Uploaded by vip.shalanaeva

round table

advertisement
Hostile foreign actors are increasingly aggressive in cyberspace, creating an economic environment that
few understand and that even fewer are prepared for
Individuals
 practice cyber hygiene
 using strong, unique
passwords
 two-factor
authentication
 keeping their devices
and software up to date

Businesses
States
 implementing robust
 enforcing laws and
security measures
regulations that require
organizations to protect
 conducting regular
their data and systems
security audits
 collaborate with other
 training employees on
states and international
cybersecurity best
organizations to share
practices
threat intelligence
 investing in security
technologies
fostering a culture of shared responsibility and collaboration, raising awareness about the
importance of cybersecurity, and working together to develop international norms and
standards for cybersecurity
Weakening Encryption and Personal Freedoms
Consequences of Cyber War and
 making communication and data more
 disruption of critical infrastructure
vulnerable to unauthorized access
 theft of sensitive information
 Examples of encryption technologies that
 financial losses
protect personal freedoms include end-to even loss of life
end encryption used in messaging apps
 widespread chaos
like WhatsApp, encryption protocols used
in online banking transactions, and VPNs
that secure internet traffic from
eavesdroppers
Prevention Strategies
 investing in cyber defense capabilities
 establishing international norms for cyberspace behavior
Dilemma: promoting transparency and accountability in cyberspace can help deter malicious actors
easier, but at the same time personal freedom is at stake. So, to what extinct should government
intrude into the sphere of sybersecurity of its citizens?
Download