The presence of citizens, civil society, institutions, market forces and the governments, as well as their enemies from state, non-state, business and commercial entities in the real and virtual world is, by and large, of similar nature and intensity. Since the Information Communication Technology (ICT) is an ever developing domain, the technological dynamism has made the cyber nation state less
... [Show full abstract] predictable. Because of the sheer speed of technological innovations, that too beyond state control, threats and their responses both follow each other. Also, anonymity, occasional un-traceability and deniability are three permanent features that complicate the implementation of conventional security tools. The cyber nation states will go through, occasionally, the same process that they have gone through in the physical world. The realist state behaviour, the idealist and structural realism are already the current practices of the cyber security regimes. This article discusses how the cyber security mechanism is being evolved in response to cyber threats. Cyber threats have the potential to inflict damage very quietly on public interests as well as institutional capability of governments, business organizations and their security installations. Sometimes, they are able to create unprecedented panic and terror. A sustainable policy framework to deter such an impending threat is very much dependent on both technical as well as policy interventions. ICWA Policy Brief 2 | www.icwa.in