Analyzing Cyber Warfare In The International Realm
Updated: 2 days ago
Introduction- What is Cyber Warfare?
Cyber Warfare is the extensive actions by a country or an organization based on global networks to breach and break in the system of another nation’s cyberspace to obtain a piece of mysterious and non-conspicuous sort of intel. Cyber Warfare is mostly performed through means of injecting the target system with viruses that suck out the data or transmitting any such application which would perform the same function. Cyber Warfare involves implanting the targeted system network with ransomware or malware and using spam messages as a medium to disable their work efficiency.
Cyber Warfare is an example wherein a country or an organization bombards and ambushes the other one without using any bombs or heavy machinery. The attacking company’s intention is to hurt the targeted nation. There is no specific definition of Cyber Warfare as such but the United States Congressional Research Service once gave it a click in defining it in 2015 as “An action between two states which can be compared to a war-like situation, without using any nuclear bombs or physical force. It is basically triggered via the Cyber Space.”
The following data reveals the amount of Cyber Warfare and the statistical increment in them:
In 2013, The Foreign Bureau of Investigation notified more than a number of 2500 companies operating in the private field about a breach in their confidential data.
According to the Cyber Warfare Statistics, more than 60,000 governmental cyberwarfare attacks were recorded and investigated, in the year 2013.
In 2015, hackers from China breached into confidential data of the United States government and accessed the data of more than 3.5 million operating employees.
In 2017, more than 30,000 cybersecurity threats and attacks were reported in the United States.
Cyber Warfare statistics have revealed that more than 20% of the cyber-attacks are targeted towards the United States.
There are several laws in the US which have been formulated to ensure that cyberspace is protected and well preserved. One such law is the Cybersecurity Information Sharing Act, 2015, whose primary aim is to eliminate the existing cybercrimes and improve the existing cybersecurity issues which may have paved a way for the hackers and infiltrators to intervene. Another such act is the Cybersecurity Enhancement Act, 2014, where the main focus is over-improving the experience over cyberspace and identify the loopholes in the existing laws. This law is more inclined towards workforce development, cyber awareness, and preparedness for any such cyberattack.
Another special law enforced for the protection and conservancy of the consumers operating on cyberspace is the Consumer Privacy Protection Act, 2017, which aims at regulating the security of personal information of the customers operating on the World Wide Web, and to provide a regular check on the citizens eliminating breaches and infiltrators.
In India, there is one parent law which operates at eliminating the numerous cybercrimes and cyberwarfare activities in the World Wide Web; The Information Technology Act, 2000. Any Act of Cyber Terrorism or Cyber Warfare is punished under Section 66F of the Information Technology Act, 2000. This statute is comparatively advanced and recent as compared to the old statutes formulated and incorporated in the Colonial era of the British Empire. The need for this statute arose in the late 1990s when the cyber breaches and hackers tended to dominate the Cyberspace.
Recommendations & Conclusion
The statutes formulated in the United States and India to strengthen cyberspace and eliminate cybersecurity issues substantiate the fact that the government is inclined towards the enforcement of laws to eliminate crime on the World Wide Web. However, it is righteously said by Bruce Schneier that “Cyber-attacks which are successfully targeted on the government system will still prevail and be contemporary in spite of the government’s despicable measures taken to eliminate the same.”
Therefore, it is approachable and desirable for the government to work towards the security of their data and intel stored on the World Wide Web. Cybercriminals and hackers are always on the hunt desiring for their next probable target. Strengthening cybersecurity would ensure that the loopholes of the modern-day system are not revealed to the hackers, and they end up taking undue advantage of it.
ABOUT THE AUTHOR
Anshit Minocha is a 3rd-year student at the University of Petroleum and Energy Studies.
Edited By: Swathi. Ashok. Nair.
DISCLAIMER BY LEGAL ARMOR
We at Legal Armor do not endorse the Authors' views and are in no way responsible for the said views. We are just publishing the Write-ups as blogs with just light editing, and are in no way responsible for any legal claims. Legal Armor shall not be liable for any plagiarized content.