(GIST OF YOJANA) Cyber security: Issues and Challenges
Cyber security: Issues and Challenges
- The world we live in is highly connected and digitally exhaustive. Of
the 7.6 billion humans on earth, around 3.6 billion are online.
- Today, social networks have become one of the main communication
channels. Within relatively short time social media has empowered people and
connected them. But, at the same time, they have also provided platforms for
some decidedly unhealthy and destructive behavior. Social media platforms
have become just one of the endless data channels that cybercriminals are
- Bots and fake followers are a big concern in the social media
environment. Bot programs target specific hash tags and work by auto
commenting and auto-liking in order to attract followers who are mostly
other fake bot accounts. These are automated systems which can on their own
get engaged with other users without any active presence.
- Developed primarily for companies to engage with their users
automatically for increasing customer engagement, bols are now being used
much beyond their harmless cause and are misused for manipulating a
conversation to creating a mirage of someone’s personality and much more.
- Terrorists have always sought attention and that is what they receive
from social media. Whenever there is any terror attack, as a response to the
horrific events, people share images and videos of the devastating attack on
social media. Social media thus spread the horror far and wide and
unknowingly amplify the chaos that the terrorists intend to spread. In the
process, misinformation and fear spread. It further traumatisms the families
of the victims and also the public at large.
- Extremists use social media to make an impact. They even use it to
recruit, propagate and to connect. Moreover, they rely on the regular social
media users to spread the impact of terror further to a greater degree than
what they themselves could have done in addition to confusing authorities
- Misinformation, the rapid spread of false information through social
media is among the emerging risks identified in Global Risks Report. Fake
news and rumours spread like wildfire in the social media and it is also
increasingly used for militancy.
- Social media sites have now initiated reporting procedures that allow
users to flag any kind of content that supports terrorism which can be then
removed. Also, the social networking sites today are playing an important
role in counter terrorism operations. The law enforcement authorities make
good use of social media by keeping people informed regularly. For example,
Assam State Police opened a cell to monitor social media and keep track of
the spread of rumours.
- Accelerator, microphone, camera, location, contacts, gyroscope (for
orientation), heart rate, proximity, light, temperature, pressure, barometer
(for altitude) are some of the information that are collected from your
phone. All the apps that you use let your Smartphone know who you are, where
you are, where you have been, who you know, where the people you currently
are, what you bought, where you bought, what you ate, whether you went and
even your current mood.
- A popular third-party app recently disclosed a data breach that
compromised all of its 4.7 million users’ email addresses and phone numbers.
This data can be used to execute large-scale phishing attacks meant to
compromise a company’s network and systems.
- Internet of Things (IoTs) is another such challenge posed by the new
technology whereby every object we use is equipped with the capabilities to
identify, locate, sense its surroundings, compute and communicate. Now what
will happen if all these objects could talk to each other and share
information? It is said that soon there will be one billion IoT devices and
they will all be talking to each other. Imagine what a rich attack surface
it is going to give the hacker and the number of attacks that can happen
with IoT devices.
- This ransom demanding malware is a virus which gets into your computer,
either when you download an attachment containing the virus or when you
visit any such website and click on a link. Once it gets into your computer,
it starts to encrypt all your files thereby rendering them useless.
- The only way to unlock your files is to get a secret key from the hacker
by paying a ransom. And this ransom is usually demanded through bit coin
which keeps the payee anonymous. There has been a 600% increase in ransom
ware variants since 2016. Major universities, hospitals, businesses and even
individuals have been target of such attacks.
- We are actually living in exponential data times. In just 60 seconds
149,513 emails can be sent, 3.3 million FB posts can be made, 3.8 million
Google searches can be performed, 500 hours of YouTube videos can be
uploaded. 29 million Whats app messages can be sent and 448,800 Tweets can
be made and millions of other online activities can be performed leaving
incredibly large digital footprint.
- Unfortunately, humans are the weakest link in the cyber security chain.
Amateurs hack systems but professionals hack people. It is way easier to con
people using social engineering techniques and make them reveal information
rather than using tools and technology.
- The weakest link happens to be our password with which social accounts,
mail accounts and millions of bank accounts have been hacked. An analysis of
32 million breached accounts has revealed that people most often use
- While all these make cyberspace a huge threat in the socio-economic
environment of the present times, it has become imperative to create
awareness in the use of digital platforms through digital literacy. Digital
literacy is an essential requirement for safe and secure use of digital
resources which can contribute to efficiently tackle cyberspace.
Protection against Cyber Attacks:
- As the channels and networks for data sharing continue to evolve and
grow, so do the risks. For securing information on the social networking
sites, following guidelines can be followed:
- Limit the amount of information that you disclose on the social
- Do not establish friendship with strangers;
- Do not believe online information blindly as it can be misleading;
- Customize your system settings according to your needs by changing the
default settings. Learn how to use privacy settings on your social profiles
- Beware of third-party applications. Avoid applications that seem
suspicious, and make sure to modify your settings to limit the amount of
information which the applications can access;
- Secure your system, because unsecured network can lead to loss of your
- Use antivirus software to secure your computers and electronic devices;
- Use strong passwords to protect your account and personal information.
Change your passwords frequently;
- Do not set the same password for all social accounts, because if one
site’s password is compromised, all other accounts will be exposed to
- Choose a suitable authentication scheme so that no one can access the
details. Two-factor and multi-factor authentication should be in place. In
two factor authentication along with username and password, another form of
identification, often a security code in the form of a "Captcha”, is used.
In multi-factor authentication, more than in one form of authentication to
verify an identity is used. Some examples are facial recognition, iris
recognition, voice ID and finger scanning. Today’s digital world
necessitates people to know the network security implications and spot
suspicious activities. Over sharing helps hackers steal PII and sell it to
the dark web.
- Digital literacy is a broader concept that consists of developing new
skills and knowledge which provides awareness and advanced level thinking
skills. It is extremely essential to be digitally literate for appropriate
utilizations of digital information resources.
- Therefore, it is the responsibility of each one of us to understand and
help others to understand and use cyberspace sensibly and responsibly. This
will definitely ensure that the netizens are not only techno-sawy and
socially existent but also digitally safe.