Cyber Wars Won't Replace or Trigger Traditional Wars

0.jpg

Dr. Adam Segal

A cyber war is not capable of triggering a traditional war nor has the ability to replace it in near future, director of Digital and Cyberspace Policy at the Council on Foreign Relation (CFR) Adam Segal has said.

Addressing the media at American Corner in St Francis College for Women here on Monday, Segal said, “People asking whether a cyber war can replace or trigger a traditional war has become quite common now. If a country’s website is hacked by an individual or through the state sponsored attack, chances are that the affected state will take revenge by attacking their websites. Most of the time, countries ignore this kind of things and would not start a traditional war.

“Besides, we are not going to see cyber wars replacing an armed conflict any time soon for the simple reason that most cyber attacks can be made only once. By the time if the attacker wants to do it again, the rival country would have found out a solution for it. So cyber wars are not a viable option.”

Segal, who is also the Maurice R Greenberg senior fellow for China studies, said, cyber attacks from China was not a major threat to the United States. “It is true that China has many hackers but they are not that equipped to cause major damage. But hackers from Russia are smart and can cause some serious threat.”

On the cyber security agreement between the US and China, he said, “China needs to distinguish between cyber espionage directed at military and political secrets and cyber-enabled theft of business plans and intellectual property. Both are not the same and it is time they realised this.”

About US spying on other countries, he said, “There are two kinds of spying, good and bad. There is a very thin line between the two and other countries will have no reason to believe it. Instead of asking whether they can or cannot do spying on other countries or within the country, they should decide on whom they want do it. Is there a necessity for doing it?”
Ein News: http://bit.ly/1GvISdL

 

 

« Cybersecurity Firm Illusive Protects by Deception
US Drone Registry Set Up In Response to Safety Concerns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.