The notion of war has been changing for a long time due to technological advances. This subsequently has caused new arms races. Since the first military revolution in infantry and artillery during the Hundred Years’ War, many things have been indeed reshaped. New technologies consistently redefined the way wars are conducted and altered the notion of risk (both for combatants and civilians).
For a long time land and sea were the main domains for a war. As the technology further developed and a flight capability was introduced, air has become a new domain. That posed new risks and challenges that one could not overlook. To keep balancing on the battlefield one needed to adjust accordingly and develop its own air capability. Having only land troops and naval ships were suddenly not enough to prevail in these new circumstances. The military planning and strategy changed with it, shifting from the trench warfare during the World War I to a blitzkrieg and air raids during the World War II.
In the middle of 20th century nuclear weapons were invented which greatly impacted the warfare and the balance of international relations. The bombings of Hiroshima and Nagasaki showed more than just a massive destructive power that could obliterate millions in a blink of the eye. Years later demonstrated a real impact of a nuclear bomb and its long-lasting consequences as well as how poorly prepared were the infrastructures for a nuclear attack.
The advent of internet and its rapid development brought another military revolution, introducing computer-assisted battlefield and precision-guided munitions (PGM). More sophisticated weapons like missiles increased the distance between enemies, hence changing the risks involved and recalculating political strategy and tactics. Increased dependency on information technology resulted in new threats and opened new vulnerabilities of national security (Ohlin, Govern and Finkelstein, 2015, x-xiii).
Meanwhile, the amount of cyber threats and vulnerabilities are rapidly increasing. At the moment there are several tendencies for cyberattacks. First, it takes less time to launch a cyberattack as its speed of transmission is very high. Second, such attacks are becoming more frequent and have more serious impact on systems. Third, there are now different types of actors, capable of launching a cyberattack.
Estonia was the first to experience the effects of growing technological dependency in the history. In 2007 its government infrastructure, financial sector and media were targeted and attacked entirely in cyberspace. The country proved to be highly vulnerable and unable to give a timely response, yet after these attacks Estonia started a public discussion on the issues of cyber defense in security and pushed other countries to take these issues into consideration. In a way, it was a stimulus to raise awareness on increased vulnerabilities and cyber threats (See also Aaviksoo, 2010).
This new space has clearly its threats as any other physical domain. As online interconnectivity increases, cyber threats are increasing with them. All digital technologies that receive, transmit, and manage digital data can be potentially interfered through a cyberattack (Lewis and Unal, 2017). Cyber security expert Rod Beckstrom, who is a former Chief Executive Officer of ICANN, said: “Everything networked can be hacked. Everything is being networked, so everything is vulnerable”.
That was further proven by the Black Hat Briefings, the biggest computer security conferences in the world. These vulnerabilities can be easily exploited. Cyberattacks vary from data theft and financial fraud to data manipulation and manipulation of machine instructions. Furthermore, they can interfere with enemy sensors, communications, command-control systems, and weapon systems. In this sense, defending electronic infrastructure grows consistently as our dependence on information system grows.
Similarly to the development of nuclear weapons back to the 20th century, it is well-known that many countries are currently developing cyber capabilities and boosting research and investment in this area. This means that the arms race in cyberspace has already started. In 2007 there were 120 countries, already developed ways to use the internet to target different sectors (Ohlin, Govern, and Finkelstein, 2015, xii).
As much as the debate in regards to offensive cyber capacities is increasing its pace, two distinct patters are emerged in the way it is discussed. Some say that cyber can lower the threshold in war; others worry about its use in taking down critical infrastructures.
In the first optimistic case, military and states regard these capabilities capable of occupying a new niche in diplomatic tools. In 2014 Eric Rosenbach, an Assistant Secretary of Defense for Homeland Defense and Global Security at that time, has indeed referred cyber operations as helpful in reaching national goals. Specifically, he mentioned “the space between” diplomacy, economic sanctions and military action, meaning using cyber space to accomplish national interest. Cyberattacks can be used as an addition to military strikes or can become an alternative to direct kinetic confrontation, complimenting other tools used in politics. Thus, they can further lower the threshold of the use of force in a war.
In other case, however, it can possess as much destructive power as nuclear weapons, for example if it is targeted on power grids or critical infrastructures. Increased connectivity from consumer goods to critical infrastructure control systems poses great risks and vulnerabilities across the world (Weber, 2010). These vulnerabilities can be used as leverage or they can be used exploited instead of launching a missile, following a similar ultimate goal of taking down an adversary.
Traditionally, national and international security has been seen through a physical lens. Normally there is always a state that secures its land borders, sea boundaries, and protects airspace. In contrast, there is no equivalent to city police or a state army that protects its citizens in cyberspace. As professor of National Security Affairs Reveron summarizes, unlike other domains, the government does not have a natural role in cyberspace to promote security. In its turn cyber challenges the traditional framework of security.
Today people willingly share, transmit or store all sort of data through the internet. It is not surprising that a new strategy evolves by planting software into an electronic device to manipulate this data. For instance, by manipulating e-mails of nuclear power plant employees it is possible to acquire sensitive information and use it as a leverage tool. This shift in the notion of warfare merged military and corporate espionage functions. Militarization of cyberspace subsequently blurred legal and moral definitions of privacy rights. In the 21st century any individual may be targeted in the virtual world, depending on the information niche s/he is occupying. In result, the line between military and civil sectors is fading away.
All in all, cyber capabilities have indeed brought a new technological change and now re-shifting security, definitions and rules of war. International law, at the same time, has been slow in adjusting to a new evolving order and establishing an appropriate legal regime for cyberattacks. Moreover, this technological advance has coined a new term for the notion of war – a cyberwar. Ohlin, Govern, and Finkelstein suggest that this change brings not only new weapons to be employed, but transforms the entire notion of war (2015, xiii).
Lewis, P. and Unal, B. (2017). Cyber Threats and Nuclear Weapons System. In: Borrie, J., Caughley, T., and Wan, W., (Eds.), Understanding Nuclear Weapons Risks, 1st ed. Geneva: UNIDIR, pp. 61-72.
Ohlin, J.D., Govern, K. and Finkelstein, C., eds. (2015). Cyberwar Law and Ethics for Virtual Conlicts. New York: Oxford University Press.
Sulek, D. and Moran, N. (2009).What Analogies Can Tell Us About the Future of Cybersecurity. Cryptology and Information Security Series, 3, pp. 118-131.
Weber, R. (2010). Internet of Things: New Security and Privacy Challenges. Computer Law & Security Review, 26 (1), pp. 23-30.
 Flanagan, B. (2016). Hacked Asteroids Destroying Earth and Other Cybergeddon Scenarios. Knowledge Hub, [online] Available at: https://www.worldgovernmentsummit.org/knowledge-hub/hacked-asteroids-destroying-earth-and-other-cybergeddon-scenarios [Accessed 20.12.2017].
 Cyber Leaders: A Discussion with the Honorable Eric Rosenbach. (2014). Centre for Strategic & International Studies,
Available at: https://www.csis.org/events/cyber-leaders-discussion-honorable-eric-rosenbach [Accessed on 20.12.2017].
 Reveron, D. (2017). How Cyberspace is Transforming International Security. Faculty insight at Harvard Extension School, [online] Available at: https://www.extension.harvard.edu/inside-extension/how-cyberspace-transforming-international-security [Accessed 28/12/2017].
Are You Aware Of Your Children’s Online Activity?
There’s a big, wide, scary, often strange world out there, and it’s the task of any individual to grow into an adult and begin to contend with it. However, most responsible parents understand that showing the raw facts of life, or being introduced to bad influences is simply not suitable for a young child. They must learn slowly, with care, and appropriately to the degree we’re able to foster that environment. Parents cater to this by controlling what friends their children make, or what hours they may be allowed to spend time with them.
However, a growing cause for concern is the fact that many parents fail to keep their children safe online. The internet may as well be its own world, and it reflects our reality, both the good and the bad, the trustworthy and the terrible. This means that as a parent, it’s important to stay aware of your child’s online activity. If you can do that, you can better control the content they see, what they’re allowed to access, and the influences they are moved by.
Use Worthwhile Content Filters
It’s important to use the best content filters and parental controls you can. Some offer you access to limit internet time, while others help you block certain websites or content from being seen. With the best cyberbullying safety services, you can also ensure that your children are equipped to handle the unfortunate likelihood of encountering abuse online. The more you can engage in good habits now, and regulate their usage, the less likely they are to come to harm within the wild west that is the online world.
Understand The Trends
Understand the trends that occur and know how to deal with them. For instance, you might block access to certain apps or sites, but your child’s friend’s parents may not have the same philosophy. If you know the trends through paying attention to what they’re saying, you will be able to assess if they’re healthy or not. For instance, TikTok is now seen as a negative influence on many young children due to how poorly they moderate their content, and how limited content filters are in place. When you make decisions to help them stay secure, you are in effect limiting the vulnerable pathways in which they could become less safe.
It’s important to say, but stay alert. If you notice your child is finding it hard to engage with social media, or they follow a risky YouTuber, you are within your right to restrict access or to observe more closely. It’s a tough job, but ultimately you cannot completely banish your child from the internet for the entirety of their childhood. It’s best to help them build healthy habits now and also know how to stay safe online than to pretend it doesn’t exist. To that end, you’ll be making the right choices.
With this advice, we hope you can better stay aware of your children’s online activity, and manage it as appropriately.
How does Technology Affect the Working Environment?
Throughout history, machines and technology have changed the way that we work across nearly every industry. From the industrial era, all the way through to the modern age, it would seem that technology has improved working conditions significantly. The impact that it has had is immense. Some of the main changes can be found below.
Speed and Efficiency
Workers in this day and age are far more productive than they have ever been. The impact that technology has had on work, both in communication and manufacturing has increased the rate of production and the speed at which business can occur. Tech in the workplace has also helped workers to become far more efficient. What once took hours can now take minutes. Messages can be sent to clients across the world and proposals and payments can also be transferred instantly. Support for workers can also be found online. For example, personal injury claim legal help can be obtained online and you can file a claim within minutes.
Working Together as One
Team coordination really has never been easier. When you look at online communication tools and technology you will soon see that people can now work together much more closely. Collaboration is also much simpler to achieve. Even when colleagues are not able to be in the same workplace physically, teams can hold meetings through video technology. They are also able to work on the same documents through file-sharing platforms such as Google Drive and this is fantastic to say the least.
Technology and Office Culture
Everyone knows that tech in the workplace is changing. Beer is available on tap in some workplaces and others are offering video games as a means for their team to relax at the end of a hard day. Open offices are also a trend. The mere idea of creating a better company culture can now be used to lure workers who are in-demand and this doesn’t look to be going away anytime soon. Technology in the workplace has also made it much more possible to work remotely. Companies need to create incentives to try and keep their workers happy and to also keep them drawn into the office.
Live where You Work
One of the biggest impacts of tech in the workplace is the workplace itself. Most jobs require you to clock in and work on-site but there really are so many open positions for those who telecommunicate, and people can now work from home more than ever before. Of course, with so many changes being made it’s not hard to see that so much is being done to try and help support this movement and some companies have even put in the effort to try and make sure that they give their teams the chance to work from home permanently. Only time will tell what the future holds, but right now it looks like tech has had a huge impact on the workplace and the effects are going to be felt for years to come.
Quotes To Get Your Boss To Take Cyber Security Seriously
There is no denying that data security is something that all businesses need to take seriously today. Unfortunately, there are many companies out there who are failing to do so. This is because they have the “it won’t happen to me attitude.” However, many companies have closed after a data breach. Therefore, to save the future of your business and your job, try to convince your boss with these quotes…
We are going to start with a quote from the founder and CEO of Blue Lava, Inc, Demitrios ‘Laz’ Lazarikos, who talks about implementing a modern program on cyber risk. From privileged access management services to network segregation, we need to stay ahead of the times with our strategy.
“A modern cybersecurity program must have Board and Executive level visibility, funding, and support. The modern cybersecurity program also includes reporting on multiple topics: understanding how threats impact revenues and the company brand, sales enablement, brand protection, IP protection, and understanding cyber risk.”
If your boss thinks he or she is above the law, William Malik, VP and Research Area Director for Information Security at Gartner has a great quote on the matter…
“A business will have good security if its corporate culture is correct. That depends on one thing: tone at the top. There will be no grassroots effort to overwhelm corporate neglect.”
Chairman of the Ponemon Institute, Dr. Larry Ponemon, has spoken about insider attacks. Insider attacks – whether malicious or accidental – are the most common. However, they’re not being taken as seriously as they should…
“We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever.”
While some business owners do implement cyber security controls, there seems to be a lack of thought behind the strategy that is implemented, and this is what Dr. Chris Pierson, CEO at Binary Sun Cyber Risk Advisors has said on the matter…
“What we should actually be doing is thinking about what are our key controls that will mitigate the risks. How do we have those funneled and controlled through the team that we have, how do we work through that in a well-formatted, formulated process and pay attention to those controls we have chosen? Not a continual, add more, add more, add more.”
One of the biggest problems with data security is that a lot of business owners believe it is nothing more than an IT issue. Steven Chabinsky, Global Chair of Data, Privacy & Cybersecurity at White & Case LLP, has put this into perspective…
“Thinking of cybersecurity solely as an IT issue is like believing that a company’s entire workforce, from the CEO down, is just one big HR issue.”
So there you have it: some of the most compelling quotes out there regarding cyber security today. We hope these will help you to convince your boss that it’s critical!
Are You Aware Of Your Children’s Online Activity?
5 Ways To Improve Your Company Website
Getting Your Brand Back Out There In A Post-Covid World
Preparing To Start A New Business: Things To Think About
Why Do Movies Change The Way People Dress?
The best films released in 2020 you can’t miss
The 10 highest-grossing films of all time
Top science fiction films of the past decade
How to Stay Healthy During Lockdown
How does Technology Affect the Working Environment?
Business9 months ago
Gutemberg Dos Santos and Robert Kiyosaki share their vision of leadership
Business8 months ago
Axel Andorff and Carsten Isensee, new SEAT Vice presidents for R&D and Finance
Travel12 months ago
You need to visit Ecuador now
Travel11 months ago
ATELIER de Hoteles is proud to present José Mejía as its Executive Chef and Food Experience
Opinion10 months ago
The History Question: Is It Better to Remember or to Forget?
Blog9 months ago
For Enea Angelo Trevisan and Ealixir, better than solving the problem of cyberbullying is preventing it
Business11 months ago
The Importance and Usefulness of Medical Posters in Research
Business12 months ago
Karatbars Becomes One of “10 Blockchain Companies To Watch In 2019” according to Forbes