Skip to main content

Need of Cyber Security in 2021

 



As the internet wold is growing day by day, the need for cyber security is at its peak. So, in this blog, I will be discussing some pros and cons of technology and how cyber security is needed in 2021. My blog is inspired by the session of Mr. Dinesh O Bareja which was organized by World Cyber Security Forum.

Wanted a proper glimpse? Please check the complete session here.

To understand the need of cyber security in 2021 completely, we need to start from the beginning i.e., the timeline of various search engine platforms like World Wide Web (WWW) coming into existence in 1990, FTP and TCP/IP in 1973 etc.

By the year 1995, India officially started using internet in the country. 

In continuation, let’s bring our focus to the Evolution of technology. This particular topic can be very well understood in the reference to human beings.

  • In the 1960s – Let’s suppose we were babies and technology had a very little impact.
  •  In the 1970s – We were still children; Technology was then used for academics but had little impact.
  • In the 1980s-1990s – We were like in our teenage years; we had some control but didn’t know exactly what to do with it yet. 
  • In the 2000s – We were growing up. Technology had enabled a factor so that we can communicate across the globe. 
  •  In the 2010s – Welcome to adulthood! Technology has now become fully integrated into our day-to-day life.

Like everything in this universe, everything comes with its own advantages and disadvantages. So, in this case as well, threats arrive with the continued development of technology. 

From 1980-1990 to 2021 we have moved from unsophisticated attacks like script kiddies to sophisticated attacks which involve hackers to corporate espionage in which insiders play a major role and finally to one of the most devastating attacks that are targeted on State/ Country to breach & perform advanced persistent attacks to identify thefts.

It can be understood from the fact that in today’s world ransomware is also like in our mainstream and we fear and pray that it doesn’t hit us. 

Data breach investigation report also shows that most of the data breaches are caused due to unauthorized access and hacking in particular. Apart from this, there are many reasons that lead to this kind of data trespass like: Malware, Misuse, Human error etc.

After going through the advancement of technology and threats caused to it. We now focus on the Nature of threats.

We will be able to very well understand through the 4Fs.

  • Before 1990 - FUN – Technically curious individuals.
  • From 1991-2000 – FAME -Technically adapt groups leaving their mark on the public.
  • From 2001-2004 – FORTUNE – Cyber criminals forming organized gangs started stealing money, data ransom schemes, and competitive information.
  • Till 2010 – FORCE – Nation-state and non-nation state groups start to launch targeted attacks for strategic purposes.

Now, we arrive at the most important topic of this blog that has also somewhat affected us in a major way, it is none other than this pandemic itself. Threats in these times have come out to be very troublesome to the whole civilization.

ENISA which stands for European Network and Security agency in one of its most recent posts has talked about the “Top 15 threats in 2020”.

It talks about threats like Malware, Web-Based Attacks, Phishing, Web application attacks, Spam, DDOS, Identify theft, Data Breach, Insider threat, Botnets, Physical manipulation, damage, theft, Information leakage, Ransomware, Cyber espionage, Crypto-jacking.

The above attacks are the major threats not only in 2020 but will also be increasing with developing technology every year.

The latest report from Interpol shows the alarming rate of cyber-attacks during COVID-19. This report mainly talks about online scams and phishing, data harvesting malware, and misinformation. We need to be very well prepared for the ever-evolving and dynamic threat landscape. 

Every individual knows their own weaknesses better than anyone so we need to predict for ourselves, stay alert, and set up proactive barriers and controls. This is the least we could do.

 

                                                                                                       By: Shivank Mishra

                                                                                                       (Tech Intern, WCSF)

 

 

To stay connected, please visit: www.worldcybersecurities.com

To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel

 

 

Comments

  1. Cyber security is the Major consern as the technology developed. The use of commen sence can prevent Cyber crime in country.

    ReplyDelete
  2. Indeed cybersecurity has become one of the major concerns after the breakout of COVID -19 pandemic. Pandemic saw an exponential increase in the cybercrime rates. As stated in the blog, to avoid becoming a victim of cyberattack, the first step must be taken from individual's end itself to stay alert and employ proactive controls.

    ReplyDelete
  3. Cyber security professional should set their back up because there will high risk and major issues are coming infront of them. As everything are connect to digital or internet due to this pandemic.

    ReplyDelete
  4. Really informative and well researched blog

    ReplyDelete
  5. Indeed! Increasing cyber security is the need of the hour- every twenty-ninth-second witnesses a cyber attack.

    ReplyDelete
  6. A very important topic....... Which has been elaborated very categorically. Even the session was insightful.

    ReplyDelete
  7. Certainly it is very necessary to understand the current threats posed by data breached due to sudden proliferation of use of Technologies in this decade. Therefore, a proper mechanism in the form of Cyber laws can be considered as a need of hour.

    ReplyDelete
  8. Due to increasing cyber crimes and cyber threats and that too during this pandemic, there is definitely a huge need of cyber security.

    ReplyDelete
  9. Indeed cyber field is flourishing and spreading its wings at greater extent. We can analyze from the blog and session by Mr. Bareja that the journey of technology or cyber security was long and it improvised as per the needs and situation of the human beings. In future world, the cyber laws, spaces, provisions, rules will develop more rapidly and in a more effective manner.

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of employers to track

Need for Anti-Spam Laws in India: Comparative Analysis

  Introduction Spam is unsolicited, usually commercial messages (such as e-mails, text messages, or internet postings) sent to a large number of recipients or posted in a large number of places. The spamming activity is usually considered to cause a lot of nuisance and mental annoyance. Spamming is carried out with the help of an electronic mechanism to send unsolicited messages and advertisements. It can also be termed “An unsolicited e-mail” from which the sender attempts to gain an advantage. "India is the seventh biggest spammer in the world 7.8 billion spam e-mails sent in past 24 hours". It’s high time that India has to come up with its legislation to curb the activity.  The author will also argue the need for anti-spam legislation in India with a comparative analysis of various other jurisdictions. Why is it a concern? The term spam emerged due to the spread of unsolicited commercial messages in the internet space. The main challenge is that it has varied charact