send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Please specify
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
It is important to understand why the nuclear deterrence worked over decades, few countries possess nuclear weapons or the resources required to produce them. Moreover the International organizations under United Nations i.e International Atomic Energy Agency and Treaties like NPT have been successful in large scale proliferation of nuclear arms and also successful in controlling the catastrophe the nuclear weapons pose to the globe. Whereas cyber weapons are not like the nuclear ones, they can be easily developed by small group of individuals and a nation state. These cyber weapons can be easily replicated and used to attack other computer networks, and it becomes difficult to check cyber proliferation. Horizontal proliferation is much easier in case of cyber weapons whereas it not easily possible in nuclear weapons. Usually the deterrence works on two major principals first is Denial and the second is Punishment. The first, denial, involves convincing would-be attackers that they won’t succeed, at least without enormous effort and cost beyond what they are willing to invest. The second punishment: Making sure the adversaries know there will be a massive retaliation that might inflict more harm than they are willing to bear.
Cyber security aids deterrence primarily through the principle of denial. It stops attacks before they can achieve their goals. This includes beefing up login security, encrypting data and communications, fighting viruses and other malware, and keeping software updated to patch weaknesses when they’re found. But it is important to develop cyber products which have a few if any vulnerabilities when they are shipped or installed. The Mirai Botnet which is capable of intrusion and generates data floods which result in overloading internet servers, targets devices which have security loop holes. Companies like Microsoft and other IT Giants spend huge money on cyber security where as the vendors like Internet of Things do not spend that much leaving gap holes in the Network security.
Cyber Defense: This is an important tool for achieving the cyber deterrence like Ballistic missile defense or on the lines of Air defense system which destroys any suspicious or hostile aircraft or any missile. Similarly network monitors that watch for and block (“shoot down”) hostile packets are one example, as are honey pots that attract or deflect adversary packets into safe areas. There, they do not harm the targeted network, and can even be studied to reveal attackers’ techniques. Active cyber defense does more than just deny attackers opportunities. It can often unmask the people behind them, leading to punishment. Black hat hackers or nongovernment attackers can be shut down, arrested and prosecuted , countries conducting or supporting cyber warfare can be sanctioned by the international community. International body or watch dog: setting up norms
As in case of Nuclear weapons and country which tries to procure these weapons in a clandestine method is subjected to stringent economic sanctions by USA or world community. This is only possible by sharing of information and Espionage conducted on suspicious Nation States. Similarly any country involved in cyber attack should be named and shamed by the international community if it indulges in any such attack. Also in case of individual hackers the international community should prosecute them and extradite the culprit should be issued red corner notice like by the Interpol on the similar lines it is done in a physical crime. In 2014 U.S. brought charges against five Chinese military hackers for targeting American companies. A year later, the U.S. and China agreed to not steal and exploit each other’s corporate secrets for commercial advantage. A U.N. group of experts in 2015, recommended banning cyber attacks against critical infrastructure, including a country’s computer emergency response teams (CERT) .And in the same year, the G20 issued a statement opposing the theft of intellectual property to benefit commercial entities. These norms might deter governments from conducting such attacks.
In 21st century cyberspace has become an integral part of human beings and it will never be immune to attack—no more than our streets will be immune to crime. But with stronger cyber security measures, increased use of active cyber defenses, and international cyber norms, we can hope to at least keep a lid on the problem.
By: Ajay Kumar ProfileResourcesReport error
Access to prime resources