4 September 2019

The Impact of Cyber Security Power in the World

Author: Sajad Abedi

Since the principle of self-restraint addresses a wide range of threats, both in the area of ​​justice and in the field of military and strategic affairs. But the implementation of deterrence in cyberspace is only proposed if the risks that are objectively possible have a direct impact on the security and survival of a government; therefore, each state is required to make it possible in any way to overcome the existing challenges.

Description

Since the principle of self-restraint addresses a wide range of threats, both in the area of ​​justice and in the field of military and strategic affairs. But the implementation of deterrence in cyberspace is only proposed if the risks that are objectively possible have a direct impact on the security and survival of a government; therefore, each state is required to make it possible in any way to overcome the existing challenges. The challenges of an attack, the estimation of the impact and reconstruction of the incident and the purpose of an attack, in the framework of public networking and actors, distinguish the cyberspace from other areas where deterrence is formed. Intrusions in cyberspace, although possible and possible, cannot be limited to existing measures, but unique concepts have to be developed and presented.


The same is true of cyberspace dominance and power. According to Daniel T. Coel, power here is “the ability to use cyberspace to gain points and impact on events in other operating environments, using power equipment”. The important thing is that on the eve of entering the cyberspace is a low level that, unlike other classical domains (land, sea, air, and space), any country, organization, social group or individual can penetrate it and play an unbelievable role. In the classical context, the conflict often ends with erosion and the reserves of one side, while most hostile acts in cyberspace are almost unprofitable. The result is that, according to Joseph S. Nay Jr, power in cyberspace is inherently widespread and the expression of different actors is divided. In fact, some challenges in the field of cybercrime are similar to those of other forms of deterrence. For example, the problem of identifying cyber attacks is reminiscent of the challenges of deterrence of nuclear terrorism. Identifying the effects of a cyber attack is much more similar to identifying the effects of biological weapons. Also, the invisibility of computerized weapons is very similar in many respects to the biological weapons challenge.

No comments: