Skip to main content

Evaluating emerging threats in cyberspace and strategies for cyber resilience

Evaluating emerging threats in cyberspace and strategies for cyber resilience


We live in the era of internet wherein; every single moment of personal and professional domain is posted online. Every bit of information is automatically becoming a portion of the tapestry of information, linking the tread of your information to another information. Not much in the personal sphere, but in profession domains this are more subject to information theft and system breakdown."

Resilience as defined by oxford dictionary “is the ability of people or things to recover quickly after something unpleasant, such as shock, injury, etc. and Cyber resilience refers to an entity's ability to continuously deliver the intended outcome, despite cyber-attacks.  Resilience to cyber-attacks is essential to IT systems, critical infrastructure, business processes, organizations, societies, and nation-states.”  (www,oxfordedictionarylearner.com). Over the Europe and the western countries were experiencing a global cyber threat, when a mass of computer system was hacked by a hacker, risking many citizens financial stability. In 2022, on 25 October European Internet forum (EIF) summoned a conference wherein, they launched the First Internet of Things act, Cyber resilience act, 2022. “ ( Burri  zilamm, et. al. 2023). 


“The Legislative announced they had launched this act to buy some time to counter the digital threats, especially to economic-actors. The cyber resilience act, covered Cyber information infrastructure protection against the ransomwares in cyber space, through more emphasis on cyber encryption, especially on economic domains around Europe, The cyber law differ from person to person”,  ( Wikipedia)  “ an Ex-president of American Internet association appreciate the effort, but also believe better effort could be made, something like CIIP  doesn’t exist, as infrastructure of internet is quite physically, though information too has its infrastructure, but it’s structureless and completely fluid, lacking a definite pattern, network of routers in LAN network, Information merely travels in packets of data.”  (2023). 


script async="" crossorigin="anonymous" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-3731924707289326">

"The  Research scholar consider cyber resilience yet, to be a problem due enormous probability for a ransomware to discover loopholes, internet is by far is not patrolled like the real world. So, for an institution, nation and society can easily be a victim of cyber-attack and cyber war. 

Due to similar concerns, Olaolu Kayode-Ajala pens three methods in his research which could prove affective in bolstering cyber resilience.”  

 Developing a better institutional framework: Many developing countries face difficulties in “establishing a good institutional framework due to corruption in government houses, civil riots, and unrest between the communities in the nation, whereas, in the first world countries like America you see a lot of power instability and parties with economic agenda warring against one another. The Cyber war can be symptomized by cyber bullying across social media Platforms”  (2023).


Furthermore, a reason to commit crime are food, hunger, and lack of economic resources to deal with the daily life. From the developing countries with high economic gaps and developing nation with lesser population without proper economic resources, limits a nation to develop. Thus, it viably takes more effort for the cyber police to establish law and order.

 

 Better fiscal budgeting: A cyber threats can be even from outside the country, but to ensure cyber integrity, one must make sure peace in the nation and same can be achieved only if everyone in the country have access to the economic resource, like healthcare services and education.” (2023) This can possible if there is an lack of the better taxation policies, poorly planned spending on economic activity and generating economic assets. If the countries plan the fiscal policy better they will able to their debts faster and raise per capita income of every individual.


Well-researched regulatory framework and revision of cyber laws:   For a government to cater to the need of the various stakeholder is difficult often, creating conflict, the intensive documentation and documentation, will hinder to use of internet services, as creating similar bureaucratic process for different business and digital product will be impossible, moreover intensive brainstorming that they had to go on the documentation of the user of internet service. (2023). Various internet user in a country might not be the citizen and different geographical location and must be based on foreign ties with the foreign countries, thus, making the process extremely complex. 


Some of the industrial product and services that might not be traded in some countries and unintended trade might create conflict in the countries., but even the inadequately restrictive frameworks could leave loopholes, and easily be accessed by either minor, unintended user or ransomware risking either the dignity or the financial asset of the citizen of the nation. Thus require a well-researched customized cyber law and regulatory for cyber resilience, to protect the valuable piece of information.


Cyber education:  Lat but not the least, the most important cyber education, Many first  world country fail to create safer web due to lack of understanding and education of cyber law, Many people fall prey to ransomware , or being shamed on internet due lack of knowledge of the law and right on the internet, thus leaving no mental faculty to process when someone is facing a cybercrime.


Even with better economic resources, many first world countries or developing countries fail to stop the cybercrime. The countries; like America have reported crimes of cybers abuse, form bullying to uploading videos without consent.


There is strong need of cyber literacy all around in the countries., The developing countries have limited access to online resources and database which fosters people’s ignorance against the cyber law, thus despite faster court and better legislation policies people suffer from cyber-bullying, The absence of a well-informed decision making, leaves people to be an easy victim of Ransomware.” (2023). Even not the ransomware, an education related to the cyber behavior must be conducted to educate, people of the right behavior, as they might intentionally commit crime, and such behavior can go under an generalized and normalized behavior, for which a good cyber resilience policy might be difficult, due improper function of cyber laws across the nation or institution.


Cyber resilience is a concern, and will require a constant revision of cyber act, to perfect cyber resilience. For a nation and institution, it is recommend to educate peers about the cyber security and cyber law as per the respective nation they live in, because any increase in ignorance will provided an opportunity to make a digital access to the digital loopholes,  a cyber education in school in developing nation is recommended, if the political institution is unstable in the nation or power conflicts or if communities are constantly rioting, better regulation could be made to help control the information in the internet, and nation with new internet resources must bring Knowledge to its youth through the cyber education  and internet of thing. (2023) Even better if an introduction is made to cyber security and behavior law, to children in the school, and in the future economic-actor, agency, and institution to maximize data confidentiality within the e economy, and to minimize the crime on the internet.

 

References

  • Burri, Mira, and Zaira Zihlmann. “The EU Cyber Resilience Act – an appraisal and contextualization.” EuZ – Zeitschrift Für Europarecht, 2023https://doi.org/10.36862/eiz-euz015.
  • “Cyber Resilience.” Wikipedia, Wikimedia Foundation, 17 Jan. 2018, en.wikipedia.org/wiki/Cyber_Resilience. 
  • Resilience - Oxford Learner’s Dictionaries, www.oxfordlearnersdictionaries.com/definition/english/resilience. Accessed 5 Dec. 2023. 
  • Zou, Bo, et al. Cyber Resilience of Autonomous Mobility Systems: Cyber Attacks and Resilience-Enhancing Strategies, 2020, https://doi.org/10.1596/1813-9450-9135

Related Post:

 

 

 

 

 

 

 

 

Comments

BOOK SERVICES

If you are looking for writing or designing services then books our writing services & designing services using our Booking form provided below we will you get quality service in affordable price range.

Total Pageviews

BOOKING FORM

Name

Email *

Message *

Popular posts from this blog

Why Remote Employee Monitoring Software popular among business owners

Why Remote Employee Monitoring Software popular among business owners today! Remote Employee Monitoring Software ' Remote employment is trending employment mode in the business sphere, but consists of loopholes, like risk of data breach and time lag to cover up the same, software companies has came up with Remote Employee Monitoring Software. The Remote Employee Monitoring Softwares help in effectively tracking tasks, and covering the time lags in work execution. It is a renowned technology in the business sphere for work efficient features.  We have listed few features below:-  Task manager Deadline tracker Real-time activity monitor Attendance tracker Employee performance metric    Why is Remote Employee Monitoring Software so popular?  The software is not only trending for its smart features, but also helps to fill the gap in the market for creating an effective remote work environment.  The gaps this technology fills is listed below:-...

Management and team relationship and conflict management techniques

Management and team relationship and conflict management techniques Management of team relationship Leadership from Management view point “By management definition, a leader is a person who directs a team in the successful and efficient execution of a task, even though a leader is a person and a symbol of an organization.” ( Goleman, (2000).  The current task has due dates and a quality test that must be passed for it to be regarded as finished as an assignment.  Conflicts cannot arise on a team that a manager or leader leads because everyone on the team must give the mission their whole attention and effort.  Unfortunately, though, it does do so occasionally.  Factor determining Team and leader Relationship  In this presentation, we will go over the following elements that are critical for enhancing team conflict management and for enhancing the bond between the team and the leader:  Reinforce constructive behavio r:” by praising staff for...

Make homemade instant fruit juice in easy steps

Make homemade instant fruit juice in easy steps!  Returning back home blending fruits in the juicer often gets a body screaming a big no, so today on the chrono biblio blog we are presting how you can make organic fruit juice at home even if you do not a fancy juicer or electricity to run one.  Why to make homemade instant fruit juice ?  life is quite hectic and fast pace leaving you with   minute to make room to enjoy a healthy and organic routine, in such case, holing homemade instant juice is  a perk to have.  Making your own juice can be time consuming and  having it from market is a big no no for your health, It like  taking shots of coloured water that not only damages your health but is like acts as waste stored in  your stomach, having an instant  juice will help you reduce your calorie intake, help you keep yourself fit, filled with vitality, and  ger you energy for the day.  So now let's try...

The Sun villa : The last delivery in Sun Villa

The Sun villa : The last delivery in Sun Villa  About the story  Sun Villa, the not sunny villa , infamous for its paranormal activity in the town. A man enter to deliver a package, unaware of fothcoming danger.  Sun villa is a short story about , a not sunny villa which is infamous for paranormal activities  The protaganist of the story want to do last delivery to just go back home without guilt of  unkept promise. W ind is freezing near the sun villa, the  summer month of june trying to warn  about the fatal ghost inside the villla.  The story is written by Author sahil katoch, and published in The Story Club website under the psudeonym relaxations and literature.   https://yourstoryclub.com/short-stories-unusual-experience/ghost-short-story-haunted-villa/index.html.  The Sun Villa  I was passing by the street when suddenly a cold wind blew,  a chilling-cold wind. It was strange because it was the month of M...

MVC Kishan Singh Rathore- Biography

MVC Kishan Singh Rathore was one of the Bravest soldiers, who fought in the Indian army during the battle; he  fought and survive many battles and is even remember today by the regiment of Indian Army; in this blog we are going to highlight his biography and his early life. MVC Kishan Singh Rathore- life and adulthood MVC was one of the sharpest soldiers in Indian armed forces, born in Kota district of Rajasthan on 1st Oct 1923.Lt. Kishan Singh Rathore joined armed forces in his early adulthood and started to serve the nation in the national borders,  when  he joined the Indian Army, he was posted as a commissioned officer with 1 Rajput Regiment of 4 Guards Brigade.  MVC Kishan Singh Rathore  MVC Kishan Singh Rathore- army career  He was a dedicated soldier and was committed to his duties, he patrolled various borders and one of them being india -pakistan LOC, wherein he portrayed one his most bravest and smartest act of being a soldier.  M...

Top 4 Face wash for dry skin you should use this summer

Top 5 budget-friendly home decor items to buy under Rs 1000 Top 4 Face wash for dry skin you should use this summer! People with dry skin always doubt beauty products because the cosmetics and chemicals in products suck moisture from their skin while cleansing.  They need a good amount of hydration, whereas market products leave cracked skin, dryness and redness  on skin etc. Various brands provide face wash with fewer chemical-based ingredients and many natural hydrating ingredients. We are here with such top 4 facewash for dry skin people.  Top 4 Face wash for dry skin you should use these summer   1. MAMAEARTH UBTAN FACE WASH   This face wash comes with natural turmeric and saffron. It  is a natural healer and provides instant tan removal; it helps lighten the skin texture.  The facewash has granules that gently remove the dead skin cells from your face, cleanses, exfoliates and massages the skin; it is a complete package.  A l...

So sixteen chapter 1- one warm summmer of love

SO SIXTEEN - One warm summer of love  About the story: So sixteen is a beautiful story of the two lover, ehich unfold when three students open the diary of their teacher. The story is takes place in  1960s, wherein blissful summer vallies of himachal pradesh is brewing with innocence.  nt love of passionate lovers.   Chapter 1 One warm summer of love      [A ROUTE IN THE GAINT  MAZE OF BOOK]                          Three boys enter a cosy wooden room, looking at things, here and there. They are in a study; massive and wide. There is variety in variety of the books. The long shelves craving reader to climb for their dearest book. Absolute seduction to nerdy eyes. The boy with shortest physique and slightly dark brown hair says,” amazing, just amazing.” His eyes fell on the top shelves there is a Shakespeare play, MID NIGHT OF SUMMER DREAM. The play wherein wits evad...

Role of AI Agents in Web3 : 5 best AI Agents for crypto-trading

 Role of AI Agents in Web3 : 5 best AI Agents for crypto-trading AI agents in Web3 are increasingly used as crypto-traders. The Web3 is the new World Wide web, a technological advancement that  runs by AI agents.  This blog covers the Role of AI in Web 3 & top 5 best AI Agents for crypto trading, before we go to the topic, let us get a jist of what is Web3?  What is Web3? In 1999 internet expansion was a new dawn for technological advancement, which bought br the technology has expanded over a period of time, bringing the AI and blockchain into picture, which now has demanded to generate space for more advanced internet facilities, such a web 3 which has a capacity to harbour community-based technologies such as cryptocurrencies, blockchain technology and digital economy.  Web3 which is web 3.0 version of world wide web, this version was created for enabling more cryptomarket operations by few tech giants, which later was distributed across different le...

BEST 5 MOISTURIZERS UNDER 100 RUPEES

After cleaning and scrubbing, moisturising is the most crucial step to complete your daily skin care routine. Whatever skin type you have, it needs proper moisturising. The natural moisture of our skin depends upon seasons too. During Summers, extra oil shows up, in rainy season, humidity makes skin dull and during winters, the moisture is snatched away leaving the skin dry.  So, it is really important to choose the right moisturizer according to skin types and seasons. Here we are with a short list of some of the best moisturizers/ lotions so that you can find out your suitable one in a limited budget. LACTO CALAMINE DAILY FACE CARE LOTION This moisturiser has a water based kaolin clay formula that absorbs excess oil. Its watery texture gets absorbed in the skin quickly. Repairs and locks moisture because of the glycerine. Reduces the coming back of acne and also removes dark spots. Pros and Cons:- Pros- Non-greasy Glycerine Spot removal Cons- Can cause pimples to sens...

Runaway song by Aurora: A Misunderstood Female Archetype

The song was released in 2016, which is the time when you could see a lot of awareness come up and self slowly sneaking through cracked walls of false attitudes of society but being filmed in 2015 you can expect was not much out even loud in the teenager's head.  "The Runaway music stirred conversations of self-discovery and self-love. The TikTok Aurora filters made the way for the song to come up and helped it climb up the billboard chart because of self-love hype of that song and marketing. " (“ www..wikipedia.com "). The video is part of her first debut act in the play Running from the Wolves and the first Album, My Demons Greeting Me as a Friend, the video features her in a Forest where she is running from someone. ("www.crystalcrushmagzines.com") The concept is self-love and acceptance she is running from herself in the video.  Runaway by Auror a - Music element The element that makes the music is the GM chord, downtempo, and repetitive Progr...