Page 71 - Pure Life 23
P. 71

(
                  /


               70   International Multi. J. of PURE LIFE. 7 (23): 47-77, Summer 2020
               countries, Both attacked through      threats.  New  techniques  of
               Microsoft Windows.                    security need to be introduced.
                  The    criminals    demanded          Civilian  intelligence  can  be
               $300  in  Bitcoin  for  release,      easily  converted  to  military
               States  should  train  their  police   intelligence,  The  coordinates  of
               forces to handle such crimes.         a  mobile  phone  of  a  perceived
                  “Petya”  also  affected  the       enemy can  be  used  to  launch a
               radiation  monitoring  system  in     lethal drone attack.
               Chernobyl, Russian steel and oil
               companies,     and    a   French      The Ethics of CST
               construction materials company.       The  militarization  of  CST
                  As  there  is  no  100%            compels its citizenry to demand
               cybersecurity  it  is  necessary  to   ethical  standards  of  conduct
               have  a  layered  approach  to        because  its  development  has
               security with focus on how they       permeated  every  aspect  of
               set  up  their  networks  with  the   civilian life and its algorithm is
               ability  to  recover  quickly  after   intended  “to  replace  human
               the    attack,   This    is   the     judgment  of  social  functions”
               responsibility of both states and     (Nick Bostrum).
               institutions.                            The freedom of using CST is
                  Although  major  platforms         accompanied by  “responsibility,
               that  aggregate  content  and         transparency,        auditability,
               manage discourse have invested        incorruptibility,  predictability”
               heavy  resources  to  secure  their   (Bostrum).
               platforms  their  servers  get           AI  as  a  component  of  CST
               compromised  and  emails  are         can and do go wrong such as the
               intercepted and released into the     2010  financial  “flash  crash”,
               open  public  domain  to  fight       downward      manipulation     of
               political battles.                    carbon  emissions  by  motor
                  Victim  states  need  to  defend   vehicle           manufacturers,
               servers  and  networks.  Not  only    autonomous      vehicles   being
               platforms  but  also  the  users      involved  in  a  traffic  accident,
               security need to be protected as a    and modification for the purpose
               whole  in  order  to  ease  the
   66   67   68   69   70   71   72   73   74   75   76