Cyber Wars Won't Replace or Trigger Traditional Wars

0.jpg

Dr. Adam Segal

A cyber war is not capable of triggering a traditional war nor has the ability to replace it in near future, director of Digital and Cyberspace Policy at the Council on Foreign Relation (CFR) Adam Segal has said.

Addressing the media at American Corner in St Francis College for Women here on Monday, Segal said, “People asking whether a cyber war can replace or trigger a traditional war has become quite common now. If a country’s website is hacked by an individual or through the state sponsored attack, chances are that the affected state will take revenge by attacking their websites. Most of the time, countries ignore this kind of things and would not start a traditional war.

“Besides, we are not going to see cyber wars replacing an armed conflict any time soon for the simple reason that most cyber attacks can be made only once. By the time if the attacker wants to do it again, the rival country would have found out a solution for it. So cyber wars are not a viable option.”

Segal, who is also the Maurice R Greenberg senior fellow for China studies, said, cyber attacks from China was not a major threat to the United States. “It is true that China has many hackers but they are not that equipped to cause major damage. But hackers from Russia are smart and can cause some serious threat.”

On the cyber security agreement between the US and China, he said, “China needs to distinguish between cyber espionage directed at military and political secrets and cyber-enabled theft of business plans and intellectual property. Both are not the same and it is time they realised this.”

About US spying on other countries, he said, “There are two kinds of spying, good and bad. There is a very thin line between the two and other countries will have no reason to believe it. Instead of asking whether they can or cannot do spying on other countries or within the country, they should decide on whom they want do it. Is there a necessity for doing it?”
Ein News: http://bit.ly/1GvISdL

 

 

« Cybersecurity Firm Illusive Protects by Deception
US Drone Registry Set Up In Response to Safety Concerns »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.

Nyx Security Solutions

Nyx Security Solutions

Nyx is committed to excellence in embedded cybersecurity, delivering top-tier secure design, development, and penetration testing services that meet and exceed industry standards.

ENKI WhiteHat

ENKI WhiteHat

ENKI WhiteHat is an offensive security specialist, preemptively addressing cyber threats from a hacker’s perspective.