Cyber War and Peace

images?q=tbn:ANd9GcTVEudITWmGhvPaCUgXbB0vExPhR7_XPmgko-KFAktaclDuCPRz

Information and communication technologies have become a central part of everyday life for most of the world’s population. They affect even the most underdeveloped and remote areas of the planet and have become a key factor driving development, innovation and economic growth.

But this is just the beginning of a fundamental transformation. In the coming years, new technologies, such as the “Internet of things,” 3-D printing, and autonomous vehicles will revolutionise businesses operations, regulatory regimes, and even social conventions.

These technologies generate enormous benefits, but they are also risky, owing to the ease of accessing data and using it for criminal purposes. Cyber-attacks are already vastly increasing in number, sophistication, magnitude, and impact. As the world becomes more interdependent and hyper-connected, there is growing concern about the vulnerability of the Internet, an infrastructure on which nearly all economic activities – including trade, energy provision, and the entire financial system – have come to depend.

Cyber-attacks take place in a medium, cyberspace, where offensive actions have an advantage over defensive ones. Indeed, most of cyberspace’s infrastructure was designed to ensure its interoperability and openness, often at the expense of security, which tends to limit usability.

Attacks are usually asymmetric; the barriers to cyberspace are inconsequential and governments have struggled to enforce the rule of law online. Attackers with limited resources are able to cause disruptions that have far greater impact than similar actions in the physical world. Indeed, the damage from a cyber-attack is by nature transnational, capable of rapidly cascading to a global level.

In a medium that does not map onto political borders, it is impossible to manage risks successfully from just one jurisdiction. In economic terms, cybercrime is already comparable in size to drug trafficking, and it is highly internationalized. But we have yet to develop fully a global governance regime. Various initiatives have attempted to facilitate the international management of cyberspace, but none has had more than limited success.

The Global Conference on Cyberspace (GCCS), recently hosted by the Netherlands, is an example of this. Representatives from governments, the private sector, civil society, and the technical community met in The Hague to foster a multi-stakeholder approach to cyberspace governance and public-private cooperation.

The approach embodied by the GCCS combines a traditional regime – in which sovereign states are the main players – with another, more modern approach, in which all of the agents concerned participate. This more open, multi-stakeholder model mirrors the traditional technical management of the Internet, which has proven to be very effective in maintaining the resilience of cyberspace. It is based on bottom-up consensus, fosters a collective sense of management, and stresses the promotion of trust and international cooperation.

The effectiveness of approaches like this one is limited by the fact that the three largest cyberspace powers – the United States, China, and Russia – have not agreed on a common treaty to harmonize national laws or facilitate cooperation. Nor do they cooperate on the issue through other institutions, with the exception of the G-20 and the United Nations. Recent cases of cyber espionage have generated growing mistrust even among traditional allies like Germany and the US. In the interest of defending their sovereignty, states could begin to interfere in the technical governance that has proved so efficient.

Indeed, the danger of international conflict has worsened in the past few months, eroding whatever trust existed between the powers. Cyberspace risks becoming a battleground, on which governments, non-state actors, and the private sector all clash. The recent attack by jihadis on France’s channel TV5 and the alleged hack of Sony by North Korea may be forerunners of what is to come.

Companies and civil society alike have roles to play in ensuring that the governance of cyberspace remains open, inclusive, and sufficiently flexible to adapt itself to changing risks and challenges. The existing approach to technical management must be preserved, even as other innovative proposals are explored. Ideas that could contribute to better governance include a G-20 (states) + 20 (relevant non-governmental players) Cyber Council for Stability and an early warning and coordination system based on the World Health Organization’s approach to epidemics.

Responding to twenty-first-century threats with twentieth-century tools is a bad idea. By 2020, two-thirds of the global population will be online. The world needs a fluid and frank dialogue among states, the private sector, and civil society in order to guarantee the security of cyberspace.
The international community has put in place minimal codes that regulate areas like health and nuclear weapons proliferation. There is no reason why we cannot do the same in cyberspace. We all have a common interest in preserving its openness and global character; doing so will require that we set aside narrow national interests in the interest of guaranteeing collective progress.

Newvision

« Hacking Aviation Technology
There is No Secure Inside – So Get the Most from your Firewall »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Encore Media Group

Encore Media Group

Encore Media Group provide an international enterprise technology event series exploring IoT, Blockchain AI, Big Data, 5G, Cyber Security and Cloud.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.