The Dark Web and Regulatory Challenges
The dark web has turned into a hot bed of illegal transactions, posing a threat to the cyberspace across multiple dimensions.
- Debopama Bhattacharya
- July 23, 2021
The dark web has turned into a hot bed of illegal transactions, posing a threat to the cyberspace across multiple dimensions.
Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.
The ever-growing dependence of man on cybernetworks has unbridled a modish genre of cyberthreat called cyberterrorism. The pervasive cyberspace has provided an advantageous operational frontier to the terrorists for executing cyberattacks on critical infrastructures, spreading hate propaganda over the Internet and using it for recruitment, planning and effecting terror attacks.
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.
It is critical to reduce the risks associated with cyber-enabled elections by ensuring end-to-end verifiability, protection of voter database, managing risks to the election infrastructure and curbing the menace of disinformation.
With the adoption of varied digital means in times of pandemic, the states are likely to witness increased cyberattacks. Absence of an effective response would only mean an open playground for perpetrators.
With digital threats becoming trickier, a more holistic approach towards cybersecurity would help create a vibrant digital healthcare environment.
With a new found celebrity status among the video conferencing applications, Zoom now faces a massive privacy and security threat as the platform’s default settings are not secure enough.
While maintaining cyber hygiene in these disruptive times is indeed a challenge, each organisation should work towards putting in place a tailor-made work-from-home cyber defence strategy.
The existing approach to cyber security is heavily tilted towards practising deterrence by denial, essentially by building defences. However, the concept of deterrence needs further tweaking to make it workable in cyberspace.