Cyberspace and its complexities

I think I live in cyberspace as everything from my geyser to air conditioner to cell phone to car to coffee maker to food processor run on computer technology. From the time I get up in the morning until I go to bed at night, I am so incredibly surrounded by computers that I almost forget to even realize they are computers.

Decades ago, cyberspace was in its embryonic stage and was actually difficult to understand as its meaning was limited to the network of computers that virtually connected a few organizations. But, the current scenario is completely different as every chain that connects us to another chain is connected by computers and the Internet. Be it a politician, a businessman, a common man, a bureaucrat or an ethicist, everyone is greatly affected by Internet-related problems. The name given to such problems is cyber security problems.

Each habitat in this cyberspace faces different cybersecurity problems and the variety is so high that a single problem hardly becomes so viral that everyone can understand it. There are many issues, questions and answers that the masses still don’t understand very well. Therefore, we must be more informed and involved in order to understand more and think more about the new cyber threats that appear almost every day in the cyberspace that we inhabit.

It really worries me, “if cyber anxiety between nations hardens on cyber security issues, privacy issues, and hacking issues, then there would be a devastating cyber war.” The possibility of a cyber war is so high that the cyber security business is expanding massively and so are the special units of the army with cyber defense techniques. Cyber ​​threats have taken over our minds so much that we are willing to compromise our privacy.

If I can ever imagine about cyber warfare, the only thing that comes to mind is:

Cyber ​​warfare would not be limited to armies fighting each other on the border or in the air, in fact, it would go further. The cyber country will hack other nations’ tools that are used to establish the network and disable them, that is, the message encryption machines that are used to transmit troop movement and other vital information during the war would be destroyed, the channel Communication. , transportation and other crucial organizations will be eliminated.

In simpler words, victory will be the destiny of a cyber powerful country or there will be no victory because all space will stop.

What do we really need to understand?

The age of technology moves much faster than the human age. Every two days a new technology is born that leaves behind the previous ones. For example, there was a time when Roadrunner was the super-fast computer, but within a few years, it fell out of the supercomputer league as new technologies with new possibilities emerged. Years ago there were other supercomputers faster than Roadrunner. It was a week before when I started writing about Moto 360 and Asus Zen Watch, but finally when I thought to post it, I found that LG Smartwatch was in the market with enhanced features. In this case, it was a matter of a few days and I had to think about rewriting the review. This is how technology advances at an unimaginable speed and will continue to advance.

No one can really predict the future or the fate of cyberspace. The theories and trends we believe in today may be surprisingly different in the near future. For example, clogged water evaporates with heat, but we never know where each evaporated water molecule actually goes and which water molecule will evaporate next. The only part of the theory that we know of as of now is that it is heat that causes evaporation. There may be much more to know about the same thing in the future.

So it is with the facts and beliefs related to cybersecurity. We can never predict the next threats and the sustainability of security measures that are the best at today’s date. There are threats that we know about and there are threats that we know that we don’t know about and then there are threats that are still unknown about cyber security.

If we had known about such threats at the time of the creation of the computer world, the human race would have restricted its exposure to them. Good! this too would have been a fatal decision because there would be something else that would have replaced the computing world with its own blessings and curses.

Therefore, it is more important to build a proper understanding and enact thoughtful responses to each new possibility that cyberspace has to offer. In short, the inhabitants of the cyber world must be vigilant enough to manage and understand the risks that are complementary to their comforts and joys; this is exactly what we must understand.

Leave a Reply

Your email address will not be published. Required fields are marked *