Cyber Security Introduction Latest Cyber Security Threats 5594e707
Cyber Security Introduction Latest Cyber Security Threats 5594e707
Cyber Security Introduction Latest Cyber Security Threats 5594e707
The term "Cyber Security" refers to the type of security provided to cyber systems that people can
access via the internet or intranet. Internet is a global network of networks of computers or other electric
devices whereas intranet is a private system of networks which is designed to use by particular
organisations.
Cyber Security is one of the important topics for the UPSC IAS Exam as it covers a significant part of
the Internal Security subject in the General Studies paper-3 syllabus and also covers the current events
section of the UPSC prelims syllabus.
In this article, we shall cover the cyber security definition, its introduction, types, threats and advantages
for UPSC.
What is Cybersecurity?
Cybersecurity is also known as information technology security or electronic information security.
Cybersecurity protects systems, networks, and programs from digital attacks. These cyberattacks are
usually aimed at accessing, changing, or destroying sensitive information; demanding money from
users, or obstructing regular corporate operations.
Cyberspace
Cyberspace is the connected Internet Ecosystem. A global domain within the information
environment consists of the interdependent network of information technology infrastructures,
including the Internet, telecommunications networks, computer systems, and embedded
processors and controllers. Cyber Security protects cyberspace (critical infrastructure) from
attack, damage, misuse and economic espionage.
Also, download Internal Security UPSC Notes with this link!
first instance of checking a malware antivirus application and the first self-replicating
programme, or virus.
Programmer Bob Thomas created a programme in the 1970s that is largely regarded as the first
computer trojan event because the worm and trojan jumped between PCs, which was a
groundbreaker at the time.
https://blogmedia.testbook.com/blog/wp-content/uploads/2022/09/evolution-of-cyber-security-
9017a6cc.png
Page - 2
Download Testbook
3 Trojans It is Similar to the mythical Trojan Horse, this attack deceives victims
into believing they are opening a secure file. Instead, after being
installed, the trojan targets the system, generally creating a backdoor that
Page - 3
Download Testbook
4 Malware This threat includes worms, viruses, spyware, ransomware, and other
malware. It may also obstruct access to your computer's resources, cause
system instability, or covertly send data from your data storage.
6 Phishing To trick the recipient into opening and following instructions that often
request personal information, hackers utilise fake communications,
particularly e-mail. Some phishing scams involve the installation of
malware.
8 Botnets A network of computers that have been infected with malware and are
controlled by a single attacking party is referred to as a botnet. Botnets
can be used to launch Distributed Denial-of-Service attacks, steal data,
send spam, and give the attacker access to the device and its connection.
9 SQL injection By inserting a string of malicious code into a database query, attackers
can access a web application database without authorization via the SQL
injection technique. A SQL injection modifies SQL code in order to
execute malicious SQL commands or grant access to protected resources,
such as sensitive data.
10 Advanced are extended targeted attacks when an attacker sneaks into a network and
persistent threats goes undiscovered for a lengthy time with the intention of stealing data.
Page - 4
Download Testbook
2. Cloud Security: Securing data, apps, and infrastructure in the cloud is the focus of cloud
security. An organization's whole cloud deployment (applications, data, infrastructure, etc.) can
be protected from attack with the help of cyber security solutions, controls, policies, and
services.
3. Endpoint Security: With endpoint security, organisations can protect end-user devices,
including desktops and laptops, with data and network security measures, cutting-edge threat
prevention, including anti-phishing and anti-ransomware, and forensics-oriented technologies,
like endpoint detection and response (EDR) solutions.
4. Mobile Security: Because corporate data may be accessed on mobile devices like tablets and
smartphones, organisations are at risk from phishing, malicious software, zero-day
vulnerabilities, and IM (Instant Messaging) assaults.
These attacks are stopped by mobile security, which also protects operating systems and
devices from rooting and jailbreaking.
This enables businesses to guarantee that only compliant mobile devices have access to
company assets when combined with an MDM (Mobile Device Management) solution.
5. IoT Security: IoT security entails protecting networks and smart devices connected to the IoT.
IoT devices are objects that connect to the Internet automatically, such as smart lighting,
thermostats, fire alarms, and other equipment.
7. Zero Trust: Zero Trust is a security framework that mandates that before granting or
maintaining access to applications and data, all users whether inside or outside the organization's
network must first authenticate, authorise, and undergo ongoing security configuration and
posture validation.
Cyberwarfare
Cyberwarfare is a type of cyberattack on computer systems of nations or institutions that are
considered cyber warfare and is done with the goal of disrupting, destroying, or harming
infrastructure.
Page - 5
Download Testbook
Page - 6
Download Testbook
Image
Source: NITI Aayog
Subject Hackers gained Numerous thousands Zomato, a food tech India was affected
Matter access to the of computers in India business learned by the ransomware
necessary credentials were taken hostage by that 17 million attack, which
to carry out a fund hackers demanding members' data, disrupted container
transfer using a ransom during the including names, handling operations
phishing email sent global ransomware email addresses, at a terminal run by
to an employee, outbreak. The attack and hashed the Danish company
Page - 7
Download Testbook
Conclusion
Cybersecurity is a field that deals with ways to protect systems and services from malicious online
attacks including spammers, hackers, and cybercriminals. At the same time, certain cyber security
components are built to safeguard all assets, from computers and cellphones to networks and databases,
against attacks. Nowadays, there are more devices than humans, and hackers are getting more creative.
As a result, it is difficult to implement efficient cybersecurity measures.
The field of cybersecurity is still in its inception, yet it is crucial to maintaining the organization's
business operations. It is not one item, but rather a collection of methods or strategies. In order to
safeguard user data and keep operations running smoothly, every organisation must employ
cybersecurity measures.
Year Question
2022 What are the different elements of cyber security? Keeping in view the challenges in cyber
security, examine the extent to which India has successfully developed a comprehensive
National Cyber Security Strategy.
2021 Keeping in view India’s internal security, analyse the impact of cross-border cyber attacks.
Also, discuss defensive measures against these sophisticated attacks
2017 Discuss the potential threats of Cyber attacks and the security framework to prevent them.
2015 Considering the threats cyberspace poses for the country, India needs a “Digital Armed Force”
to prevent crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the
challenges perceived in its effective implementation.
2013 Cyberwarfare is considered by some defence analysts to be a larger threat than even Al Qaeda
or terrorism. What do you understand by Cyberwarfare? Outline the cyber threats to which
India is vulnerable and bring out the state of the country’s preparedness to deal with the same
Page - 9
Download Testbook
Page - 10