By Sajad Abedi
Today In the world, with about one-third of the people having access to the Internet, and most companies, institutions, and governments require computers and communications tools for their daily work, cyber security issues are a problem for governments, institutions, and even ordinary people.
In the Hayman Rasta, the UK government in 2014 estimated that the amount of online fraud in the world has reached 52 billion pounds in 2012, according to estimates. Of course, confirmation of the information provided on the overall financial impact of cybercrime is difficult. Because, it is likely that the victims of these crimes do not express the truth and, on the other hand, it is likely that the statistical tools of the police service are not completely in the line.
Nevertheless, assessments of the losses caused by Internet crime and computer theft worldwide have been indicative of the Internets risk aversion of the world economy. For example, McCaffys security software company in 2014 estimates that data thefts cost more than $ 2 billion a year for the global economy. (It should be noted that McCaffeys claim is based on research conducted by hundreds of international companies in three continents in Europe, Asia and the United States.)
But whats worrying governments is the danger of cybercrime in their vital interest? Infiltration into Pentagon classified networks in 2008, spying on major US weapons programs, such as the Joint Task Force (Joint Streep Fighter) or spying on US-backed United States activities, led US officials to deepen the risk of attacks Cybercriminals and the possibility of exploiting their vital military systems. US services believe that government networks and globally sensitive systems target more than 8.1 billion more complex attacks each month.
Currently, the increasing abuse of the defects and shortcomings of information systems and cybernetic networks and the escalation of its results, targeting sensitive infrastructure, military or government, have caused some malicious cybercrime activities It is considered to be a firefight and requires cybercrime or physical retaliation. In the same vein, the White House emphasized the right to defend itself against cyber-attacks in the "International Strategy for Cyberspace" document. These elements have led to the possibility of creating appropriations, weapons and organizations aimed at cyber-bullying in a broader context than cyber defense strategies documents; the main and final goal of which should be the transition from a firm defense strategy based on "lines The defense of the Magnino "and the creation of an approach with wider security solutions.
Thus, many countries have almost announced that they are demanding the development of their own cyber defense capabilities (that is, they want to be equipped with an "Adhak" command and counter-attack equipment) to be able to respond to attacks that may be the main infrastructure of the sectors Have a vital threat to them.
The evolution of cyber capabilities includes the possibility of advancing offensive operations against individuals and organizations that may engage in hostile activities, in particular the threat of retaliation against potential attackers to affect their strategic calculations and to deter them from Committing to malicious activities is done.
Certainly, the presentation of such a cyber-strategy requires the redefining of Western countries strategies for cyber security. Namely, the redefinition of weapons that need to be developed to respond to current and future cyber security issues; and also to redefine the fundamental philosophy of cyber security issues so that operational cooperation between different sectors, including private, executive, security forces and even the public is possible.
LINK: https://www.ansarpress.com/english/9598
TAGS: