When a state or its sponsored actors use their computers and networks to launch attacks against others or take steps to defend themselves, it is referred to as cyber warfare. It is considered the fifth domain of warfare, alongside land, sea, air, and space.
Features: Cyber War Versus Traditional War
- Independent Theater of War: Cyberspace operates independently and can disrupt facilities beyond traditional security measures.
- Example: The 2007 cyber attack on Estonia, attributed to Russia, demonstrated how cyber attacks can disrupt national infrastructure and services.
- Borderless: Cyberspace transcends national borders, necessitating international cooperation for effective security policies.
- Disguised Attacker: Attackers can easily conceal their identities and mislead targets, complicating retaliation and deterrence efforts.
- Example: In 2014, North Korean hackers attacked Sony Pictures, hiding their identities and motives, which complicated efforts to retaliate and address the breach.
- Contactless War: Cyber warfare does not involve physical or kinetic action across borders, defining a new form of conflict.
- Example: The Stuxnet virus, which slowed down Iran’s nuclear program, is a prime example of how cyber attacks can have significant impacts without physical intervention.
- Rapid Deployment: Cyber-attacks can be launched quickly and remotely, allowing attackers to strike from any location at any time.
- Example: In 2015, a cyber attack on Ukraine’s power grid led to a blackout affecting around 230,000 people within six hours, illustrating the speed and impact of such attacks.
- Low Cost: Cyber-attacks are generally less expensive than traditional warfare, requiring minimal resources compared to military operations.
- Example: Conducting a cyber attack involves fewer resources than traditional land-based military operations, which require extensive logistical support, such as vehicles and personnel.
Check Out UPSC Modules From PW Store
Key Reasons Behind the Vulnerabilities
- Lack of Unified Efforts: India’s cybersecurity efforts lack coordination, impacting their effectiveness due to the absence of a unified force to tackle the issue.
- Workforce Shortage: There is a shortage of cybersecurity professionals in critical areas.
- Limited Access to Secure Devices: Less than 1% of Indian mobile users have access to high-security devices, reflecting affordability challenges.
- Imported Technology Risks: India’s reliance on globally sourced cybersecurity technology poses risks, such as those associated with technology from China.
- Awareness Deficiency: Individuals and corporations in India lack awareness of cyber fraud.
To get PDF version, Please click on "Print PDF" button.