0% found this document useful (0 votes)
1K views25 pages

Towards Safe and Secure Cyberspace

The document discusses various aspects of online security and privacy including strong passwords, secure internet connections, antivirus software, software updates, data encryption, and privacy settings. It also outlines several cyber threats such as data breaches, phishing attacks, malware, and describes security initiatives by the Indian government like the National Cyber Security Policy and National Cyber Coordination Centre.

Uploaded by

arihant6087
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views25 pages

Towards Safe and Secure Cyberspace

The document discusses various aspects of online security and privacy including strong passwords, secure internet connections, antivirus software, software updates, data encryption, and privacy settings. It also outlines several cyber threats such as data breaches, phishing attacks, malware, and describes security initiatives by the Indian government like the National Cyber Security Policy and National Cyber Coordination Centre.

Uploaded by

arihant6087
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

UNIT 3: Towards Safe and Secure Cyberspace

Online security and privacy


• Online security and privacy are critical considerations in the digital age, given the
widespread use of online platforms and the increasing amount of sensitive data
shared and stored online
• Maintaining robust security measures and safeguarding personal information
is essential to protect against cyber threats and privacy breaches
• Some of the important aspects of online security & privacy which can effectively
protect online data and maintain security are
• Strong passwords and authentication
• Secure internet connection
• Antivirus and anti-malware software
• Regular software updates
• Data encryption
• Privacy settings and permissions
• Safe browsing practices
• Data Backups
Strong passwords and authentication
• Using strong, unique passwords and enabling two factor authentication (2FA) can
significantly enhance online security, preventing unauthorized access to accounts
and sensitive information
Secure internet connection:
• Ensuring the use of secure and encrypted internet connections,
such as Virtual Private Networks (VPNs), can help protect data transmission and
prevent unauthorized access to sensitive information when using public networks
Antivirus and anti-malware software
• Installing reputable antivirus and anti-malware software on devices helps detect and
prevent malware, viruses, and other malicious threats, safeguarding data and
systems from potential cyberattacks
Regular software updates
• Keeping software, operating systems, and applications up to date with the latest
security patches and updates is crucial to address vulnerabilities and protect against
potential security breaches

Privacy settings and permissions


• Being very careful of privacy settings on social media platforms and other online
services helps control the information shared and the visibility of personal data,
mitigating risks related to data exposure and privacy infringement

Data Backups
• Creating regular backups of important data ensures that information remains
accessible even in the event of a security breach or data loss, providing a reliable
means of recovery and minimizing potential damages
Data encryption
• Utilizing encryption methods for data transmission and storage adds an extra layer
of security, ensuring that sensitive information remains protected even if intercepted
by unauthorized parties
• Data encryption is a security method that translates data into a code, or ciphertext,
that can only be read by people with access to a secret key or password
Threats in the digital world: Data breach and Cyber attacks
• In the digital world, various threats pose risks to individuals, businesses, and
organizations, with data breaches and cyber attacks being among the most prevalent
and concerning
• Understanding these threats is essential for implementing effective security measures
and safeguarding sensitive information
Data Breaches
• Data breaches involve unauthorized access to sensitive information, resulting
in the exposure or theft of confidential data
• This may include personal information, financial data, or intellectual property
• Breaches can occur due to vulnerabilities in security systems, phishing attacks, or
malware infiltration, leading to the compromise of sensitive data and
potential financial or reputational damage
Phishing attacks
• Involve fraudulent attempts to obtain sensitive information, such as usernames,
passwords, or financial details, by disguising as a trustworthy entity in electronic
communication
• Phishing attacks often use deceptive emails, websites, or messages to trick
individuals into revealing confidential information or clicking on malicious links,
potentially leading to data breaches or identity theft
Malware and Ransomware
• Malware refers to malicious
softwares designed to disrupt,
damage, or gain unauthorized
access to computer systems
• Ransomware, a type of malware,
encrypts files or locks users out
of their systems until a ransom is
paid
• Malware and ransomware attacks
can lead to data loss, financial
losses, and system shutdown,
posing major threats to
individuals and businesses
Denial-of-Service (DoS) attacks
• DoS attacks aim to disrupt the normal functioning of a computer network or online
service by overwhelming it with a high volume of traffic or requests
• Such attacks can render websites or online services inaccessible, leading to
operational disruptions, financial losses, and reputational damage
Insider Threats
• Insider threats involve unauthorized or malicious actions by individuals within an
organizations, such as employees, contractors, or business partners, who exploit their
access to sensitive data or systems
• Insider threats can lead to data leaks, intellectual property theft, or other security
breaches that compromise the integrity and confidentiality of valuable information
Social engineering attacks
• Involve manipulating individuals into divulging sensitive information or performing
actions that may compromise security
• This can include techniques such as pretexting, baiting, often targeting human
vulnerabilities rather than technical weaknesses
Advanced Persistent Threats (APTs)
• APTs are prolonged and sophisticated cyber attacks orchestrated by skilled threat
actors to gain unauthorized access to networks, steal sensitive data, or monitor
activities over an extended period
• APTs often involve careful planning, persistent monitoring, and tailored strategies
to bypass security defences
Cryptojacking
• Cryptojacking involves unauthorized use of a target’s computing resources to
mine cryptocurrencies without their consent
Blockchain Technology
• Blockchain technology is like a digital ledger that stores information securely across
many computers
• It doesn't need a central authority to approve transactions, making it more secure
• All transactions are linked together and can't be changed, ensuring that records are
reliable and can be trusted
• This technology also allows for "smart contracts," which automatically enforce
agreed-upon terms, making processes more efficient
• It's the foundation for cryptocurrencies like Bitcoin, enabling secure online
transactions without needing a bank
• Blockchain is used in various fields like finance, supply chain management,
and healthcare to make recording and verifying information more secure and
transparent
Features
• Decentralization: Blockchain doesn't need a middleman to approve transactions,
making it more secure
• Security: It stores data securely using cryptography, making it hard to tamper with
• Transparency: Everyone can see the transactions, which helps build trust
• Immutability: Once something is recorded, it can't be changed, ensuring reliable
records
• Smart Contracts: These are agreements that execute automatically, making things
more efficient
• Cryptocurrency: It's the technology behind digital money like Bitcoin, allowing
secure transactions without banks
Security Initiatives by the Govt. of India
• The Government of India has launched various cyber security initiatives to enhance
the country's digital security infrastructure and safeguard against cyber threat
• These initiatives aim to strengthen cybersecurity frameworks, promote awareness
about cyber threats, and ensure a secure digital environment for individuals,
businesses, and government entities
National Cyber Security Policy
• The National Cyber Security Policy
outlines the government’s vision and
strategies to protect the country's
cyberspace, emphasizing the importance of
cybersecurity awareness, capacity
building, and coordination among various
stakeholders
• Example: The launch of the National
Cyber Security Policy in 2013 aimed to
outline a comprehensive framework for
addressing cybersecurity challenges,
promoting public-private partnerships, and
encouraging the adoption of best practices
in cybersecurity across various sectors
National Cyber Coordination Centre (NCCC)
• The NCCC serves as a monitoring and coordination centre for all cyber-related activities,
aiming to enhance the government’s capabilities in detecting, preventing, and responding
to cyber threats and incidents in real time

• Example: The NCCC’s real-time monitoring capabilities have enabled the government to
detect and respond to various cyber threats and incidents promptly

Indian Computer Emergency Response Team (CERT-In)


• CERT-In is the national nodal agency responsible for responding to and managing
cybersecurity incidents, providing early warning of cyber attacks, and promoting effective
security practices among government agencies, businesses, and the general public
• CERT-In has played a crucial role in providing incident response services and coordinating
with various stakeholders to address cybersecurity incidents
• It has issued advisories and alerts to raise awareness about emerging cyber threats and
vulnerabilities, ensuring a proactive approach to cybersecurity management
Cyber Swachhta Kendra
• The Cyber Swachhta Kendra initiatives aims to create a secure cyber ecosystem in
India by providing tools and guidelines for malware detection and removal,
promoting best practices for cybersecurity, and enhancing the resilience of digital
infrastructure against cyber threats
• Example: The Cyber Swachhta Kendra initiative has provided cybersecurity tools
and guidelines to users, enabling them to detect and remove malware from their
systems
• It has also conducted awareness campaigns and training sessions to educate users
about safe cyber practices and the importance of cybersecurity hygiene
Information Security Education and Awareness (ISEA) Project
• The ISEA Project focuses on promoting cybersecurity education, training, and
awareness among various user groups, including government officials students, and
industry professionals, to build a skilled workforce and enhance cybersecurity
readiness across different sectors
• Example: The ISEA Project has organized cybersecurity training programs for
government officials, students, and professionals to enhance their understanding of
cyber threats and preventive measures
• It has also conducted workshops and seminars to promote cybersecurity awareness
and best practices among various user groups
Digital India:
• Under the Digital India program, the government has implemented various
cybersecurity initiatives to promote the secure use of digital technologies, protect
critical information infrastructure, and ensure the privacy and data security of
citizens and businesses in the digital space
• Example: Under the Digital India program, various cybersecurity initiatives, such
as the implementation of secure digital payment systems, the promotion of digital
literacy, and the establishment of secure communication networks, have
contributed to creating a safer and more secure digital environment for citizens
and businesses across the country

You might also like