Uploaded by vip.shalanaeva

round table

Hostile foreign actors are increasingly aggressive in cyberspace, creating an economic environment that
few understand and that even fewer are prepared for
 practice cyber hygiene
 using strong, unique
 two-factor
 keeping their devices
and software up to date
 implementing robust
 enforcing laws and
security measures
regulations that require
organizations to protect
 conducting regular
their data and systems
security audits
 collaborate with other
 training employees on
states and international
cybersecurity best
organizations to share
threat intelligence
 investing in security
fostering a culture of shared responsibility and collaboration, raising awareness about the
importance of cybersecurity, and working together to develop international norms and
standards for cybersecurity
Weakening Encryption and Personal Freedoms
Consequences of Cyber War and
 making communication and data more
 disruption of critical infrastructure
vulnerable to unauthorized access
 theft of sensitive information
 Examples of encryption technologies that
 financial losses
protect personal freedoms include end-to even loss of life
end encryption used in messaging apps
 widespread chaos
like WhatsApp, encryption protocols used
in online banking transactions, and VPNs
that secure internet traffic from
Prevention Strategies
 investing in cyber defense capabilities
 establishing international norms for cyberspace behavior
Dilemma: promoting transparency and accountability in cyberspace can help deter malicious actors
easier, but at the same time personal freedom is at stake. So, to what extinct should government
intrude into the sphere of sybersecurity of its citizens?