Skip to main content

Need of Cyber Security in 2021

 



As the internet wold is growing day by day, the need for cyber security is at its peak. So, in this blog, I will be discussing some pros and cons of technology and how cyber security is needed in 2021. My blog is inspired by the session of Mr. Dinesh O Bareja which was organized by World Cyber Security Forum.

Wanted a proper glimpse? Please check the complete session here.

To understand the need of cyber security in 2021 completely, we need to start from the beginning i.e., the timeline of various search engine platforms like World Wide Web (WWW) coming into existence in 1990, FTP and TCP/IP in 1973 etc.

By the year 1995, India officially started using internet in the country. 

In continuation, let’s bring our focus to the Evolution of technology. This particular topic can be very well understood in the reference to human beings.

  • In the 1960s – Let’s suppose we were babies and technology had a very little impact.
  •  In the 1970s – We were still children; Technology was then used for academics but had little impact.
  • In the 1980s-1990s – We were like in our teenage years; we had some control but didn’t know exactly what to do with it yet. 
  • In the 2000s – We were growing up. Technology had enabled a factor so that we can communicate across the globe. 
  •  In the 2010s – Welcome to adulthood! Technology has now become fully integrated into our day-to-day life.

Like everything in this universe, everything comes with its own advantages and disadvantages. So, in this case as well, threats arrive with the continued development of technology. 

From 1980-1990 to 2021 we have moved from unsophisticated attacks like script kiddies to sophisticated attacks which involve hackers to corporate espionage in which insiders play a major role and finally to one of the most devastating attacks that are targeted on State/ Country to breach & perform advanced persistent attacks to identify thefts.

It can be understood from the fact that in today’s world ransomware is also like in our mainstream and we fear and pray that it doesn’t hit us. 

Data breach investigation report also shows that most of the data breaches are caused due to unauthorized access and hacking in particular. Apart from this, there are many reasons that lead to this kind of data trespass like: Malware, Misuse, Human error etc.

After going through the advancement of technology and threats caused to it. We now focus on the Nature of threats.

We will be able to very well understand through the 4Fs.

  • Before 1990 - FUN – Technically curious individuals.
  • From 1991-2000 – FAME -Technically adapt groups leaving their mark on the public.
  • From 2001-2004 – FORTUNE – Cyber criminals forming organized gangs started stealing money, data ransom schemes, and competitive information.
  • Till 2010 – FORCE – Nation-state and non-nation state groups start to launch targeted attacks for strategic purposes.

Now, we arrive at the most important topic of this blog that has also somewhat affected us in a major way, it is none other than this pandemic itself. Threats in these times have come out to be very troublesome to the whole civilization.

ENISA which stands for European Network and Security agency in one of its most recent posts has talked about the “Top 15 threats in 2020”.

It talks about threats like Malware, Web-Based Attacks, Phishing, Web application attacks, Spam, DDOS, Identify theft, Data Breach, Insider threat, Botnets, Physical manipulation, damage, theft, Information leakage, Ransomware, Cyber espionage, Crypto-jacking.

The above attacks are the major threats not only in 2020 but will also be increasing with developing technology every year.

The latest report from Interpol shows the alarming rate of cyber-attacks during COVID-19. This report mainly talks about online scams and phishing, data harvesting malware, and misinformation. We need to be very well prepared for the ever-evolving and dynamic threat landscape. 

Every individual knows their own weaknesses better than anyone so we need to predict for ourselves, stay alert, and set up proactive barriers and controls. This is the least we could do.

 

                                                                                                       By: Shivank Mishra

                                                                                                       (Tech Intern, WCSF)

 

 

To stay connected, please visit: www.worldcybersecurities.com

To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel

 

 

Comments

  1. Cyber security is the Major consern as the technology developed. The use of commen sence can prevent Cyber crime in country.

    ReplyDelete
  2. Indeed cybersecurity has become one of the major concerns after the breakout of COVID -19 pandemic. Pandemic saw an exponential increase in the cybercrime rates. As stated in the blog, to avoid becoming a victim of cyberattack, the first step must be taken from individual's end itself to stay alert and employ proactive controls.

    ReplyDelete
  3. Cyber security professional should set their back up because there will high risk and major issues are coming infront of them. As everything are connect to digital or internet due to this pandemic.

    ReplyDelete
  4. Really informative and well researched blog

    ReplyDelete
  5. Indeed! Increasing cyber security is the need of the hour- every twenty-ninth-second witnesses a cyber attack.

    ReplyDelete
  6. A very important topic....... Which has been elaborated very categorically. Even the session was insightful.

    ReplyDelete
  7. Certainly it is very necessary to understand the current threats posed by data breached due to sudden proliferation of use of Technologies in this decade. Therefore, a proper mechanism in the form of Cyber laws can be considered as a need of hour.

    ReplyDelete
  8. Due to increasing cyber crimes and cyber threats and that too during this pandemic, there is definitely a huge need of cyber security.

    ReplyDelete
  9. Indeed cyber field is flourishing and spreading its wings at greater extent. We can analyze from the blog and session by Mr. Bareja that the journey of technology or cyber security was long and it improvised as per the needs and situation of the human beings. In future world, the cyber laws, spaces, provisions, rules will develop more rapidly and in a more effective manner.

    ReplyDelete

Post a Comment

Popular posts from this blog

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

Famous Cyber crimes That Targeted People Instead Of Money

  With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people.  The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below: Bulli Bai App - This app was created over the platform namely GitHub which is an open software develop...

New Privacy Policy of Twitter

  Twitter is one of the most commonly used social media networking platforms and is very popular amongst celebrities as well. People enjoy uploading tweets and retweets over Twitter. It is a good platform for social messaging, news and marketing, etc. But recently twitter has been in the news for a change in its privacy policy. Just a few weeks after the announcement that Elon Musk was going to acquire that social media platform, Twitter had revamped its privacy policy. Everyone was expecting something big after that announcement and many were curious to know if there will be any changes in that micro-blogging platform. Later on, Twitter introduced the privacy policy to their users by creating a video guide for users so that they can understand the privacy policy. Also, Twitter has said that its new privacy policy is much more simplified and organized under three new heads namely data use, data sharing, and data collection. The new version of twitter’s privacy policy will take effe...