Cyber Wars Won't Replace or Trigger Traditional Wars

0.jpg

Dr. Adam Segal

A cyber war is not capable of triggering a traditional war nor has the ability to replace it in near future, director of Digital and Cyberspace Policy at the Council on Foreign Relation (CFR) Adam Segal has said.

Addressing the media at American Corner in St Francis College for Women here on Monday, Segal said, “People asking whether a cyber war can replace or trigger a traditional war has become quite common now. If a country’s website is hacked by an individual or through the state sponsored attack, chances are that the affected state will take revenge by attacking their websites. Most of the time, countries ignore this kind of things and would not start a traditional war.

“Besides, we are not going to see cyber wars replacing an armed conflict any time soon for the simple reason that most cyber attacks can be made only once. By the time if the attacker wants to do it again, the rival country would have found out a solution for it. So cyber wars are not a viable option.”

Segal, who is also the Maurice R Greenberg senior fellow for China studies, said, cyber attacks from China was not a major threat to the United States. “It is true that China has many hackers but they are not that equipped to cause major damage. But hackers from Russia are smart and can cause some serious threat.”

On the cyber security agreement between the US and China, he said, “China needs to distinguish between cyber espionage directed at military and political secrets and cyber-enabled theft of business plans and intellectual property. Both are not the same and it is time they realised this.”

About US spying on other countries, he said, “There are two kinds of spying, good and bad. There is a very thin line between the two and other countries will have no reason to believe it. Instead of asking whether they can or cannot do spying on other countries or within the country, they should decide on whom they want do it. Is there a necessity for doing it?”
Ein News: http://bit.ly/1GvISdL

 

 

« Cybersecurity Firm Illusive Protects by Deception
US Drone Registry Set Up In Response to Safety Concerns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Rakuten Maritime

Rakuten Maritime

Rakuten Maritime is your trusted partner in maritime cybersecurity, offering comprehensive and proactive solutions tailored to every stage of a ship’s life cycle.