The cyber security conundrum

The cyber security conundrum

The success of Information Technology Revolution – 1991 is accepted as the cut-off year for this transition since in that year, investment in IT sector exceeded that in the industrial sector for the first time in US – marked the advent of the Age of Information as the Internet provided for instant communication, created borderless markets and made way for globalisation, producing the new phenomenon called Knowledge Economy.

Internet-based products and services – from mobile to Twitter and home delivery – held the sway. The fact that information would be communicated and stored on Internet produced the problem of securing it against the adversary's attempt at prying into the same or against the theft of data committed for other undesirable purposes.


The first point of clarity about the use of Internet, however, is that it is a public platform and the user, therefore, should be aware that he or she should not say on it what would not be permitted to be spoken from such a platform. Section 66 of IT Act punishes calls for violence, specific threats to persons or a brazen attack on the nation's sovereignty. The 'public' character of Internet makes it illogical for you to expect that your information fed there by you would be kept confidential – until special steps are taken by you as a user or by the organisation which obtains information from you online to safeguard it against exposure. A large part of noise raised about 'privacy' of information loaded on the Internet, therefore, made no sense.

The second fundamental thing about the use of Internet is that security in any sphere – cyber, industrial or State-related – revolves around the threats to the three assets of a target – organisation, material, human resource and protected information. Correspondingly, there are concepts of physical security, personnel security and inf ..

Support the originator by clicking the read the rest link below.