{"id":10102,"date":"2018-02-13T11:16:05","date_gmt":"2018-02-13T11:16:05","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10102"},"modified":"2020-01-08T07:09:54","modified_gmt":"2020-01-08T07:09:54","slug":"is-cybersecurity-affecting-international-relations","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/is-cybersecurity-affecting-international-relations\/","title":{"rendered":"Is Cybersecurity Affecting International Relations?"},"content":{"rendered":"\n<p style=\"text-align: justify;\">History says nations have always been aware of their enemies. In the era where the world is shifting towards digitisation, these outright physical attacks are also moving towards digital wars. In other words, the nations are waging wars with the third world countries; which has started entering the realm of cyber warfare. A survey predicts, one-third of the human population on this globe is accessing an active internet connection, and this number is said to increase to 1.5 billion more by 2020. This has resulted into hacking becoming one of the powerful means to take political and economic advantages over enemy nations. With the increasing number of internet users and <strong>Internet of Things<\/strong> innovations, there are more threats of cyber criminals hacking the information.The internet expansion in 1990 lead the hackers to explore the various methodologies to play cyber pranks and explore the cyber crime.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-6'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/is-cybersecurity-affecting-international-relations\/#1_Catfishing\" >1. Catfishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-6'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/is-cybersecurity-affecting-international-relations\/#2_Fraudulent_Checks\" >2. Fraudulent Checks<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/image-3.png\" alt=\"\" class=\"wp-image-10104\" width=\"520\" height=\"522\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/image-3.png 376w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/image-3-150x150.png 150w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2019\/05\/image-3-298x300.png 298w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align: justify;\">Any idea of how cybersecurity has an impact on international relations? Cyber criminals have targeted famous faces like Hilary Clinton and Donald Trump,and also, the nations and its data security has been a significant concern.Thus, countries have been keen on making Cybersecurity as an integral part of governments national defence. Also, Cybersecurity is built as a new domain of warfare.<\/p>\n\n\n\n<p style=\"text-align: justify;\">The year 2016 gave rise to the cybersecurity turning out to be the pinnacle of politics all around the globe. The reason for this was the Russian government hacking the confidential emails during the US Presidential elections of 2016.Experts within the international relations discipline are focusing on technology implications for national and international security; Also,the increasing level of threats predicts the need for appropriate policy responses that the government and stakeholders should adopt; The experience of cybercrime reveals that <strong>cybersecurity<\/strong> will remain the most important agenda in international relations.<\/p>\n\n\n\n<p><strong>Here\u2019s how Cybersecurity\nis affecting international relations:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Government Hackers<\/strong><\/li><\/ul>\n\n\n\n<p style=\"text-align: justify;\">Many people don\u2019t have a clear idea about hacking. Such people are used to sabotaging the foreign powers by the government. In other words, people who don\u2019t have an idea that hacking is a crime are taught the hacking skills by the government to intrude the foreign security.<\/p>\n\n\n\n<p style=\"text-align: justify;\">The governments around the globe are using hacking to facilitate their surveillance activities. But, few deploy this capability secretly without any knowledge of cyber laws.<\/p>\n\n\n\n<p style=\"text-align: justify;\">One best example of government hackers are; Iranians nuclear program sabotaged by the US government in 2010. The main aim was to prevent them from acquiring nuclear power. But, unfortunately, the virus got detected at an early stage leading to bitter relations between the nations. This paved more attraction towards cybersecurity threats.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Digital War:<\/strong><\/li><\/ul>\n\n\n\n<p style=\"text-align: justify;\">The fear of nuclear weapons paved the \nway for cold wars in this modern era. This digital transition of the \nworld has led to intruding into the confidential data rather than the \nphysical war. This has resulted in external foreign powers participating in the elections. If Russia becomes a part of this digital war than it would likely spread the misinformation through the internet around the globe; Russia would have mastered the art of hacking the political data which would prove dangerous to the world.<\/p>\n\n\n\n<p style=\"text-align: justify;\"> The future is near when hackers will attack the enemy\u2019s security  infrastructure using computer code. Cyber-war has increasingly become a  dangerous weapon for international conflicts. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Individuality Attacks:<\/strong><\/li><\/ul>\n\n\n\n<p style=\"text-align: justify;\">The main reason for these attacks is interaction with foreign nationals using the internet. Nigerians are very popular in terms of cybercriminals who target individuals through \nonline schemes.<\/p>\n\n\n\n<p><strong>The two popular methods are:<\/strong><\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Catfishing\"><\/span><strong>1. Catfishing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h6>\n\n\n\n<p style=\"text-align: justify;\"><strong>Catfishing<\/strong> is a new method where the criminal party creates a fake profile on social media aiming towards fraudulent benefits like extracting cash. Nigerians use the stolen identity to generate a fraud persona among the people. The primary concern is the growing misconception that Nigerians are cyber criminals. Though there are very few, the increased number of people exposed to internet crime make us believe the same.<\/p>\n\n\n\n<p style=\"text-align: justify;\">It has been a common observation that a massive number of people have been a victim of this act. The popular strategy used is stealing someone\u2019s picture and name to start a conversation pretending to be the same person.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Fraudulent_Checks\"><\/span><strong>2. Fraudulent Checks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h6>\n\n\n\n<p>Stolen identities tend to be the major component of such fraud.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Here, the victims are offered money in exchange for the product or service. The criminals provide money in the form of a cheque. It is also known as cheque fraud. Before the victim, recognises that he is being cheated the victim\u2019s money is already transferred to the criminal\u2019s bank account.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>:<\/p>\n\n\n\n<p>The increasing level of cybersecurity issues indicates that significant improvements in international relations won\u2019t be viewed soon in future.With the increase in technology innovations, the cybersecurity has become a vital topic of interest in terms of International relations. With <a href=\"https:\/\/esds.co.in\/security\/vtmscan\"><strong>cybersecurity issues<\/strong><\/a> becoming more threatening for international relations each day, it will remain at the top of the leader\u2019s agenda around the world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>History says nations have always been aware of their enemies. In the era where the world is shifting towards digitisation, these outright physical attacks are also moving towards digital wars. In other words, the nations are waging wars with the third world countries; which has started entering the realm of cyber warfare. A survey predicts,&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/is-cybersecurity-affecting-international-relations\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":10108,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[1934,1907,1908,149,1936,1910,1591,1935,1912,1913,1195],"class_list":["post-10102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-cms-security","tag-cyber-attacks","tag-cyber-security","tag-esds","tag-esds-vtmscan-vulnerability","tag-features-of-esds-vtmscan","tag-malware","tag-malware-blacklist","tag-malware-scan","tag-malware-scanner","tag-website-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10102"}],"version-history":[{"count":6,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10102\/revisions"}],"predecessor-version":[{"id":11176,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10102\/revisions\/11176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/10108"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}