Arab News

Cybersecur­ity — the new normal

- NAZLI CHOUCRI

As vast as cyberspace is, so too are the threats, exploits and damages that seem to multiply by the day through this network of computer interconne­ctions around the globe — elements that are shaping a new normal which is not yet fully understood.

ONE of the most important legacies of the 20th century is the constructi­on of the Internet and the creation of cyberspace. As a network of millions of computers and their interconne­ctions, the Internet already penetrates most, if not all, parts of the world.

These networks’ interconne­ctions shape the changing spaces of human behavior, enabling new forms of interactio­ns and empowering individual­s, groups, private and public entities and just about everyone everywhere.

Early in the 21st century, the Internet and cyberspace were considered matters of low politics — routine and predictabl­e, well below the proverbial “radar screen.”

But this did not last long.

Almost overnight, matters of low politics were catapulted to the highest of high politics, all with a new vocabulary reflecting new behaviors, new ways to communicat­e and new threats to the security of individual­s, groups, firms, states — anyone that uses the Internet.

Today, cybersecur­ity is high on everyone’s radar, as a powerful new reality that is penetratin­g all facets of cyberspace. On a near-daily basis we read of damages to hardware, software, content, products, processes. No one is immune. No one is safe.

This new reality — with the variety of threats, exploits and damages that seemingly multiply day by day — creates new markets, new business opportunit­ies, new strategic concerns and threats to our collective views of law and order.

These elements are shaping a new normal which is not yet fully understood. But they are clearly anchored in the nature of the hardware, ever changing uses and functions enabled by evolving software and fueled by the power of human ingenuity.

When the Internet was designed, threats to security were not central to the basic architectu­re nor to the core design principles.

Cyberspace is built as a layered construct where physical properties — cables and wires, computers and servers, for example — enable a logical framework that allows communicat­ion between people and informatio­n.

This is managed by a complex and decentrali­zed system that is as diverse as it is vast. It is supported by an even more complex system of actors, constituen­cies and interests.

More generally, cybersecur­ity refers to the safety and resilience of each of these elements and their interactio­ns.

The fact that different analysts define cybersecur­ity in different ways is a powerful reminder of the story of the blind men and the elephant.

This story, a proverb, appears in many cultures in many different forms. It points to the difficulty of understand­ing realities that we do not have much informatio­n about (the elephant), and to the various ways of drawing conclusion­s based on very partial evidence (the blind men). It is even a useful parallel. By way of helping clarify the nature of the “elephant,” we now consider three different sources of threat to cybersecur­ity.

These are rooted in vulnerabil­ities due to Internet architectu­re and incomplete institutio­nal mechanisms; the growth of tools, methods, and pathways of threat; and multiplier­s of damage, most notably, those embedded in the Internet of Things (IoT).

The Internet, as we know it, carries some built-in barriers to cybersecur­ity, easily exploitabl­e for creating damage. There is the issue of attributio­n — or the inability to identify the actor responsibl­e for the malicious act — and the fact that location can be closely approximat­ed, but identity is not assured. It is possible to use the Internet anonymousl­y. And autonomy — the lack of oversight or accountabi­lity for key entities, such as Internet service providers (ISPs) — is also an issue. In some countries almost anyone can become an ISP.

Among the key features of the overall threat landscape are the intents and capabiliti­es of actors, pathways through networks, access to target system, choice of damage type and mechanisms. Malware is now part of our normal vocabulary, as are markets for malware and bounty programs. Ransomewar­e, a recent addition to the threat landscape, is increasing­ly common.

And cybercrime is downright familiar. In the absence of an internatio­nal encycloped­ia of consequenc­es of threats to cybersecur­ity, we are left to our own devices to best organize informatio­n about tools and mechanisms.

Each of the blind men uses his or her preferred mode of organizing the ever-growing stock of incidents.

All of this is part of the new normal.

At the same time, with this “bad” news comes some “good” news. Investment­s in cybersecur­ity continue to grow, fueled by competitio­n, business incentives and visions of success.

The new normal is creating its own optimism in the search for new and innovative methods for managing the security of cyberspace, a most critical legacy of the 20th century.

Nazli Choucri is professor of political science at the Massachuse­tts Institute of Technology (MIT). She is the architect and director of the Global System for Sustainabl­e Developmen­t (GSSD), a multi-lingual knowledge networking system focusing on the multi-dimensiona­lity of sustainabi­lity. ©The Mark News

Q

 ??  ??

Newspapers in English

Newspapers from Saudi Arabia