Cyber Warfare and Cyber Security


Cyberwarfare refers to the use of digital attacks like computer viruses and hacking by one country to disrupt the vital computer systems of another, with the aim of creating damage, death, and destruction.1” In the past few decades, there has been a new sort of warfare. the fight is via cyberspace, which is nothing like the age-old military style of strikes. The case of cyber warfare is not quite the same as cybercrime.  Cybercrime is commonly thought of as monetarily propelled. Cyberwar is something that is politically spurred. It can be digital assaults that influence the physical pulverization of basic foundation. It can also be something that causes some sort of a situation whereby there is a mass death toll. Such cases are considered as a demonstration of war or oppression.

The term cybersecurity refers to the collection of tools, policies, guidelines, training, actions, security concepts, and safeguards, risk management approaches, assurance, and technologies that can be used to secure and protect the cyber environment as well as the organization and user assets. 2

Cyber-crime is of the nature that it can be begun from anyplace. Cyber-crime is something that is done on a bigger scale. It is driven by the countries or states against another country or state. It is also important to note that cyber-crime can occur during times of peace. This can happen even when there is no physical war that is going on with the said country.


Cyberwarfare is carried out via the Internet. These attacks are done to destabilize the country’s systems. This can be through stealing or adjusting private information. It can cause some sort of damage to the administration. Or perhaps to banking or political systems in the country. The range and the effect of cyberwarfare is something that is dependent on the seriousness of the attacker. It also depends on who the target is. It is important to understand how much technology has advanced. There’s a lot of known appalling cyber warfare systems that are accessible.

“Whether an attack to be considered as an act of cyber warfare be contingent upon several aspects. It comprises the individuality of the attacker, their liability, and how much loss they inflict. On the other hand, cyber warfare in its cleanest sense is typically demarcated as a battle between states. To qualify such attacks, it should be of noteworthy scale and gravity.3

Cyberwarfare is a computerized assault. It is so grave at times that it can very well be viewed as what could be compared to a physical assault. To arrive at this edge, an assault on PC frameworks would need to prompt critical pulverization or interruption, or even be the cause of deaths. This is the noteworthy edge on the grounds that as per law. the nations are permitted to utilize power to guard themselves against a furnished assault.

If a nation were hit by a cyberattack of huge scope, the nation can strike back utilizing the power of their standard military weapons. but such a situation hasn’t occurred up until now. Regardless of whether such an assault has taken place or not, it wouldn’t be right to be of the assumption that the affected nation would not essentially strike back in such a manner.

Further, it is also important to note that a country cannot simply turn a blind eye to such attacks. However, the nation enduring such an onslaught can’t legitimize turning to military power to shield itself. There are a lot of different methods of reacting to a cyberattack, such as removing representatives, reacting in kind, etc.

Governments are progressively mindful. The people and governments are so dependent on cyberspace. Everything right from money related administrations to transportation and other facilities are available. Utilizing programmers outfitted with infections or different instruments to close down those frameworks could be similarly as compelling and harmful as customary military missions utilizing troops equipped with firearms.

In contrast to conventional military assaults, a cyberattack can be dispatched quickly. There isn’t much hassle in contrast to a customary military activity. Further, it would be very difficult to trace back the culprit which again is beneficial to the country planning the attack.

Subsequently, governments and other related organizations do have a strong opinion. Such a range of advanced cyber assaults against the essential framework will give assailants a method of bypassing a nation’s customary protections. And thus governments are hustling to improve the security of their cyberspace.

This type of war via cyberspace also offers another added advantage. The rival state can be attacked without putting officers in danger. The dread of being helpless against the digital weapons of their opponents besides a craving to tackle these instruments to support their own remaining on the planet is driving many nations into a digital weapons contest.


In India, the issue of network protection has gotten very little consideration from policymakers. The legislature has been unable to handle the nation’s developing requirements for a vigorous cybersecurity protection device. To put it plainly, India needs a powerful and hostile, and protective cyber safety system. This would be imperative to defying refined malware virtual software that is used by the attackers.

Also, network protection ventures and activities in India are far less in number when contrasted with other countries. A significant number of the pertinent tasks proposed by the Indian government have stayed on paper. It was never materialized into actual work. Simultaneously, India faces an indispensable need to secure its most basic structures such as the satellites, banks, etc., from cyberattacks. Cyber-attacks in India have gone from hacking, fraud, spamming, email-besieging, web disfigurement, to the forswearing of administration.

In recent decades, the domain of Information Technology has grown to become one of the biggest impetus for the nation’s financial development. It is also an indispensable aspect of the nation’s business and administration. It is positively changing the lives of many Indian residents. This is via its immediate or circuitous commitment to the improvement of the people’s financial boundaries with regards to the way of life and standard of life. Also, the IT sector has also assumed an important part of changing India into a worldwide player by providing business benefits that are on par with the top-notch innovation arrangements. In any case, the development of the IT circle is of utmost importance as there is an expanding need to protect cyberspace in a way that is trustworthy and satisfactory. 


In accordance with the aforementioned chapters, it is imperative for India, as a country that is undergoing rapid developments in the field of technology, health, defense, etc, to ramp up its cybersecurity works. It is absolutely important for the development of clear and strict rules and laws to deal with the issue of cybersecurity and warfare. This would safeguard the country’s cyberspace from external attacks.

It is impossible for any country to ensure cybersecurity on its own. Hence it is important that a combined effort with other countries must be made. India could focus on developing its cybersecurity by entering into bilateral and regional agreements. This would not only deal with the threat and risk assessment perspective but also effectively look into the conduct of joint training, technological developments, and research.

You never know who has access to your information. Always stay cautious.

  1. What is cyberwar? Everything you need to know about the frightening future of digital conflict ZDNet,  

  2.  Sushma Devi Parmar, Cybersecurity in India: An Evolving Concern for National Security. 

  3.  Mukherjee, Sourav, Cyber Warfare and Implications,   

About Anuncia William

Anuncia William is pursuing her undergraduate degree in business administration and law from Symbiosis Law School Hyderabad.

View all posts by Anuncia William →

Leave a Reply

Your email address will not be published. Required fields are marked *