Cybersecurity

Definition

  • Cybersecurity or information technology security is the technique of protecting computers, networks, programs, and data from unauthorised access or attacks that are aimed for exploitation.

Types of Cybersecurity

Type of Cyberattack Definition
Ransomware
  • This type of malware hijacks computer data and then demands payment  in order to restore it.
Trojan Horses
  • A Trojan horse attack uses a malicious program that is hidden inside a seemingly legitimate one.
Clickjacking
  • Act of tempting internet users to click links containing malicious software or unknowingly share private information on social media sites.
Denial of Service (DOS) Attack
  • The deliberate act of overloading a particular service like website from multiple computers and routes with the aim of disrupting that service.
Man in Middle Attack
  • In this kind of attack, the messages between two parties are intercepted during transit.
Cryptojacking
  • The term Cryptojacking is closely related to cryptocurrency. Cryptojacking takes place when attackers access someone else’s computer for mining cryptocurrency.
Zero Day Vulnerability
  • A zero-day vulnerability is a flaw in the machine/network’s operating system or application software which has not been fixed by the developer and can be exploited by a hacker who is aware of it.

Terms  Associated with Cybersecurity

Cyber Crime Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of a crime.
Cyber warfare When a nation-state or international organization attacks and attempts to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks.
Cyber spying/ cyber espionage Cyber spying/ cyber espionage is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of the proxy server.
Cyber terrorism Cyberterrorism can also be defined as the intentional use of computers, networks, and the public internet to cause destruction and harm for personal objectives

Issues of Cybersecurity

  • Increased use of mobile technology and the internet by people.
  • The proliferation of the Internet of Things (IoT) and the lack of proper security infrastructure in some devices.
  • Cyberspace has inherent vulnerabilities that cannot be removed.
  • Internet technology makes it relatively easy to misdirect attribution to other parties.
  • It is generally seen that attack technology outpaces defence technology.
  • Lack of awareness on cyber security.
  • Lack of cybersecurity specialists.
  • Increased use of cyberspace by terrorists.

Steps taken by the Government:

  • CERT-In – National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.
  • Cyber Surakshit Bharat Initiative –  It was launched in 2018 with an aim to spread awareness about cybercrime and build capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.
  • National Cyber Security Coordination Centre (NCCC) – In 2017, the NCCC was developed. Its mandate is to scan internet traffic and communication metadata (which are little snippets of information hidden inside each communication) coming into the country to detect real-time cyber threats.
This entry was posted in General Studies 3, Internal Security. Bookmark the permalink.