{"id":108180,"date":"2021-05-22T10:09:25","date_gmt":"2021-05-22T04:39:25","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=108180"},"modified":"2021-05-22T15:38:12","modified_gmt":"2021-05-22T10:08:12","slug":"need-of-global-rules-to-protect-the-cyberspace","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/need-of-global-rules-to-protect-the-cyberspace\/","title":{"rendered":"Need of Global Rules to protect the Cyberspace"},"content":{"rendered":"\n<h5><b>Synopsis<\/b><span style=\"font-weight: 400;\">:<\/span><\/h5>\n<p><span style=\"font-weight: 400;\">The 21st century is going to be an era of data revolution wherein almost all the activities would be carried on in <a href=\"https:\/\/forumias.com\/blog\/paris-call-for-trust-and-security-in-cyberspace-microsoft-urges-india-to-join-in\/\">cyberspace<\/a>. This calls for creating some global rules to protect cyberspace as their absence has failed to prevent cyberattacks even on powerful countries like the U.S.<\/span><\/p>\n<h5><b>Background<\/b><span style=\"font-weight: 400;\">:<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The US created cyberspace as a free, open, decentralized, distributed, and self-governing platform.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In the current scenario, the domain has gained utmost importance as our critical systems like power, financial or military etc. are connected to it through data.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Further, the introduction of 5G technology and the Internet of Things would turn everything into a networked object. It would lead to an exponential expansion of data.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">This high usage of data would ease the governance process but would also make the system more prone to cyber-attacks.<\/span><\/li>\n<\/ul>\n<h5><b>Reasons behind Cyberattacks<\/b><span style=\"font-weight: 400;\">:<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><b>Economic Benefits: <\/b><span style=\"font-weight: 400;\">A cyberattack gives a hacker access to critical economic data that can be sold for millions in the grey market.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">For instance, a Chinese attack on the weapon design system of the US allows it to develop a competitive advanced defence system. It enables the country to save millions of dollars and years of research and development.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><b>Ideological Conflict: <\/b><span style=\"font-weight: 400;\">The free and decentralised structure of cyberspace goes against the ideology of authoritarian countries like Russia and China. This induces them to launch attacks on democratic countries like U.S and India. They have also built firewalls to protect their societies from freedom.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Geopolitical Interest: <\/b><span style=\"font-weight: 400;\">One country attacks another country\u2019s data to serve its geopolitical interest in the region. The attack is aimed to cripple the governance structure in another country and induce it to act in a favourable way.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">For instance, IP theft costs the US economy hundreds of billions of dollars annually and reduces US companies\u2019 R&amp;D investment and innovation. The reduced investment and rising losses diminish its geopolitical position.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5><b>Factors fueling Cyberattacks<\/b><span style=\"font-weight: 400;\">:<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><b>No Global Order: <\/b><span style=\"font-weight: 400;\">Countries have domestic laws and agencies to punish cyber offenders. However, it is difficult to punish if the attacker is located in another country as there are no global rules on cyberspace.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Low Entrance Threshold: <\/b><span style=\"font-weight: 400;\">It enables a curious person to learn and become a hacker. This allows him\/her to get into infrastructure, financial or military systems without leaving a trace.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Synergy between State and Non-State Actors<\/b><span style=\"font-weight: 400;\">: Rogue states and well-organised digital terrorist groups use footloose hackers to invade diplomatic and strategic plans.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">For instance, the October 2020 cyberattack shut down the electrical grid of Mumbai. The New York Times claimed this to be an attack carried out by China with the support of non-state actors.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><b>Traceability:<\/b><span style=\"font-weight: 400;\"> The advancement in technology has made the traceability of hackers very difficult.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">For instance, the hacking group demanded ransom in bitcoins in the May 7 ransomware attack on Colonial Pipeline, one of America\u2019s largest fuel suppliers. However, the countries can\u2019t trace transactions in cryptocurrency.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5><b>Way Forward:<\/b><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The countries should realise the inefficiencies of domestic laws and institutions in combating cyber attacks.<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">For instance, the US has a National Security Agency that conducts surveillance under the authority of the Foreign Intelligence <a href=\"https:\/\/forumias.com\/blog\/surveillance-state\/\" target=\"_blank\" rel=\"noopener\">Surveillance<\/a> Act.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Similarly, it has a dedicated Cyber Command but still, it was unable to prevent the May 7 ransomware attack on the colonial pipeline.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Thus, the countries must work together to develop global law and technology to implement more aggressive measures against cyberattacks. The focus should be on developing foolproof encryption to protect the nation\u2019s data.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Source<\/b><span style=\"font-weight: 400;\">: <a href=\"https:\/\/timesofindia.indiatimes.com\/blogs\/toi-edit-page\/powers-new-dimension-no-rules-of-the-road-protect-cyberspace-where-we-live-our-lives-today\/\">Click Here<\/a>\u00a0 <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Synopsis: The 21st century is going to be an era of data revolution wherein almost all the activities would be carried on in cyberspace. This calls for creating some global rules to protect cyberspace as their absence has failed to prevent cyberattacks even on powerful countries like the U.S. Background: The US created cyberspace as&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/need-of-global-rules-to-protect-the-cyberspace\/\">Continue reading <span class=\"screen-reader-text\">Need of Global Rules to protect the Cyberspace<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1230,1351,1310,9],"tags":[1361],"class_list":["post-108180","post","type-post","status-publish","format-standard","hentry","category-9-pm-daily-articles","category-daily-news","category-daily-news-updates","category-public","tag-sec_4","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":1700782765,"cached_date":1704663688},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/108180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=108180"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/108180\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=108180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=108180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=108180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}