Page 100 - Cyber Defense eMagazine April 2023
P. 100

resources and those challenges should be tackled intelligently as the ongoing century has given unrests
            and crises over the globe. In order to protect the international interests in the world the cyber community
            must  put  a  lot  of  effort  developing  tactics  and  strategies  how  to  manage  the  risk  within  the  virtual
            surrounding.




            Characteristics of Asymmetric Landscape



            The point of the asymmetric battlefield is a small group of the challengers will try to attack the numerous
            enemy. In other words, it’s not about the warfare between two or more equally powerful sides, but manly
            the conflict of some crime organization with the entire country or even the global community. The modern
            age is witnessing such a situation as the minority of the world’s population believes it can get a power
            and dominance over the rest of the people. Combating asymmetric threat is very demanding as those
            folks cope with well-developed techniques of pushing their interests in the world. Cyber attacks are also
            asymmetric risk as it is possible to use a small army of the high-tech warriors which are capable to assault
            a heap of the targets within several hours causing so impactful harm. Apparently, after conducting a
            campaign the hackers normally select to escape and sometimes it is a challenge to locate them. The
            best policing practice can offer some response to such a criminality mostly through the international
            cooperation as cybercrime is a transnational offense.



            Feasible Responses to Hacking



            The  usual  cyber  attacks  can  affect  the  accounts,  endpoints,  communication  and  anything  being
            correlated with the web experience. The internet grid is available mostly with any place in the world and
            hackers know how to exploit its vulnerabilities. There are three sorts of cyber security such as prevention,
            surveillance and incident response. The leading experts in the field recommend to attempt to balance
            amongst  those  three  types  of  defense.  The  perfect  outcome  to  that  challenge  is  to  make  an  equal
            distribution of those key pillars once something is going on in the cyberspace. Also, the cyber security
            marketplace  copes  with  some  skill  gap,  but  even  in  that  case  it  is  necessary  to  take  an  ingenious
            approach getting roads which probably exist, but they are not aware today.
















                                                                                                             100
   95   96   97   98   99   100   101   102   103   104   105