Today, the world relies on information technology to drive business as well as to manage the affairs of nations. Businesses rely on the internet, mobile phones and computer networks to perform transactions. Similarly, governments have invested in a wide of variety information technology tools such as communication satellites, fiber-optics powered internet, massive mobile phone network systems and other terrestrial information communication infrastructure. While the importances of these systems have grown immensely, so is their susceptibility for attacks both foreign and domestic. Thus, governments have taken time to create and implement policies that safeguard the nations’ communication infrastructure.
Iran, Russia and China
Iran for instance has taken steps to limit the amount of internet access within its borders. The Islamic Republic has been facing steep criticisms and sanctions for its nuclear program. For this reason, the country perceives itself as great target for cyber attacks. Therefore, Tehran has been keen to limit internet access and particular common websites such as Facebook, YouTube, Twitter and Google . The country had gone further to block Gmail and other such email services in the country. Activists and perceived friends of western nations have their websites shut . Russia too has a nationwide policy that provides for detection, prevention and response mechanisms in case of a cyber attack. A similar case is in China where the government has taken measures to limit internet access. Several western websites have been blocked. These western websites are perceived to weak points. These efforts seem not to be very successful. Penetration of internet has been widely reported in these countries.
Commentary
The measures taken by the different states appear not to work. In Iran for example, activist have been able to leak vides depicting human rights abuse through websites such as YouTube. Either, the Chinese crackdown on Tibet was broadcasted to the whole world via similar websites. Therefore efforts to limit access to international networks such as the internet have been failing. On a more grave case was the STUXNET worm that attacked Iran’s nuclear program system . The worm managed to cause much damage and Tehran argues that America and Israel were behind the attack. Therefore, these measures seem to be failing.
It is therefore difficult for these nations to implement such internet restriction while the software and hardware used are mainly western-made. Operating software, antivirus software, mainframe computers and internet implementation methodology are designed in western nations. Designing a security system should consider involving the original designers of the system, who are the West.
C.news. (2012, July 12). Russia Rolls Out State Cyber Security Policy. Retrieved Nov 13, 2012, from eng.cnews.ru: http://eng.cnews.ru/news/top/indexEn.shtml?2012/07/12/496257
Charbonneau, L. (2012, October 25). Iran rejects UN criticism of its cyber security rules. Retrieved November 13, 2012 , from www.reuters.com: http://www.reuters.com/article/2012/10/25/net-us-iran-security-un-idUSBRE89O19420121025