Wed. May 27, 2015 Get Published  Get Alerts
HOME  |LOGIN
ABOUT | CONTACT US | SUPPORT US
Cyber Security – the biggest Global threat of our Time!

Comments(0)
Delhi hosted the 3rd Global Summit on Cyber Security in Oct 2012, which once again highlighted the complex security challenges that face the Cyber world. Advanced persistent threats (APT), Botnets, Hacktivists, Spies etc. are just among the daily headaches that put even top intelligence organizations to the test. But at least large organizations can afford to invest in cyber security solutions. Even more worrisome is the Norton 2012 Cybercrime report which states that 2 out of 3 adults online have been victims of cybercrime and each year the problem causes an estimated loss of about $ 110 billion. Every second, 18 adults become a victim of cybercrime with losses of an average $197 per victim annually. This yet does not take into account the emotional distress and dysfunction people suffer on account of cyber crime like hacking, information theft, invasion of privacy etc. Unlike large or even small organizations, individuals have rather limited access to any kind of advanced security solutions. The standard off the shelf security products have limited applicability and are not enough protection against even a slightly sophisticated attack. In countries like India, China etc. it is not easy to even register a cyber crime report and a response is almost unexpected. Furthermore, cyber criminals transcend boundaries, and international laws are inadequate to tackle the problem. As more and more of the world goes online in personal and professional sphere, cyber security is perhaps the number one challenge before the world yet we seem ill prepared to tackle it.

The Norton Cyber crime report for 2012 shows increased attacks in two areas as compared to 2011 – social networks and mobile networks. These are also the two areas where exciting new technological changes are happening everyday capturing more and more consumers. But as technological innovations are racing far ahead, the security systems seem to lag far behind. While most consumers seem aware of the new gizmos and apps being launched each day through mesmerizing ads, not enough are aware of the likely security threats or probable solutions. They rely on rudimentary knowledge making them easy targets for cyber criminals. They only seem to become aware once they have already become a victim. Awareness about security threats and probable solutions seems to be an issue at the individual level. Further, the technology business is no doubt driven by innovations which rake in the money but it would seem the security systems and innovations in those areas remain underinvested since they do not seem to be as lucrative an opportunity. Left to the private sector, this gap between galloping technology and lagging security systems is likely to remain or perhaps even widen. Unless a lot of awareness is generated about security issues and a lot more investment made into technological innovations in the cyber security area, this challenge will become a behemoth. At a larger level, the vulnerability of defense installations, transportation, power grids etc. to cyber attacks has always been a hot debate. Already some businesses and intelligence organizations have come to rely on paper records and safety vault systems for highly sensitive information. Could the severe lag on cyber security take us back to the paper and lock and key era?

Since hackers and other cyber criminals could be based in any country and launch an attack anywhere else, using already hacked systems, nabbing them would require a lot of trans-national cooperation. While there are summits and conferences - usually led by the industry, not much is being done at the government levels. Even international bodies like the UN are yet to get involved in this area and demand passing of international laws, leave alone seek cross country cooperation to enforce them. Lack of international cooperation thus remains another lacuna. To the contrary governments themselves are often involved in sponsoring spying and related hacking on other countries’ systems. The situation is worse in the developing world where even gruesome crime goes unpunished, so white collar cyber crime is unlikely to get any attention at all. A lot of attacks and spams originate from this part of the world where law enforcement remains a serious issue.

Given the alarming levels of cyber crime where 2 in 3 people online fall a victim to it, the apparent ignorance, grossly inadequate investment or innovations in security systems as well as weak law enforcement is even more worrisome. The problem plagues even top organizations like the FBI but they have a lot of resources at hand. However, it is often the individual or the common man who is most vulnerable to such attacks. They are often caught unawares and lacking access to any advanced help required to ward off the cyber crime or criminals, find themselves helpless in the face of it. Threatened cyber security and rising crime is perhaps staring the Technology horse in the mouth and could be its very nemesis. At the global level, the pan geographical origin of cyber attacks makes it a challenge very hard to tackle. At any rate, other than industry initiatives, not much is being done to raise the issue to the level of attention it deserves or requires. In a world relying more and more on technology, cyber security is the biggest global threat of our times yet it remains grossly under addressed at the international level and calls for greater focus and action.

Anuradha Kataria is an author and a consultant based in Delhi, India. She has published a book and editorials on the developing world issues. She also is a part of the growing statistic of 2 in 3 victims of cybercrime, having faced the hacking problem herself and seen the gaps in security systems or law enforcement process first hand.

Comments in Chronological order (0 total comments)

Report Abuse
Quick Links Twitter Face Book Get Alerts Contact Us Enter Ia-Forum Student Award Competition
International Affairs
Forum - (2014 Issue 1)

Available Now
ANNOUNCEMENTS
THE WORLD'S DISCUSSING...
06/02/2015: What Russia Really Wants More
06/01/2015: The Second Baptism of Rus'?: The Return of Religion and the (Soviet) Origins of Russian Patriotism More
05/27/2015: https://youtube.com/devicesupport More
05/27/2015: Event: Climate Change and Vulnerable Watersheds in the Andes - Lima, Peru More
05/27/2015: ONLINE ONLY - Brookings hosts Vice President Joe Biden for remarks on the Russia-Ukraine conflict More
05/27/2015: Instead of killing America’s shale revolution with increased production, the Saudis have jump-started Shale 2.0 More
05/27/2015: Designer Drugs: A New, Futile Front in the War on Illegal Drugs More
05/27/2015: Avoiding past mistakes More
05/27/2015: Southern Iraq is a safe place More
05/27/2015: The 10 lessons from global trade and investment planning in U.S. metro areas More
05/26/2015: Trial of Jason Rezaian raises red flags about proposed nuclear deal More
05/26/2015: Eurozone debt crisis: A Spanish wake-up call for Europe More
05/26/2015: NYT Shows No One Buys Government’s ‘Term of Art’ Argument in King v. Burwell More
05/26/2015: Former Governors Caucus brings common sense solutions to the Senate More
05/26/2015: Japan's Vision Toward China: Conflict and Cooperation in a New Asian Order? More
05/26/2015: Do the right thing More
05/26/2015: Will Greece Follow Ukraine's Gamble? More
05/26/2015: Blood and hope in Afghanistan: A June 2015 update More
05/26/2015: Blood and hope in Afghanistan: A June 2015 update More
05/26/2015: Undoing American leadership: The killer currency amendment to the trade bill More
05/26/2015: Can the data revolution transform how we finance development? More
05/26/2015: Venezuela: No Rule of Law, Bad Money More
05/26/2015: The big four banks: The evolution of the financial sector, Part I More
05/26/2015: Here to stay and growing: Combating ISIS propaganda networks More
05/26/2015: Jumpstarting community-led initiatives to counter violent extremism More
05/25/2015: The 4 Percent-Plus Solution More
05/25/2015: One year after Modi, U.S.-India and China-Pakistan ties deepen More
05/25/2015: Will Putin Gamble All On A Broader Ukraine Invasion? More
05/22/2015: Can Russian-Western Cooperation in the Arctic Survive the Current Conflict? More
05/22/2015: Climate change is a security threat to the Arctic and the time to act is now More
05/22/2015: Climate change is a security threat to the Arctic and the time to act is now More
05/22/2015: 'Should We Have Waged the Iraq War?' Is Not a Gotcha Question More
05/22/2015: Can FIFA become a role model for sustainable development? More
05/22/2015: Memo to Congress: Don't Do Something, Just Stand There More
05/22/2015: Sen. Paul's Great Surveillance 'Filibuster' and What to Expect Next More
05/22/2015: Chrystia Freeland on Ukraine's struggle for independence More
05/22/2015: The Glaring (Ir)Relevance of Ramadi More
05/22/2015: If You Don't Want Your Food Genetically Modified, Tell Nature to Stop It. More
05/22/2015: Currency Manipulation Can't be Fixed by Countervailing Duties More
05/22/2015: The fog of peace: An interview with Jean-Marie Guehénno More
05/22/2015: Iraq after the fall of Ramadi: How to avoid another unraveling of Iraq More
05/22/2015: Iraq after the fall of Ramadi: How to avoid another unraveling of Iraq More
05/22/2015: What Chinese investment could mean for Pakistan More
05/22/2015: NSA Surveillance: What Happens Next? More
05/22/2015: What you may not know about China and currency manipulation More
05/21/2015: The Regional Cold Wars in Europe, East Asia, and the Middle East: Crucial Periods and Turning Points More
05/21/2015: Tunisian President on Islam, Politics and Extremism More
05/21/2015: Security risks: The tenuous link between climate change and national security More
05/21/2015: Security risks: The tenuous link between climate change and national security More
05/21/2015: 10 maps that explain Ukraine’s struggle for independence More
More...
About | Contact Us | Support Us | Terms and Conditions

All Rights Reserved. Copyright 2002 - 2015