Cyber Security Dilemma
Any cyber architecture can be viewed as a doubled edged sword – either ignore it and be exposed or use it to one’s advantage. Cyber espionage is here to stay.
- Ajey Lele
- June 18, 2013
Any cyber architecture can be viewed as a doubled edged sword – either ignore it and be exposed or use it to one’s advantage. Cyber espionage is here to stay.
A ‘pearl’ could be viewed as a sphere of influence seeded, secured and maintained through the use of economic, geopolitical, diplomatic or military means. The ‘string of pearls’ is about China’s unambiguous maritime strategy that investments in increasing its sea power. This is essentially a multi-pronged strategy that challenges dominant US interests in the Indian Ocean and sends a clear message to India that the Indian Ocean is not India’s ocean by increasing the dependence of the littoral states in the region on China.
Even as imagined and real cyber security threats scale new heights, the story coming out of the recently concluded Second International Conference on Cyberspace in Budapest was one of a widening gulf between countries, notwithstanding the stated intent of bridging differences through dialogue.
The Prime Minister’s address highlighted critical threats to internal security and expected counter-measures with the aim of refocusing the attention of the police forces on these vital issues.
The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.
The raging controversy on social media regulation post the violence in Assam has left the government in a losing perception battle. It is time to engage with the new media and exploit its potential to communicate strategically and not shoot the messenger
India should support the idea of TCBMs (transparency and confidence building measures) as a first step towards a code of conduct or eventual cyber security convention.
There is an ongoing global competition to gain dominance in the space and cyber domains; while going it alone might be the best policy, collaboration with clearly laid out guidelines and end-goals is not without its benefits.
There is an ongoing global competition to gain dominance in the space and cyber domains; while going it alone might be the best policy, collaboration with clearly laid out guidelines and end-goals is not without its benefits.
The absence of agreed norms of conduct in cyberspace and the scope for conducting a myriad range of malafide activities with limited risk of retribution is leading to both vertical and horizontal proliferation of such activities.



