God forgives, would Google?
At present, the entire debate on ‘right to be forgotten’ is mainly focused on individual freedom and individual rights. However, it is important to look at this issue from a security angle too.
- Ajey Lele
- June 06, 2016
At present, the entire debate on ‘right to be forgotten’ is mainly focused on individual freedom and individual rights. However, it is important to look at this issue from a security angle too.
The cyber-attack on the election commission of The Philippines demonstrates the need for democracies to have a strong cyber security mechanism in place for the smooth conduct of elections.
Along with physical and system operational security at nuclear power plants, cybersecurity of electronic assets and computer/ICS networks have also become a major concern.
Even if the investigations reveal the technical reason behind the breach, issues of jurisdiction, accountability and dearth of international laws governing cyber or money laundering crimes would await another billion dollar breach.
Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
This edited volume contains the papers presented at the 18th Asian Security Conference at the Institute for Defence Studies and Analyses held in February 2016. The authors, drawn from government, law enforcement, diplomacy, private sector, armed forces and academia, examine a range of issues central to cybersecurity. The chapters in this volume not only provide an outline of the journey so far, but more importantly, give indicators of future trends in cybersecurity from the vantage point of the respective experts.
Contributions from Asia are particularly highlighted to promote and provoke greater discussion on perspective from within the region on cybersecurity issues.
Hacker groups have turned their attention to stock markets not just to disrupt operations but also to trade and make financial gains.
While the Wassenaar Arrangement has instant recall in nuclear circles, it has only recently become a source of turmoil in cybersecurity, after the US Bureau of Industry and Security published rules that are applicable to cyber technologies.
India’s vulnerability to cyber-attacks is going to increase exponentially with the development of infrastructure and programmes such as Digital India, National Optical Fibre Network, e-Governance, e-commerce and e-Services. The NCC provides a ready resource for picking up India’s cyber warriors in the available time frame.
While Asia is home to the largest number of internet users on the planet, there is comparatively little contribution from the region to the discussions on cybersecurity.