Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Cybersecurity Segments | Aviation and Defense Market Reports

Author: Aviation Defence
by Aviation Defence
Posted: Jan 14, 2022

Regardless of cyberspace’s beginnings, what matters in today’s world is the existing structure of cyberspace and its potential future. However, the undersea cables show that the Internet is highly US-centric, or at least centered around the triad of North America, Europe, and Asia. There has been much consolidation in the infrastructure (root name servers, computation power, data flow, etc. ), investments, research, and users alike.

Knowledge and technology are currently being transmitted all across the world. Since it is impossible to install hardwired technologies quickly enough, mobile telephony is becoming an essential mode of Internet access. Technology is becoming more widely available, so we can see that the barriers to development are not economic or technical, but often political and the form that it takes.

While the United States appears to be the dominant power in terms of the Internet and cyberspace today, as the technology spreads, the number of users in the Western World becomes less concentrated. Due to the emergence of cyberspace, power is shifting from America to Asia. Without a doubt, China is the most influential player in this reorganization. The stakes are high, since if all 1.5 billion Chinese people had access to the Internet tomorrow, the entire configuration of China’s cyberspace, as well as the entire world, would be turned upside down.

From the Industrial to the Information Age, society has progressed. Its wars have moved away from mechanized warfare and toward information warfare. It is inevitable since informationized conflict requires informationized militaries – where data plays a crucial role in every aspect of the organization, from logistics to personnel to command and control.

Only in this way can information be shared and exploited in real-time to optimize its impact on operations. In many senses, then, informationized warfare is a battle between rival systems of systems. Each side tries to put together a complete picture of the situation to exploit their respective capabilities.

Securing information dominance is the primary goal of information warfare. Information dominance refers to the ability to maintain control of battlefield information at a specific moment and place while denying an opponent the same. In this sense, battlefield information refers to information about friendly and enemy troops’ activities and changes, as well as the battlefield’s physical circumstances.

While India was one of the first countries to pass an Information Technology Act, establish a Computer Emergency Response Team (CERT), and even place cybersecurity responsibility within the National Security Council, it has since fallen behind other countries in responding to cyber attacks. India has been the target of numerous cyber attacks, ranging from attacks on vital infrastructure to criminality to the most recent expression of social media usage.

There have always been opportunities for governments and government agencies to conduct disruptive activities in cyberspace. These have been deferred, except for Russian attacks on Estonia and Georgia in 2007. However, as many actors enter the domain, cyber attacks become increasingly disruptive and even destructive. The fascination of using cyber as a means of launching non-lethal strikes has prompted forces both inside and beyond the area to employ these tactics to achieve politico-military goals, resulting in a never-ending cycle of retribution and counterretaliation.

As a result, Asian countries have been at the forefront of reshaping cyberspace to fit their perceptions and, in some cases, strategic objectives. While North Korea has closed itself off from cyberspace, Iran is developing a separate national intranet that does not connect to the Internet. While Saudi Arabia only has one entry point via which all data passes, China has the Great Firewall protection, which serves the same purpose. These restrictions function as virtual borders while also allowing for content surveillance under the pretense of national security. Policymakers in India are aware of the problems and have responded with laws, legislation, organizations, and methods that have evolved. India is in a chaotic cyberspace environment. It must strike a balance between its promises to an open, safe, and global cyberspace and the challenges to its national security posed by vulnerabilities in and through online.

Several military modernization programs are ongoing with the objective of information control. If the adversary gains access to the network, it can potentially learn as much as friendly forces or, even worse, interrupt communications or corrupt data flows and storage. Even if the enemy’s knowledge of the network’s data is incomplete, a security breach would undoubtedly decrease the friendly information advantage, weakening the networked force’s effectiveness. Furthermore, the fact that all allies can constantly send and receive messages from the network can reveal their positions: enemies may use easy triangulation to leverage the increased dependency on communication security, even if they cannot decode the messages they intercept.

About the Author

An unmanned ground vehicles functions without the presence of a human operand across land platforms. The proliferation of unmanned technology is one of the key trends within the defense segment.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Aviation Defence

Aviation Defence

Member since: Dec 14, 2021
Published articles: 22

Related Articles