Skip to main content

Need of Cyber Security in 2021

 



As the internet wold is growing day by day, the need for cyber security is at its peak. So, in this blog, I will be discussing some pros and cons of technology and how cyber security is needed in 2021. My blog is inspired by the session of Mr. Dinesh O Bareja which was organized by World Cyber Security Forum.

Wanted a proper glimpse? Please check the complete session here.

To understand the need of cyber security in 2021 completely, we need to start from the beginning i.e., the timeline of various search engine platforms like World Wide Web (WWW) coming into existence in 1990, FTP and TCP/IP in 1973 etc.

By the year 1995, India officially started using internet in the country. 

In continuation, let’s bring our focus to the Evolution of technology. This particular topic can be very well understood in the reference to human beings.

  • In the 1960s – Let’s suppose we were babies and technology had a very little impact.
  •  In the 1970s – We were still children; Technology was then used for academics but had little impact.
  • In the 1980s-1990s – We were like in our teenage years; we had some control but didn’t know exactly what to do with it yet. 
  • In the 2000s – We were growing up. Technology had enabled a factor so that we can communicate across the globe. 
  •  In the 2010s – Welcome to adulthood! Technology has now become fully integrated into our day-to-day life.

Like everything in this universe, everything comes with its own advantages and disadvantages. So, in this case as well, threats arrive with the continued development of technology. 

From 1980-1990 to 2021 we have moved from unsophisticated attacks like script kiddies to sophisticated attacks which involve hackers to corporate espionage in which insiders play a major role and finally to one of the most devastating attacks that are targeted on State/ Country to breach & perform advanced persistent attacks to identify thefts.

It can be understood from the fact that in today’s world ransomware is also like in our mainstream and we fear and pray that it doesn’t hit us. 

Data breach investigation report also shows that most of the data breaches are caused due to unauthorized access and hacking in particular. Apart from this, there are many reasons that lead to this kind of data trespass like: Malware, Misuse, Human error etc.

After going through the advancement of technology and threats caused to it. We now focus on the Nature of threats.

We will be able to very well understand through the 4Fs.

  • Before 1990 - FUN – Technically curious individuals.
  • From 1991-2000 – FAME -Technically adapt groups leaving their mark on the public.
  • From 2001-2004 – FORTUNE – Cyber criminals forming organized gangs started stealing money, data ransom schemes, and competitive information.
  • Till 2010 – FORCE – Nation-state and non-nation state groups start to launch targeted attacks for strategic purposes.

Now, we arrive at the most important topic of this blog that has also somewhat affected us in a major way, it is none other than this pandemic itself. Threats in these times have come out to be very troublesome to the whole civilization.

ENISA which stands for European Network and Security agency in one of its most recent posts has talked about the “Top 15 threats in 2020”.

It talks about threats like Malware, Web-Based Attacks, Phishing, Web application attacks, Spam, DDOS, Identify theft, Data Breach, Insider threat, Botnets, Physical manipulation, damage, theft, Information leakage, Ransomware, Cyber espionage, Crypto-jacking.

The above attacks are the major threats not only in 2020 but will also be increasing with developing technology every year.

The latest report from Interpol shows the alarming rate of cyber-attacks during COVID-19. This report mainly talks about online scams and phishing, data harvesting malware, and misinformation. We need to be very well prepared for the ever-evolving and dynamic threat landscape. 

Every individual knows their own weaknesses better than anyone so we need to predict for ourselves, stay alert, and set up proactive barriers and controls. This is the least we could do.

 

                                                                                                       By: Shivank Mishra

                                                                                                       (Tech Intern, WCSF)

 

 

To stay connected, please visit: www.worldcybersecurities.com

To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel

 

 

Comments

  1. Cyber security is the Major consern as the technology developed. The use of commen sence can prevent Cyber crime in country.

    ReplyDelete
  2. Indeed cybersecurity has become one of the major concerns after the breakout of COVID -19 pandemic. Pandemic saw an exponential increase in the cybercrime rates. As stated in the blog, to avoid becoming a victim of cyberattack, the first step must be taken from individual's end itself to stay alert and employ proactive controls.

    ReplyDelete
  3. Cyber security professional should set their back up because there will high risk and major issues are coming infront of them. As everything are connect to digital or internet due to this pandemic.

    ReplyDelete
  4. Really informative and well researched blog

    ReplyDelete
  5. Indeed! Increasing cyber security is the need of the hour- every twenty-ninth-second witnesses a cyber attack.

    ReplyDelete
  6. A very important topic....... Which has been elaborated very categorically. Even the session was insightful.

    ReplyDelete
  7. Certainly it is very necessary to understand the current threats posed by data breached due to sudden proliferation of use of Technologies in this decade. Therefore, a proper mechanism in the form of Cyber laws can be considered as a need of hour.

    ReplyDelete
  8. Due to increasing cyber crimes and cyber threats and that too during this pandemic, there is definitely a huge need of cyber security.

    ReplyDelete
  9. Indeed cyber field is flourishing and spreading its wings at greater extent. We can analyze from the blog and session by Mr. Bareja that the journey of technology or cyber security was long and it improvised as per the needs and situation of the human beings. In future world, the cyber laws, spaces, provisions, rules will develop more rapidly and in a more effective manner.

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa...

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

India's Cybersecurity Landscape: New Rules, Rising Threats, and Government Response

The recent interaction of the newly reappointed Union IT Minister with journalists has sparked significant interest within the IT Industry and among privacy enthusiasts. Ashwini Vaishnaw announced on June 15 that the MEITY will soon release the rules under the Digital Personal Data Protection (DPDP) Act, a development of immense significance for India's cybersecurity landscape. [1] 's Acts. It holds immense significance for the country, especially with the increasing number of internet users.  Of 2023 for public consultation. The rules hold immense significance for a country like India, with 751.5 million internet users at the commencement of 2024 [2] . With the continuous surge in internet usage across India, the volume of personal data shared online is also on the rise. This occurs either voluntarily, such as an individual providing personal information to a social media platform to access its services, or involuntarily, as a consequence of falling victim to a cybercrime inci...