{"id":2000,"date":"2017-06-05T16:24:37","date_gmt":"2017-06-05T19:24:37","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2000"},"modified":"2017-06-05T16:24:37","modified_gmt":"2017-06-05T19:24:37","slug":"nuevas-ciber-armas-son-necesarias-para-moverse-de-la-guerra-fria-a-la-guerra-de-codigo","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2000","title":{"rendered":"Nuevas ciber armas son necesarias para moverse de &#8220;la Guerra Fr\u00eda a la Guerra de C\u00f3digo&#8221;"},"content":{"rendered":"<p>El creciente potencial de conflicto en la esfera ciberespacial requerir\u00e1 que gobiernos y militares se concentren m\u00e1s profundamente en las ventajas espec\u00edficas de usar tecnolog\u00edas de ciber armas tanto defensivas como ofensivas.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\"attachment-post-thumbnail wp-post-image alignright\" src=\"http:\/\/fifthdomain.com\/wp-content\/uploads\/2017\/05\/snagfilms-a.akamaihd.netempty-control-room-d59ce44809245bfbd4786aef021dcdfb67989c97-1-960x527-960x527.jpg\" alt=\"snagfilms-a.akamaihd.netempty-control-room-d59ce44809245bfbd4786aef021dcdfb67989c97-1.jpg\" width=\"397\" height=\"218\" \/>The increasing potential for conflict in the cyberspace domain will require governments and militaries to focus more deeply on the specific advantages of using defensive or offensive cyber weapons technologies. Militaries can be expected to develop counter-response \u201cweapons\u201d that have surgical precision strike capabilities.<\/p>\n<p>Digitalization, pushed by the rapid advance of digital-based communications, has taken the world from the \u201cCold War to the Code War\u201d in this battle-space era, said William H. Saito, an IT and cyber threats special adviser to the Cabinet Office of the Government of Japan.<\/p>\n<p>\u201cTen years ago the biggest companies in the world were in oil, now the biggest companies are in technology fields. This new Code War is very different to past threats, in the sense that non-state hostile actors may not have any value in terms of being a real or definable enemy,\u201d said Saito.<\/p>\n<p>The core question for governments, militaries and national security agencies, said Saito, is to determine whether it is better to have a good defense or a better offense. \u201cI am not sure that it is a better offense,\u201d Saito told a gathering of cyber experts at the Cyber Conflict (CyCon) 2017 conference in Tallinn.<\/p>\n<p>Governments in the West and Asia need to urgently bolster their overall understanding regarding the nature of future threats posed by non-state hostile actors in cyberspace,\u00a0 said Elina Noor, director of foreign policy and security studies at the Institute of Strategic and International Studies in Malaysia.<\/p>\n<p>\u201cWestern leaders must also remember that emerging states in Asia are more deeply focused on growing their economies than investing in national security. In arrests of groups linked to terrorist organizations in Malaysia in 2016, some 75 percent of these individuals were radicalized online. We need to define more accurately the root origin of present and future cyber threats and allocate resources to where they are most likely to be effective,\u201d Noor said.<\/p>\n<p>The international laws that govern armed conflict could apply in cyberspace just as they do on land or at sea, said James Lewis, a senior vice president at the Center for Strategic and International Studies (CSIS).<\/p>\n<p>Currently, states agree not to attack each other\u2019s critical infrastructure in \u201cpeacetime,\u201d Lewis said.<\/p>\n<p>\u201cThat said, there is no firm international agreement for countries not to attack should national interests dictate. There is also no agreement to prohibit conflict between nations in cyberspace. It would be difficult to make such an agreement work. There would need to be consensus, and this will take a long time to happen,\u201d Lewis said.<\/p>\n<p>The defensive and offensive \u201cweapons\u201d under development by Western countries will need to be both capable and flexible enough to operate in an ever-changing technological landscape, said Olaf Kolkman, the chief internet technology officer with Internet Society, the Washington-based \u201csafe internet\u201d advocacy organization.<\/p>\n<p>\u201cIn cyberspace there is no longer a military world and a civilian world. These worlds have merged,\u201d Kolkman said.<\/p>\n<p>Ultimately, the responsibility for developing solid defenses against cyber threats and attacks will rest with governments, Lewis said.<\/p>\n<p>\u201cThe state has the responsibility to protect its people and its critical systems. There is an infinite galaxy of vulnerabilities to consider in this equation. Governments need to ask how themselves how they can best protect their citizens. Personally, I think the risk of escalation factor is too great for hostile actors to start a war in cyberspace,\u201d said Lewis.<\/p>\n<p><strong>Fuente:<\/strong> <em><a href=\"http:\/\/fifthdomain.com\/2017\/06\/02\/new-cyber-weapons-needed-in-move-from-cold-war-to-the-code-war-cycon-tallinn\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/fifthdomain.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El creciente potencial de conflicto en la esfera ciberespacial requerir\u00e1 que gobiernos y militares se concentren m\u00e1s profundamente en las ventajas espec\u00edficas de usar tecnolog\u00edas&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2000"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2000"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2000\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}