Know your the Cybersecurity Challenge - Your Data, Network,
Cloud all need Strongest Protection

Know your the Cybersecurity Challenge - Your Data, Network,
Cloud all need Strongest Protection

Vigyan Pandey
Research Fellow and Adviser, IT, IISD
Head, IT Division Of IISD
Indian Institute Of Sustainable Development (IISD), New Delhi


The world is now more reliant on technology than ever before. The emergence and growth of technology has had a positive impact on human life, but convenience has, however, come with the risk of cyber attacks. If you use a tech device for whatever reason, then you're highly likely to be exposed to a cyber attack. You'll need to be protected, and that's where cyber security comes in.

The fast development of technology, such as fast broadband, better gadgets, and cloud computing, has led to an increase in the number of connected devices. According to some surveys, there'll be about 21.1 billion networked devices in the world in 2021. This, with the development of the dark web, has created a fertile ground for cybercrime activities. Cyber security can, nonetheless, minimize your exposure. The fact that almost everyone on this planet is now more reliant on information and communication technology means, for cybercriminals, that there's a booming criminal opportunity. Factors like the enhancement of cloud storage and social media growth have left many exposed to cyber attacks. This makes cyber security more important than ever.

Cybersecurity is very important today; because it protects all categories of data from theft and damage. This includes Sensitive Data, Personally Identifiable Information (PII), Protected Health Information (PHI), Personal Information, Intellectual Property, Data, and Governmental and Industry Information Systems.

Cybersecurity means protecting data, networks, programs and other information from unauthorized or unattended access, destruction or change. In today's world, cybersecurity is very important because of some security threats and cyber-attacks. For data protection, many companies develop software. For Data security, the most important elements are the Protection of the Data using Cryptographic Controls for Data at Rest and Data in Transit, effective Access Control system, and effective monitoring and logging of data access.

Cybersecurity is the protection of electronic data and information. It's the defense of electronic systems on devices, like computers, cell phones, servers, and networks, from malicious attacks. Regardless of who you are, it's important to keep your data safe from unauthorized access.

The risk dark web challenge
The growth and development of technology haven't left the dark web behind. The dark web is a secret collaboration of Internet sites, and which is only accessible through specialized web browsers. It's mainly used for hiding Internet activities and keeping users anonymous and private. The dark web can be utilized legally, but it has also been known for being the host of numerous illegal operations. Crimes, like drug and human trafficking, illegal weapons distribution, software distribution, illegal auctions, piracy, and many more unlawful activities, including the unthinkable, have been known to use the dark web. As technology has developed, so has the dark web strengthened its sophistication. It has provided a haven for cybercriminals and resulted in an increased threat on surface Internet use. These vulnerabilities have heightened the significance of cyber security.

Types of cyber security threats
There are dozens of types of cyber security threats, but the following are some of the most common ones:

DDoS Attack
A DDoS or Distributed Denial of Service Attack is when cybercriminals overwhelm a network or its servers by sending too much traffic. This prevents the network from handling valid requests and makes the entire system unusable. It can completely stop organizations

Malware
This malicious software can include computer viruses, spyware, Trojan horses, worms, and any other program or file that can harm the computer. Malware is commonly spread by downloads that seem legitimate or attachments in emails.

Types of Malware Cybersecurity threats:
- Adware is advertising software that spreads malware.
- Botnets are numerous computers infected with malware that form a network. Cybercriminals use them to perform online tasks without the permission of the devices' owners.
- Ransomware will lock data and files and threaten to leave the files locked or delete them unless the victim sends payment.
- Spyware records the actions of a user, such as gathering credit card information.
- Trojans are malware but disguised to appear as legitimate software. After being uploaded, they collect data or cause damage
- Viruses are self-replicating. They attach themselves to a file, then spread through the computer's system.

Man-in-the-Middle Attack
- This type of attack involves the cybercriminal intercepting conversations or data transmissions between multiple people. An example would be a cyber attack using an unsecured Wi-Fi network to intercept the data that the victim sends from their computer to the network.

Phishing
This type of cyber security threat involves sending fake emails from seemingly legitimate sources to get information such as credit card details or passwords.

Social Engineering
This type of attack tricks users to break security procedures by using human interactions. Cybercriminals commonly combine social engineering attacks with others, such as phishing, to increase the chances of the victim clicking on a link or downloading a file.

SQL Injection
SQL stands for Structured Query Language. A SQL injection aims to perform actions on data in a database and potentially steal it. It involves inserting malicious code via SQL statements, taking advantage of data-driven applications' vulnerabilities.

On top of all the other challenges, there is currently a shortage in the field of cyber security. Some estimates indicate that there are as many as two million cyber security jobs around the world that are not filled. This challenge is somewhat overcome by machine learning and other technological advances, but it is still an obstacle.

Cybersecurity is important because it protects you or your data from potential cyber threats. The advancement of technology has left many people vulnerable to cybercriminal activities, such as hacking, data theft and damage, and industrial espionage. Cybercrime rate is increasing; hence, without cyber security, you could lose sensitive information, money, or reputation. Cyber security is one of the most important aspects of the fast-paced growing digital world. It is as important as the need for technology. The threats of it are hard to deny, so it is crucial to learn how to defend from them and teach others how to do it too.


Shri Vigyan Pandey is a Research Fellow and Adviser, who heads IT Division at Indian Institute Of Sustainable Development (IISD), New Delhi




  Advantages of Cybersecurity

- Protects systems against viruses, worms, spyware, Trojans Malware and other.
- Protection against data from theft.
- Protects the computer from being hacked.
- Minimizes computer freezing and crashes.
- Gives privacy to users.



  Types of Cybersecurity

- Cloud Security
- Network Security
- Application Security
- Endpoint Security
- Identity management
- Infrastructure Security
- Database Security
- Mobile security and
- Operational Security