• Kaushal Patel

Cyber Security ?

What is Cyber Security ?

Introduction


Clause 2(b) of IT Act, 2000

Cyber security is defined as protecting information, devices , equipment, computer resources and information stored in them from unauthorized access , use , disclosure, disruption, modification or destruction.


  • Nowadays ,  all the important departments are connected through internet. Hence, there are rising threats to cyber security through cyber crimes ,cyber attacks and cyber war.

  • The architecture of the Internet was designed to promote connectivity, not security. Cyber experts warn that the more technologically advanced and wired a nation is, the more vulnerable it is to a cyber-attack.

  • After land, sea, air and space, cyberspace has been officially declared as the 5th dimension of warfare.

What is Cyber Attack ?
  • Attack from one computer to another to alter, disrupt, deny, degrade or destroy the data hosted on the attacked system or network.

  • Mostly done using malicious code of computer languages or the language which are understand by the systems or devices works on internet.

What is Cyber Crime ?
  • There is no fixed definition of cyber crime. It refers to all the criminal activities done using medium of computers, internet and cyber space.

  • Generally, it can be divided into two categories,

1. Crimes that target computer and devices directly.

E.g. : Hacking, Computer viruses , Data theft,

Denial of Service(DoS) attack etc.

2. Crimes facilitated by computer networks .

E.g. : Phishing, Spam, Offensive Content,

Cyber Stalking etc...

  • The most prominent form of Cyber crime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and social engineering.

  • Cyber Crime (is a broader term) = Cyber Attacks + Cyber Terrorism+ Cyber Warfare.


What is Cyber Terrorism ?
  • It is the disruptive activities or threat by clandestine groups in cyber space with the intention to further the political objectives or intimidate any person or group. It has clear political objectives . Terrorists induce fear by indulging in large scale disruption of computer systems and networks. This can also be called as the traditional way of defining cyber terrorism.

  • If one tries to look beyond the traditional definition of cyber terrorism, it even leads to violence. E.g. : the rumor that led to the mass exodus of North-Eastern people from Bangalore in 2012 .

  • It also refers to the use of cyber space as a back-end support to the traditional forms of terrorism.

  • Some incidents of cyber terrorism in India

1. Muzzafarnagar riots.

2. Creating misinformation about certain things.


What is Cyber Warfare ?
  • Cyber warfare is Internet-based conflict involving politically motivated attacks on information and information systems

  • Cyber warfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems among many other possibilities

  • Any country can wage Cyber-war on any other country, irrespective of resources, because most military forces are Network-Centric and connected to the Internet, which is not secure. For the same reason, Non-Governmental Groups and Individuals could also launch cyber-warfare attacks.


Examples:

  • Stuxnet in 2010 in which Iranian Nuclear Plant were attacked by US and Israel.

  • In 1998, the United States hacked into Serbia’s Air Defense System to compromise air traffic control and facilitate the bombing of Serbian targets.

  • in 2007, an unknown foreign party hacked into high tech and military agencies in the United States and downloaded terabytes of information.

  • In 2012, large-scale cyber attacks targeted at the Iranian government were uncovered, and in return, Iran is believed to have launched massive attacks aimed at U.S. banks and Saudi oil companies.

What is Cyber Espionage ?
  • Cyber Espionage, is the act or practice of obtaining secrets without the permission of the holder of the information, from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through malicious software including Trojan Horses and Spyware.

  • These acts are between state nations, but they may include non-state actors too.

What is Crypto Jacking ?
  • Cryptojacking is process in which unauthorized Crypto-Coin miners siphon the resources of personal computers to mine crypto currencies like Bitcoin without the knowledge of owner.

  • According to latest Symantec Report, this is the latest major threat in cyber security.

  • Twitter
  • Facebook
  • LinkedIn

This blog is for those who are beginner in Cyber Security . ​Please Subscribe for more update

© 2021 by CyberMetrix