Sunday July 21, 2019
Home Lead Story Today’s...

Today’s World Uses Technology in A Huge Way in All Security Measures

Technology has achieved a great deal here by doing something that was earlier done only by human analysis producing 'triggers' for action.

0
//
AI
This is the much talked about turf of Artificial Intelligence that now even handles the preliminary part of 'action' that was needed in response to a 'trigger'. Pixabay

By D.C. Pathak

I had the benefit recently of listening to a well established American IT expert on the challenges for security strategists in these times of a literal tsunami of technological advancements. He brought out how the incredible speed at which technology was developing made it difficult to assess its repercussions for the future in terms of both global competition in business as well as the evolution of military domain. It confirmed my belief that while a security specialist could do without being a technology expert, a technology advisor would succeed only if he or she had a complete grasp of security parameters and strategies – in this case the presenter fortunately was aware of the importance of security orientation of technology advisors.

The tsunami of technology witnessed today can do two things – it can help development and a global advance on a positive note or add to the threat spectrum for vulnerable national entities. It is necessary that we do not see ghosts in a new technology, do not look upon the speed of technology advancement as a threat by itself and have the ability to visualise and assess if something was adding up to a danger potential from both national and global angles.

Security is a ‘science’ in the sense that it rests on concepts, precision and detection of fault lines. It works on clarity – the bedrock of science – that admits of no compromise on this count. A nation and an individual have two basic needs, economic well being and security. For development, technology seeks the ‘end’ in terms of product creation and product delivery but in the domain of security technology has to provide at best a rolling improvement of ‘means’ in a situation where the goal post was never static – dependent as it was on the changing scenario set by the adversary. What does not change in security is the basic framework of requirements that held good in all contexts – national security, enterprise security or cyber security. All technology experts should have a good understanding of this in today’s world.

Data
Change of Passwords, level of encryption and points of surprise checks are all decided by the concerned leaders. Data Integration and Data Analytics is done in the frame work set by the human masters. VOA

All advisors – technical or non-technical – who are on the security turf should know what a ‘secure perimeter’ around the identified subject of protection has to be, varying from a brick and mortar fence to a firewall, what ‘intrusion detection’ systems needed to be put in place, what would be the nature of ‘Access Controls’ and ‘Inner Access Controls’ required in that specific situation and what was to be done for the ‘Insider Threat Management’. In cyber security, ‘hacking’ is an intrusion – though it is more like sabotage – that is detected only after it had happened so the prime response of the attacked entity has to be to safeguard what was left undamaged.

‘Access Controls’ begin with the confirmation of the identity of the person seeking to gain entrance. In the cyber domain, Log in and Application layer controls served the purpose. Security of information in transit or storage is maintained through encryption. ‘Inner Access Controls’ regulate entry into sensitive inner segments like Process areas, Command & Control Centre and the location of sensitive information.

Personnel Security has a limited technology paradigm and the Insider Threat Management that covers it is largely a human effort that used Intelligence tradecraft available with trained security professionals. Studies have shown that a vast majority of security breaches are traceable to conniving members of the protected organisation. Scientists including technology developers are used to transparency but in these days of ‘dual use’ they have to understand the compulsions of ‘Need to Know’ – a basic practice in the security domain that ensured that the information sought by the adversary about a protected technology would not be in possession of just any other member of the targeted enterprise. The real challenge for the security professionals lies in detecting signs of ‘vulnerability’ and establishing grounds for ‘suspicion’. An employee showing greed, addiction or disgruntlement is vulnerable to exploitation by the adversary. Signs of suspicion that the member might have been compromised already are unravelled in surprise checks, audits and operations that used special skills of Intelligence tradecraft such as surveillance, secret enquiries and tapping confidentially raised Informers.

technology

‘Access Controls’ begin with the confirmation of the identity of the person seeking to gain entrance. In the cyber domain, Log in and Application layer controls served the purpose. Security of information in transit or storage is maintained through encryption. Pixabay

Today, . In all situations however, human intervention and deduction are to be constantly associated with technology there. CCTV network can not do without human monitoring of the feed constantly or at least periodically. Response to a detected intrusion has to be guided by a human mind. A worker at the assembly line alone can notice any process flaw that needed to be rectified for better productivity. Change of Passwords, level of encryption and points of surprise checks are all decided by the concerned leaders. Data Integration and Data Analytics is done in the frame work set by the human masters.

Technology has achieved a great deal here by doing something that was earlier done only by human analysis producing ‘triggers’ for action. This is the much talked about turf of Artificial Intelligence that now even handles the preliminary part of ‘action’ that was needed in response to a ‘trigger’. Robots do this precisely as replacement of humans in certain sectors of ‘services’. A technology man has to grasp the essence of security to act successfully as Technology Advisor in that realm. Defence Technology is making striking contributions to the task of neutralising the ‘visible’ enemy more effective but in security which deals with the ‘unseen’ adversary technology tools have to play closely with the human controllers in an ongoing fashion.

Also Read: Know How The Content Providers Seem To Have Decided To Capture The Attention Of Masses

At the strategic level, the US and India have, apart from defence cooperation, a lot of conversion on the global issues of security – the new threat of global terror where motivation was rooted in notions of faith and indoctrination was strong enough to turn a young man into a suicide bomber, is clearly on top of the chart. The appearance of ‘lone wolf’ on the terror front is facilitated by the new communication devices, miniaturisation of weapons of attack and explosive devices and use of cyber space for online radicalisation. Hacking is another challenge to security technology and so is the rise of malware injection into both hardware entities and software programmes. Security cooperation amongst friendly countries is now focused on technology for preventing cyber attacks or neutralising a terrorist on one hand and the up gradation of the war machine on the other. (IANS)

Next Story

European Union Opening New Front in Its Quest to More Closely Regulate Big Tech Companies

In addition to selling its own products, Amazon also allows third-party retailers to sell their goods through its site

0
FILE - Caption European Competition Commissioner Margrethe Vestager addresses a news conference in Brussels, Belgium, Jan.11, 2016, after the EU demanded Monday that Belgium recover millions of euros from 35 large companies in back taxes. VOA

The European Union is opening a new front in its quest to more closely regulate big tech companies, saying Wednesday it was investigating whether U.S. online giant Amazon uses data from independent retailers to gain an illegal edge when selling its own products.

EU antitrust Commissioner Margrethe Vestager said she is taking a “very close look at Amazon’s business practices and its dual role as marketplace and retailer, to assess its compliance with EU competition rules.”

In addition to selling its own products, Amazon also allows third-party retailers to sell their goods through its site. Last year, more than half of the items sold on Amazon worldwide were from third-party sellers.

The EU opened a preliminary probe into the issue last year, and Vestager said it has shown that “Amazon appears to use competitively sensitive information — about marketplace sellers, their products and transactions on the marketplace.” Using the information could give it an unfair competitive edge.

European Union, Technology, Companies
The European Union is opening a new front in its quest to more closely regulate big tech companies, saying Wednesday it was investigating. Pixabay

In a parallel case, Germany’s competition regulator said Wednesday that Amazon was changing some of its business conditions for traders on its online marketplace worldwide after it raised concerns about some terms. The regulator said that the changes affect a range of issues such as a one-sided exemption from liability to Amazon’s benefit as well as the place of jurisdiction for disputes.

Other EU countries like Austria, Luxembourg and Italy are also independently investigating Amazon but EU spokeswoman Lucia Caudet said the national probes did not overlap with the EU investigation.

Amazon said it would cooperate with the EU authorities, according to media reports.

The EU’s investigations into major companies like Amazon have led the way in a global push to more tightly regulate tech giants, as many governments wonder if they are becoming too big for the good of the wider economy.

Also Read- US House Block Administration from Selling Billions of Dollars in Weapons to Saudi Arabia

Among the key questions are not only whether the tech giants abuse their market dominance to choke off competition, potentially stifling choice for consumers, but also whether they are adequately protecting users data and paying their fair share of taxes in countries where they operate.

Tech companies do huge business across Europe but pay taxes only in the EU nation where their local headquarters are based, often a low-tax haven like Luxembourg or the Netherlands. The result is they pay a far lower rate than traditional businesses. France has tried to address the problem by unilaterally imposing a 3% tax on big tech companies’ revenue in the country. The U.S. government is not happy about that and finance ministers from the Group of Seven wealthy countries will discuss the issue this week in Paris.

Ursula von der Leyen, the EU Commission President elect who should take up her role in November, has said she will try to be more vigilant to make sure such companies pay enough taxes.

European Union, Technology, Companies
EU antitrust Commissioner Margrethe Vestager said she is taking a “very close look at Amazon’s business practices and its dual role as marketplace and retailer. Pixabay

Amazon has already been the target of previous EU investigations. Two years ago, officials ordered it to pay $295 million in back taxes to Luxembourg after finding that the company profited from a tax avoidance deal with the tiny European country. EU officials also investigated Amazon’s e-book business.

Also Read- Buzz Aldrin Recalls the First Moments of Apollo 11 Launch

Meanwhile, in the U.S., the House Judiciary Committee is investigating the market power of Facebook, Google, Amazon and Apple. Congress is this week holding a two-day hearing on Facebook’s plan to create a digital currency, Libra, which governments in the U.S. and Europe have been skeptical about. (VOA)