Page 230 - Cyber Defense eMagazine June 2024
P. 230

No technology is safe from a security risk even being physical and, in this case, virtual being strongly
            correlated  with  the  current  information-communication  technologies  (ICT)  that  are  mostly  something
            many can see as a cyberspace, so far. With the appealingly high demand for a cyber security in the
            majority of progressive countries and initially led by the United States there has appeared a totally new
            branch of the commerce being a cyber industry which in order to acquire the biggest possible marketplace
            sometimes has used a language of the fear trying to aware a business sector to invest into ICT defense,
            but after realizing the results to that strategy are poor switched to an approach being much closer to the
            business people as it is always challenging to make players pay more if they happily can live without
            such offerings and stay with a more money in their pockets. That was an attitude yesterday, but nowadays
            many have become convinced that under arising threat from a terrorism mostly, as well as the other
            asymmetric challenges the cyber security has turned in a requirement many will appreciate and their
            governments once getting confident about the very feasible consequences to the critical infrastructure
            have approved such national strategies and legal regulations, so far. It’s fully difficult adopting such an
            approach as the ongoing lessons from a modern history are quite unhandy and no one would want them
            ever happen to anyone again, so that’s why such a need has been recognized and maybe that is not a
            completely  global  trend  as  in  some  parts  of  the  world  it’s  yet  too  costy  investing  funds  into  those
            technological landscapes as in the low-level economy countries the money is not an only concern, but
            more  likely  a  skill  shortage  is  enormously  large  and  those  guys  simply  cannot  resolve  any  of  such
            complicated  and  complex  tasks,  so  far.  In  other  words,  cyber  defense  looks  for  an  international
            collaboration as the domestic, regional and global policing organizations must cope with both – human
            and technological resources to tackle a cybercrime. The experience suggests that the majority of those
            asymmetric threats are deeply linked with the transnational organized crime and terrorism and it is only
            a matter of time when someone can drastically attack from the cyberspace and affect the lives of many
            in a truly negative connotation, so far. The fact is any technological weapon must have its adequate
            counter-weapon which might respond to an always arising threat which in the best-case scenario, should
            be prevented to even occur which is an extremely hard problem to those who are not having a technical
            capacity and if they just have, they cannot count on people who could be enough skilled to even use that.
            Next, in the modern time, the information travels in a sub-second period of time and even if some defense
            agencies are technologically equipped, they need a plenty of time to train their human capacities to get
            vetting about their highly demanding tasks being assigned to them in order to let them provide the best
            possible response to the crime and literally stay at least a step ahead of the bad guys.



            References:

            [1]  Djekic,  M.  D.,  2017.  The  Internet  of  Things:  Concept,  Application  and  Security.  LAP  LAMBERT
            Academic Publishing.

            [2] Djekic, M. D., 2021. The Digital Technology Insight. Cyber Security Magazine

            [3] Djekic, M. D., 2021. Smart Technological Landscape. Cyber Security Magazine

            [4] Djekic, M. D., 2021. Biometrics Cyber Security. Cyber Security Magazine

            [5] Djekic, M. D., 2020. Detecting an Insider Threat. Cyber Security Magazine





            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          230
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   225   226   227   228   229   230   231   232   233   234   235