
Quick Links Twitter Face Book Get Alerts Contact Us Enter Ia-Forum Student Award Competition
International Affairs
Forum - (2014 Issue 1)

Available Now
ANNOUNCEMENTS
THE WORLD'S DISCUSSING...
11/28/2014: Financial Regionalism and the International Monetary System More
11/28/2014: Fiscal Therapy: A Rehab Program for America's Addiction to Debt More
11/28/2014: Financial Regionalism and the International Monetary System More
11/27/2014: Some Perspective on What We Have to Be Thankful For More
11/26/2014: Development blog: Alex Cobham’s Off to the Tax Justice Network More
11/26/2014: Teyise Dlamini Tells the United Nations, Children are the Future More
11/26/2014: NSA Reform -- The Consequences of Failure More
11/26/2014: U.S. Filled Okinawa with Bases and Japan Kept Them There: Okinawans Again Say No More
11/26/2014: Happy Thanksgiving from Cato More
11/26/2014: Obama’s Overshadowed Start-up Gambit More
11/26/2014: India’s Role in the International Climate Negotiations More
11/26/2014: Congressman William Frenzel: A Mountain of Humility More
11/26/2014: Iran Nuclear Talks: For Europe, Roll-Over Is Better than Game Over More
11/26/2014: Hutchins Roundup: Tax Revenue, Decentralizations, and More More
11/26/2014: Hutchins Roundup: Tax Revenue, Decentralizations, and More More
11/26/2014: The Uniquely Widespread Presidential Campaign of Rand Paul More
11/25/2014: Global Health blog: Realizing the Vision of Swasth Bharat through Fiscal Federalism in India More
11/25/2014: France’s and Italy’s New ‘Tony Blairs’: Third Way or No Way? More
11/25/2014: WATCH: Robert Einhorn Explains Status of P5+1–Iran Nuclear Negotiations More
11/25/2014: Development blog: Should Sovereign Wealth Funds Finance Domestic Investment? More
11/25/2014: Development blog: World AIDS Day 2014: UNAIDS Shifts Its Emphasis toward Reducing New Infections More
11/25/2014: Global Health blog: World AIDS Day 2014: UNAIDS Shifts Its Emphasis toward Reducing New Infections More
11/25/2014: The US-China Climate Deal: Not a Free Ride for the Chinese More
11/25/2014: Iran-P5+1 Nuclear Negotiations: The Road Ahead More
11/25/2014: China Takes another Step toward Capital Freedom More
11/25/2014: CGD Event: Winners and Losers of Globalization: Political Implications of Inequality More
11/24/2014: Development blog: All Technology Leapfrogging Is Not the Same (Why Phones ? Energy) More
11/24/2014: Development blog: ‘Taxing across Borders’: An Academic Milestone More
11/24/2014: Police Misconduct, in Ferguson and Beyond More
11/24/2014: Bury Lenin's Body and the Rest of Communism: In Red Square He Lies in State, Mocking Humanity More
11/24/2014: Safeguarding the Role of Displaced Communities in Decisions about Relocations More
11/24/2014: Safeguarding the Role of Displaced Communities in Decisions about Relocations More
11/24/2014: America's Dangerous Double Standard on Air and Sea "Provocations" More
11/24/2014: Going Overboard at the Labor Board More
11/24/2014: Reviving Growth: A Cato Online Forum More
11/22/2014: NAGPRA, Indian Burials, and the Unquiet Grave More
11/22/2014: The School Religious Holidays Problem Is Really a Public Schooling Problem More
11/21/2014: Development blog: Trade Growth Is Slowing; Is Protectionism to Blame? More
11/21/2014: Obama’s Act Gives Hope to Four Million Immigrants, but More is Needed More
11/21/2014: Cuba’s Foreign Investment Invitation: Insights into Internal Struggles More
11/21/2014: How Places Can Make the Executive Actions on Immigration Work More
11/21/2014: Republican Division on an Immigration Response Highlights a GOP Challenge More
11/21/2014: Currency Wars, the Ruble and Keynes More
11/21/2014: Inequality and Envy More
11/21/2014: Bad Laws Lead to Bad Executive Orders More
11/21/2014: Bring China and Its Neighbors Under the INF Missile Treaty More
11/21/2014: A Perplexing Foreign Policy More
11/21/2014: NSA Reform: Not Dead Yet More
11/21/2014: CGD Publication: To Charge or Not to Charge: Evidence from a Health Products Experiment in Uganda - Working Paper 387 More
11/20/2014: Obama’s Immigration Order Isn’t a Power Grab More
More...
About | Contact Us | Support Us | Terms and Conditions

All Rights Reserved. Copyright 2002 - 2014