Cyber security measures provide protection against cyber attacks

1951 Telegram

Companies in industries such as energy, transportation, retail and industrial use digital systems and high-speed connectivity to provide efficient customer service and cost-effective business operations. Just as they protect their physical assets, they need to secure their digital assets and protect their systems from inadvertent access. Intentional hacking and unauthorized access to computer systems, networks, or connected devices is called a cyber attack. A successful cyber attack can lead to the disclosure, theft, destruction or alteration of sensitive data. Cyber security measures provide protection against cyber attacks and provide the following benefits.

Many states are investing in the development of offensive and defensive ICT capabilities, bringing an aspect of complexity to interstate relations. Such capabilities can range from intelligence and information operations to disrupting critical networks and services or command and control functions.

The unique characteristics of ICTs have greatly increased the scope for confusion, misjudgment, and even tension as states attempt to resolve issues of intent, attribution, rules, and norms.

Therefore, OSCE member states are developing confidence-building measures to reduce the risk of conflicts arising from the use of ICT. These measures are designed to provide specific tools and mechanisms to make cyberspace predictable and avoid misunderstandings, including:

*a mechanism for organizing meetings of states to hold consultations on possible incidents in the field of cyber security and ICT security in order to reduce tensions;

*provide a platform for exchange of views, national strategies and approaches to cyber security and ICT security, allowing states to more easily "read" each other's intentions in cyberspace;

* Specific areas of work, such as protection of critical ICT infrastructure: this will allow participating states to collectively build resilience against cyber security threats in the OSCE space for the common good.

* In addition to the CSBM on cybersecurity and ICT security, the OSCE and its institutions focus on combating threats to cybersecurity and ICT security from non-state actors such as organized criminals and terrorists. The focus here is on encouraging adequate and timely national responses to these evolving threats, from more effective forensics to innovative ways to prevent ICT from becoming a tactical enabler of terrorists.

Cyber attacks evolve as technology evolves. Attackers use new tools and devise new strategies to gain unauthorized access to systems. Organizations are adopting and improving their cybersecurity measures to keep up with new and evolving technologies and tools for digital attacks.