This is the greatest cyber threat of our times

October 24, 2021 12:38 AM AEDT | By Priya Bhandari
 This is the greatest cyber threat of our times
Image source: pinkeyes,Shutterstock

Highlights

  • According to thematic research of GlobalData, online information and hacking that purposely attempts to undermine the authority of government leaders, poses the considerable threat to state stability.
  • These attacks need high level of company to execute and manage as well as certain level of technical competence.
  • In contrast, cyber subversion prevails over extended periods on the internet with least maintenance.

The global privacy market is a fastest growing market in the world as fast-growing internet penetration has increased the cybercrimes globally. People are concern about data security and privacy awareness is growing. Cybersecurity is also high on government’s agenda. Recently, British defence secretary Ben Wallace said that the UK is developing ‘offensive’ cyber-attack capabilities in response to certain foreign states ‘waging cyber warfare every single day’. 

According to Thematic research of GlobalData, online information and hacking that purposely attempts to undermine the authority of government leaders, poses the considerable threat to state stability. The leading data and analytics businesses said that it is not actively destructive, but cyber subversion needs the least technological capabilities to execute and manage and is not generally considered when developing deterrence ability and cyber policies.

Also read: There is one cyber-attack every 8 minutes in Australia: ACSC

Cyber subversion prevails over extended periods on the internet

Source: Copyright © 2021 Kalkine Media

Emilio Campa, analyst of GlobalData, said that while discussing cyber security, traditional threat like operational disruption and data theft comes most willingly to mind. Although, these attacks need high level of company to execute and manage as well as certain level of technical competence. In contrast, cyber subversion prevails over extended periods on the internet with least maintenance and if successful it can erode trust in the authority and capability of the political leaders. 

One of the examples of cyber subversion was Russia’s part in the 2016 and 2020 US presidential election. The aim was to sabotage support for the democratic process and attack the Democratic Party’s candidates. In some US states elections small change in voting behavior is enough to affect the result and the disruptive action can cause that change. Other examples are the various falsehood campaigns around the recent vaccine rollouts that affected the trust in government-backed operations.

Also read: From tighter budget to no-spend days: Three habits millennials can adopt for financial security

Campa said that states must be informed to these types of threat as the destructive potential of cyber operations has been realized. For thousands of years Espionage, subversion and Sabotage have been standard strategies in physical combat that include taking out their key infrastructure.

The scope of possible attack has only expanded with the interconnectedness of the Internet of Things (IoT).

The businesses have additional potential debility that required constant defence as everything is connected now. Attackers finds small gap that has not been protected in these increasingly vast networks and in this globalized era, subversive cyber attract can come from anywhere.

The campaigns can be reactive to live events in a way traditional cyberattack cannot, and they also need low technological power and understanding to apply and can be combined with other cyber attacks to enlarge their impact, all these make cyber subversion a more risky threat to modern states than traditional cyber attacks.

It is crucial for states to have knowledge of these threats and ensure they are prepared through developing a global cyber-policy and expanding deterrence capabilities as without any effective strategies these threats of cyber subversion will only expand.

Also read: Important steps to safeguard your business from cyber attacks


Disclaimer

The content, including but not limited to any articles, news, quotes, information, data, text, reports, ratings, opinions, images, photos, graphics, graphs, charts, animations and video (Content) is a service of Kalkine Media Pty Ltd (Kalkine Media, we or us), ACN 629 651 672 and is available for personal and non-commercial use only. The principal purpose of the Content is to educate and inform. The Content does not contain or imply any recommendation or opinion intended to influence your financial decisions and must not be relied upon by you as such. Some of the Content on this website may be sponsored/non-sponsored, as applicable, but is NOT a solicitation or recommendation to buy, sell or hold the stocks of the company(s) or engage in any investment activity under discussion. Kalkine Media is neither licensed nor qualified to provide investment advice through this platform. Users should make their own enquiries about any investments and Kalkine Media strongly suggests the users to seek advice from a financial adviser, stockbroker or other professional (including taxation and legal advice), as necessary. Kalkine Media hereby disclaims any and all the liabilities to any user for any direct, indirect, implied, punitive, special, incidental or other consequential damages arising from any use of the Content on this website, which is provided without warranties. The views expressed in the Content by the guests, if any, are their own and do not necessarily represent the views or opinions of Kalkine Media. Some of the images/music that may be used on this website are copyright to their respective owner(s). Kalkine Media does not claim ownership of any of the pictures displayed/music used on this website unless stated otherwise. The images/music that may be used on this website are taken from various sources on the internet, including paid subscriptions or are believed to be in public domain. We have used reasonable efforts to accredit the source wherever it was indicated as or found to be necessary.


AU_advertise

Advertise your brand on Kalkine Media

Sponsored Articles


Investing Ideas

Previous Next
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.