The threat of cyber war and cyber espionage limits

The threat of information warfare, a cyberwar or cyber attack is not science fiction. The use of new technology appears repeatedly in many movies and even in modern literature, Most of the items shown in these means of expression are drawn from real events. De facto, cybercriminals have access to increasingly sophisticated technologies and we all know that there have already been major attacks in this sense.

In a recent interview, James Lyne, responsible for research Sophos, security company, claimed the following: "Criminals are increasingly power in the world, both digital and physical; economic damages are potentially greater, and there are fewer online trust. "These statements put the willies especially when coming from an expert in the world of computer security, as evidence that we should not lower our guard in this area. Also, we must remember that the world of technology is changing and is continually evolving.

 
Both, and within this cyber world, not forget that cyber espionage is part of life today and no one is surprised that these practices are implemented by most governments. The moral issue arising thereof is to determine to what extent threaten the privacy of individuals, because what if achieved thus avoid war or prevent a terrorist attack?

 

d75f42393d41cc0bf029675559e4aa1c 300x175 La amenaza de la ciberguerra y los límites del ciberespionaje
Lyne explained in this sense very enlightening: "Since we Sophos Labs 150.000 programs 'malware' different every day, and near 30.000 websites also infected each day, which involves thousands of compromised computers ". The expert says that today there is no difference between a kitty script attacks (intruders who use other programs to attack networks and modify web pages) and threats from organized cybercrime groups and even governments. "We all look the same. All they can differentiate is the goal, what they are trying to achieve. "

 
That's where lies the point that it can distinguish one another cyberattack, the purpose of the. Obviously not the same perform this type of acts in order to cause harm. with the intention of avoiding a criminal action. However, one of the problems that can arise from all this is where or how to set limits. To what extent a government or an institution can ciberespiar Is it valid? Any cyber espionage? Why U.S. spied on Angela Merkel, if you are supposed to be allies? This one of the main obstacles that circulates around the cyber espionage and is one that is more by doubt such actions outside its purpose.

http://www.delitosinformaticos.com/06/2014/noticias/la-amenaza-de-la-ciberguerra-y-los-limites-del-ciberespionaje#.U6EFfJR5OSw

Leave a Reply

Your email address will not be published.