Page 230 - Cyber Defense eMagazine June 2024
P. 230
No technology is safe from a security risk even being physical and, in this case, virtual being strongly
correlated with the current information-communication technologies (ICT) that are mostly something
many can see as a cyberspace, so far. With the appealingly high demand for a cyber security in the
majority of progressive countries and initially led by the United States there has appeared a totally new
branch of the commerce being a cyber industry which in order to acquire the biggest possible marketplace
sometimes has used a language of the fear trying to aware a business sector to invest into ICT defense,
but after realizing the results to that strategy are poor switched to an approach being much closer to the
business people as it is always challenging to make players pay more if they happily can live without
such offerings and stay with a more money in their pockets. That was an attitude yesterday, but nowadays
many have become convinced that under arising threat from a terrorism mostly, as well as the other
asymmetric challenges the cyber security has turned in a requirement many will appreciate and their
governments once getting confident about the very feasible consequences to the critical infrastructure
have approved such national strategies and legal regulations, so far. It’s fully difficult adopting such an
approach as the ongoing lessons from a modern history are quite unhandy and no one would want them
ever happen to anyone again, so that’s why such a need has been recognized and maybe that is not a
completely global trend as in some parts of the world it’s yet too costy investing funds into those
technological landscapes as in the low-level economy countries the money is not an only concern, but
more likely a skill shortage is enormously large and those guys simply cannot resolve any of such
complicated and complex tasks, so far. In other words, cyber defense looks for an international
collaboration as the domestic, regional and global policing organizations must cope with both – human
and technological resources to tackle a cybercrime. The experience suggests that the majority of those
asymmetric threats are deeply linked with the transnational organized crime and terrorism and it is only
a matter of time when someone can drastically attack from the cyberspace and affect the lives of many
in a truly negative connotation, so far. The fact is any technological weapon must have its adequate
counter-weapon which might respond to an always arising threat which in the best-case scenario, should
be prevented to even occur which is an extremely hard problem to those who are not having a technical
capacity and if they just have, they cannot count on people who could be enough skilled to even use that.
Next, in the modern time, the information travels in a sub-second period of time and even if some defense
agencies are technologically equipped, they need a plenty of time to train their human capacities to get
vetting about their highly demanding tasks being assigned to them in order to let them provide the best
possible response to the crime and literally stay at least a step ahead of the bad guys.
References:
[1] Djekic, M. D., 2017. The Internet of Things: Concept, Application and Security. LAP LAMBERT
Academic Publishing.
[2] Djekic, M. D., 2021. The Digital Technology Insight. Cyber Security Magazine
[3] Djekic, M. D., 2021. Smart Technological Landscape. Cyber Security Magazine
[4] Djekic, M. D., 2021. Biometrics Cyber Security. Cyber Security Magazine
[5] Djekic, M. D., 2020. Detecting an Insider Threat. Cyber Security Magazine
Cyber Defense eMagazine – June 2024 Edition 230
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.