Towards Safe and Secure Cyberspace
Towards Safe and Secure Cyberspace
Data Backups
• Creating regular backups of important data ensures that information remains
accessible even in the event of a security breach or data loss, providing a reliable
means of recovery and minimizing potential damages
Data encryption
• Utilizing encryption methods for data transmission and storage adds an extra layer
of security, ensuring that sensitive information remains protected even if intercepted
by unauthorized parties
• Data encryption is a security method that translates data into a code, or ciphertext,
that can only be read by people with access to a secret key or password
Threats in the digital world: Data breach and Cyber attacks
• In the digital world, various threats pose risks to individuals, businesses, and
organizations, with data breaches and cyber attacks being among the most prevalent
and concerning
• Understanding these threats is essential for implementing effective security measures
and safeguarding sensitive information
Data Breaches
• Data breaches involve unauthorized access to sensitive information, resulting
in the exposure or theft of confidential data
• This may include personal information, financial data, or intellectual property
• Breaches can occur due to vulnerabilities in security systems, phishing attacks, or
malware infiltration, leading to the compromise of sensitive data and
potential financial or reputational damage
Phishing attacks
• Involve fraudulent attempts to obtain sensitive information, such as usernames,
passwords, or financial details, by disguising as a trustworthy entity in electronic
communication
• Phishing attacks often use deceptive emails, websites, or messages to trick
individuals into revealing confidential information or clicking on malicious links,
potentially leading to data breaches or identity theft
Malware and Ransomware
• Malware refers to malicious
softwares designed to disrupt,
damage, or gain unauthorized
access to computer systems
• Ransomware, a type of malware,
encrypts files or locks users out
of their systems until a ransom is
paid
• Malware and ransomware attacks
can lead to data loss, financial
losses, and system shutdown,
posing major threats to
individuals and businesses
Denial-of-Service (DoS) attacks
• DoS attacks aim to disrupt the normal functioning of a computer network or online
service by overwhelming it with a high volume of traffic or requests
• Such attacks can render websites or online services inaccessible, leading to
operational disruptions, financial losses, and reputational damage
Insider Threats
• Insider threats involve unauthorized or malicious actions by individuals within an
organizations, such as employees, contractors, or business partners, who exploit their
access to sensitive data or systems
• Insider threats can lead to data leaks, intellectual property theft, or other security
breaches that compromise the integrity and confidentiality of valuable information
Social engineering attacks
• Involve manipulating individuals into divulging sensitive information or performing
actions that may compromise security
• This can include techniques such as pretexting, baiting, often targeting human
vulnerabilities rather than technical weaknesses
Advanced Persistent Threats (APTs)
• APTs are prolonged and sophisticated cyber attacks orchestrated by skilled threat
actors to gain unauthorized access to networks, steal sensitive data, or monitor
activities over an extended period
• APTs often involve careful planning, persistent monitoring, and tailored strategies
to bypass security defences
Cryptojacking
• Cryptojacking involves unauthorized use of a target’s computing resources to
mine cryptocurrencies without their consent
Blockchain Technology
• Blockchain technology is like a digital ledger that stores information securely across
many computers
• It doesn't need a central authority to approve transactions, making it more secure
• All transactions are linked together and can't be changed, ensuring that records are
reliable and can be trusted
• This technology also allows for "smart contracts," which automatically enforce
agreed-upon terms, making processes more efficient
• It's the foundation for cryptocurrencies like Bitcoin, enabling secure online
transactions without needing a bank
• Blockchain is used in various fields like finance, supply chain management,
and healthcare to make recording and verifying information more secure and
transparent
Features
• Decentralization: Blockchain doesn't need a middleman to approve transactions,
making it more secure
• Security: It stores data securely using cryptography, making it hard to tamper with
• Transparency: Everyone can see the transactions, which helps build trust
• Immutability: Once something is recorded, it can't be changed, ensuring reliable
records
• Smart Contracts: These are agreements that execute automatically, making things
more efficient
• Cryptocurrency: It's the technology behind digital money like Bitcoin, allowing
secure transactions without banks
Security Initiatives by the Govt. of India
• The Government of India has launched various cyber security initiatives to enhance
the country's digital security infrastructure and safeguard against cyber threat
• These initiatives aim to strengthen cybersecurity frameworks, promote awareness
about cyber threats, and ensure a secure digital environment for individuals,
businesses, and government entities
National Cyber Security Policy
• The National Cyber Security Policy
outlines the government’s vision and
strategies to protect the country's
cyberspace, emphasizing the importance of
cybersecurity awareness, capacity
building, and coordination among various
stakeholders
• Example: The launch of the National
Cyber Security Policy in 2013 aimed to
outline a comprehensive framework for
addressing cybersecurity challenges,
promoting public-private partnerships, and
encouraging the adoption of best practices
in cybersecurity across various sectors
National Cyber Coordination Centre (NCCC)
• The NCCC serves as a monitoring and coordination centre for all cyber-related activities,
aiming to enhance the government’s capabilities in detecting, preventing, and responding
to cyber threats and incidents in real time
• Example: The NCCC’s real-time monitoring capabilities have enabled the government to
detect and respond to various cyber threats and incidents promptly