Quad and Cybersecurity
The Quad has cautiously carved out a practical and cooperative agenda on issues of cybersecurity.
- Krutika Patil
- June 22, 2022
The Quad has cautiously carved out a practical and cooperative agenda on issues of cybersecurity.
The Russia–Ukraine conflict, as well as Russia’s 2014 annexation of Crimea, draw light on the geopolitics of data routing and the usage of the Border Gateway Protocol (BGP) as a tool of control.
Cyberconflict in Ukraine has become normalised in that it is focused, there is no lasting damage, and it effectively conveys a sense of helplessness to the affected government and population. At the same time, it signals to other governments that they are not impervious to such attacks.
The monograph looks at how major powers have tried to pursue three objectives in cyberspace, viz. (1) strengthening or enhancing national cyber defences, and (2) striving to shape the international cyber environment by leveraging economic and technological capabilities, and (3) through defining and evangelising international cyber norms. A section on the cybersecurity preparedness of the countries of the South Asian region is incorporated to highlight those vulnerabilities and deficient capacities and capabilities that give the major powers a foothold to pursue their objectives.
US has undertaken a number of initiatives on cybersecurity, specifically ransomware, one of them being the Counter-Ransomware Initiative Meeting held in October 2021. Whether this attempt by the US to mobilise a larger group of countries to discuss ransomware will lead to real outcomes, or is just meant to endorse its actions, remains to be seen.
The dark web has turned into a hot bed of illegal transactions, posing a threat to the cyberspace across multiple dimensions.
Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.
The ever-growing dependence of man on cybernetworks has unbridled a modish genre of cyberthreat called cyberterrorism. The pervasive cyberspace has provided an advantageous operational frontier to the terrorists for executing cyberattacks on critical infrastructures, spreading hate propaganda over the Internet and using it for recruitment, planning and effecting terror attacks.
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.
It is critical to reduce the risks associated with cyber-enabled elections by ensuring end-to-end verifiability, protection of voter database, managing risks to the election infrastructure and curbing the menace of disinformation.



