Вы находитесь на странице: 1из 3

COMMITTEE- the Disarmament and International Security Committee

COUNTRY- Netherlands
SCHOOL- Suncity School
DELEGATE- Shreya Jain
TOPIC AREA - Cyber warfare and espionage
Over the past couple of years, the progress in the development of information and
telecommunication technologies has been commendable, with an ever-growing sophistication
of systems across all sectors of public and private activity. This has also led to challenges of
ensuring security, especially in the military and scientific sectors, whose vulnerability to
cyber-attacks poses a serious threat to the peace and security worldwide. Cybercrime includes
everything, from identify theft and hacking to virus distribution and computer fraud it is a
complex area of criminology and one that is receiving more attention due to our current
dependence on technology.

CAUSES: money is a major incentive for many cyber criminals. Especially because the
dangers of being charged with criminal charges is easier to avoid when you have a system
and a network to hide behind. The perception of low risk and very high financial reward acts
as incentives for many cyber criminals to engage in malware, phishing, identity theft and
fraudulent money request attacks.

POLICIES: The National Cyber Security Strategy 2 was adopted by the government of
Netherlands in 2013. This strategy comprises of a comprehensive appraisal of the cyber
threats faced by the Netherlands and the best practices to address them. The “action
programme” section of the solution contains clear objectives and action items, each mapped
an approximate delivery date. This strategy is one of the two strategies that the Netherlands
has adopted, the original National Cyber Security Strategy was released in 2011 it is based on
the progress resulting from the first.
The Government’s Decision on Information Security — Special Information 2013 plans out
various security practices to assigned classification levels. These levels are set out in Article
2 of the solution and are assigned according to the level of risk involved in disclosing the
classified information.
SOLUTIONS:
1. The UN should criminalize acts of cyber warfare and acts of aggression through the
cyberspace. It should be noted that these include acts of illicitly obtaining information
from another organization, individual or government.

1.a) there are readily available strong tools of UNSC that can help manage and to an
extent curb cyber warfare. Putting cyber warfare on the same level as standard war
will help countries understand the dire situation that the world has currently been
plunged into.

2. Create an official list all of the tools, techniques and methods of attack used by
hackers in previous attempts and use this information to guard oneself against future
breaches. “our history helps us understand our future”. It is imperative that we do an
in-depth analysis of previous attempts of launching unwanted foreign malwares into
one’s server. Creating a list will help us in further developing our security standards
according to what is needed.

3.Hire or train “white hat hackers” who are skilled with hacking and can also
quickly detect and understand which attack tools are being this will help in
anticipation of the next move. hiring more white hat hackers will definitely help in
improving the current security systems.

4. Modern network attacks always favors the aggressor. In the long term, this
advantage may shift to the defenders, as they identify the means of attack and block
them by patching vulnerabilities and insulating network connections. Moreover,
information networks should be made more robust. Essential network services can
be isolated in order to maintain mission capability. Physical security and personnel
training can minimize the threat of malicious insider activity. firewalls and intrusion
detection systems can be configured in such a way so as to provide warning and
response systems for both public and private infrastructures

Regarding cyber espionage, it is necessary for us to understand that often more than
not surveillance techniques are used by governments of certain nations in order to
keep track of terrorist activities and more importantly, to ensure they don’t happen.
Surveillance is NOT synonymous with espionage and it is imperative that the
committee takes this point into consideration.

CONCLUSION: Cyberweapons won’t go away and their spread cannot be controlled.


Instead, as we’ve done for other destructive technologies, the world needs to establish a set of
defined principles to determine the proper code of conduct for governments, regarding
cyberconflict. These rules would dictate how to properly attribute cyberattacks, so that we
would know who is responsible, and how the victim should respond.
Perhaps most important, world leaders should create a framework of incentives and sanctions
that encourage governments to stop destructive cyberattacks in the first place.
All this is, of course, easier said than done. The obstacles to enhanced network survivability
are many and varied. Security is often an afterthought rather than an integral part of network
design. Government and business have different approaches to security and its provision.
Dependence on computer networks often goes unquestioned. And the lines of responsibility
in government are often blurred and confused by overlapping and competing jurisdictions.
Yet all these difficulties can be overcome with a mixture of political will, organizational
commitment, careful planning and systematic implementation. Defense planning needs to
incorporate the virtual world, if there is to be any chance of limiting physical damage in the
real world.

CITATIONS:
https://www.nato.int/docu/review/2001/Combating-New-Security-Threats/Countering-cyber-
war/EN/index.htm
https://www.smartcompany.com.au/startupsmart/advice/startupsmart-growth/startupsmart-
innovation/is-advanced-threat-hunting-the-best-solution-to-cyber-warfare-and-online-crime/
http://www.monitis.com/blog/tech-security-hacking-prevention-methods-cyber-warfare-part-
4/
https://www.nytimes.com/2017/08/11/opinion/cyberwar-cybersecurity-russia-us.html
https://www.global-economic-symposium.org/knowledgebase/the-global-polity/cybercrime-
cybersecurity-and-the-future-of-the-internet/proposals/five-concerns-and-five-solutions-for-
cybersecurity

Вам также может понравиться