{"id":6666,"date":"2020-02-28T12:54:43","date_gmt":"2020-02-28T07:24:43","guid":{"rendered":"https:\/\/triumphias.com\/blog\/?p=6666"},"modified":"2020-02-28T12:54:43","modified_gmt":"2020-02-28T07:24:43","slug":"yojana-summary-issues-and-challenges-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/triumphias.com\/blog\/yojana-summary-issues-and-challenges-in-cybersecurity\/","title":{"rendered":"Yojana Summary: Issues and challenges in Cybersecurity"},"content":{"rendered":"<p><span style=\"color: #0000ff;\"><strong>Relevance: G.S paper III: Cybersecurity; Essay; &amp; sociology Paper II: visions of Social changes in India<\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Introduction:<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6668\" src=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity.jpg\" alt=\"\" width=\"960\" height=\"720\" srcset=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity.jpg 960w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-150x113.jpg 150w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-300x225.jpg 300w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-768x576.jpg 768w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cybersecurity-880x660.jpg 880w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/p>\n<ul>\n<li>The world we live in is highly connected and digitally exhaustive. Of the 7.6 billion humans on earth, around 3.6 billion are online.<br \/>\n\u2022 Today, social networks have become one of the main communication channels. Within relatively short time social media has empowered people and connected them. But, at the same time, they have also provided platforms for some decidedly unhealthy and destructive behaviour. Social media platforms have become just one of the endless data channels that cybercriminals are exploiting.<\/li>\n<\/ul>\n<p><span style=\"color: #ff0000;\"><strong>Bots:<\/strong><\/span><\/p>\n<ul>\n<li>Bots and fake followers are a big concern in the social media environment. <strong>Bot programs target specific hashtags and work by autocommenting and auto-liking in order to attract followers who are mostly other fake bot accounts.<\/strong> These are automated systems which can on their own get engaged with other users without any active presence.<br \/>\n\u2022 Developed primarily for companies to engage with their users automatically for increasing customer engagement, bols are now being used much beyond their harmless cause and are misused for manipulating a conversation to creating a mirage of someone\u2019s personality and much more.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-6667\" src=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-1024x514.jpg\" alt=\"\" width=\"810\" height=\"407\" srcset=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-1024x514.jpg 1024w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-150x75.jpg 150w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-300x151.jpg 300w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-768x386.jpg 768w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/cyber.jpg 1209w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/a><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Terrorist Attacks:<\/strong><\/span><\/p>\n<ul>\n<li>Terrorists have always sought attention and that is what they receive from the social media. Whenever there is any terror attack, as a response to the horrific events, people share images and videos of the devastating attack on social media. Social media thus spread the horror far and wide and unknowingly amplify the chaos that the terrorists intend to spread. In the process, misinformation and fear spread. It further traumatises the families of the victims and also the public at large.<br \/>\n\u2022 Extremists use the social media to make an impact. They even use it to recruit, propagate and to connect. Moreover, they rely on the regular social media users to spread the impact of terror further to a greater degree than what they themselves could have done in addition to confusing authorities with misinformation.<br \/>\n\u2022 Misinformation, the rapid spread of false information through social media is among the emerging risks identified in <strong>Global Risks Report.<\/strong> Fake news and rumours spread like wildfire in the social media and it is also increasingly used for militancy.<br \/>\n\u2022 Social media sites have now initiated reporting procedures that allow users to flag any kind of content that supports terrorism which can be then removed. Also, the social networking sites today are playing an important role in counter terrorism operations. The law enforcement authorities make good use oftlic social media by keeping people informed regularly. <strong>For example, Assam State Police opened a cell to monitor social media and keep track of the spread of rumours.<\/strong><\/li>\n<\/ul>\n<p><span style=\"color: #ff0000;\"><strong>Mobile Technologies:<\/strong><\/span><\/p>\n<ul>\n<li>Accelerometer, microphone, camera, location, contacts, gyroscope (for orientation), heart rate, proximity, light, temperature, pressure, barometer (for altitude) are some of the information that are collected from your phone. All the apps that you use let your smartphone know who you are, where you are, where you have been, who you know, where the people you now currently are, what you bought, where you bought, what you ate, whether you went and even your current mood.<br \/>\n\u2022 A popular third-party app recently disclosed a data breach that compromised all of its 4.7 million users\u2019 email addresses and phone numbers. This data can be used to execute large-scale phishing attacks meant to compromise a company\u2019s network and systems.<br \/>\n\u2022 Internet of Things (IoTs) is another such challenge posed by the new technology whereby every object we use is equipped with the capabilities to identify, locate, sense its surroundings, compute and communicate. <strong>Now what will happen if all these objects could talk to each other and share information?<\/strong> It is said that soon there will be one billion IoT devices and they will all be talking to each other. Imagine what a rich attack surface it is going to give the hacker and the number of attacks that can happen with IoT devices.<\/li>\n<\/ul>\n<p><span style=\"color: #ff0000;\"><strong>Ransomware<\/strong><\/span><\/p>\n<ul>\n<li>This ransom demanding malware is a virus which gets into your computer, either when you download an attachment containing the virus or when you visit any such website and click on a link. Once it gets into your computer, it starts to encrypt all your files thereby rendering them useless.<br \/>\n\u2022 The only way to unlock your files is to get a secret key from the hacker by paying a ransom. And this ransom is usually demanded through bitcoin which keeps the payee anonymous. There has been a 600% increase in ransomware variants since 2016. Major universities, hospitals, businesses and even individuals have been target of such attacks.<\/li>\n<\/ul>\n<p><span style=\"color: #ff0000;\"><strong>Big Data:<\/strong><\/span><\/p>\n<ul>\n<li>We are actually living in exponential data times. In just 60 seconds 149,513 emails can be sent, 3.3 million FB posts can be made, 3.8 million Google searches can be performed, 500 hours of YouTube videos can be uploaded. 29 million WhatsApp messages can be sent and 448,800 Tweets can bo made and millions of other online activities can be performed leaving incredibly large digital footprint.<br \/>\n\u2022 Unfortunately, humans are the weakest link in cyber security chain. Amateurs hack systems but professionals hack people. It is way easier to con people using social engineering techniques and make them reveal information rather than using tools and technology.<br \/>\n\u2022 The weakest link happens to be our password with which social accounts, mail accounts and millions of bank accounts have been hacked. An analysis of 32 million breached accounts has revealed that people most often use insecure passwords.<br \/>\n\u2022 While all these makes the cyberspace a huge threat in the socio-economic environment of the present times, it has become imperative to create awareness in the use of digital platforms through digital literacy. Digital literacy is an essential requirement for safe and secured use of digital resources which can contribute to efficiently tackle the cyberspace.<\/li>\n<\/ul>\n<p><span style=\"color: #ff0000;\"><strong>Protection against Cyber Attacks:<\/strong><\/span><\/p>\n<p>As the channels and networks for data sharing continue to evolve and grow, so do the risks. For securing information on the social networking sites, following guidelines can be followed:<br \/>\n\u2022 Limit the amount of information that you disclose on the social networking sites;<br \/>\n\u2022<strong> Do not establish friendship with strangers;<\/strong><br \/>\n\u2022 Do not believe online information blindly as it can be misleading;<br \/>\n\u2022 Customise your system settings according to your needs by changing the default settings. Learn how to use privacy settings on your social profiles properly;<br \/>\n\u2022 Beware of third-party applications. Avoid applications that seem suspicious, and make sure to modify your settings to limit the amount of information which the applications can access;<br \/>\n\u2022 Secure your system, because unsecured network can lead to loss of your personal data;<br \/>\n\u2022 Use antivirus software to secure your computers and electronic devices;<br \/>\n\u2022 Use strong passwords to protect your account and personal information. Change your passwords frequently;<br \/>\n\u2022 Do not set the same password for all social accounts, because if one site\u2019s password is compromised, all other accounts will be exposed to threats;<br \/>\n\u2022 Choose suitable authentication scheme so that no one can access the details. Two-factor and multi-factor authentication should be in place. In two factor authentication along with username and password, another form of identification, often a security code in the form of a \u201cCaptcha\u201d, is used. In multi-factor authentication, more than, in one form of authentication to verify an identity is used. Some examples are facial recognition, iris recognition, voice ID and finger scanning.<br \/>\nToday\u2019s digital world necessitates people to know the network security implications and spot suspicious activities. Oversharing helps hackers steal PII and sell it to the dark web.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>Conclusion:<\/strong><\/span><\/p>\n<ul>\n<li>Digital literacy is a broader concept that consists of developing new skills and knowledge which provides awareness and advanced level thinking skills. It is extremely essential to be digitally literate for appropriate utilisation of digital information resources.<br \/>\n\u2022 Therefore, it is the responsibility of each one of us to understand and help others to understand and use the cyberspace sensibly and responsibly. This will definitely ensure that the netizens are not only techno-sawy and socially existent but also digitally safe.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/Cybersecurity-vs-Cyber-Resilience.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6669\" src=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/Cybersecurity-vs-Cyber-Resilience.png\" alt=\"\" width=\"900\" height=\"300\" srcset=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/Cybersecurity-vs-Cyber-Resilience.png 900w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/Cybersecurity-vs-Cyber-Resilience-150x50.png 150w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/Cybersecurity-vs-Cyber-Resilience-300x100.png 300w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2020\/02\/Cybersecurity-vs-Cyber-Resilience-768x256.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p><span style=\"color: #0000ff;\"><strong>For more such notes, Articles, News &amp; Views Join our Telegram Channel.<\/strong><\/span><\/p>\n<p><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" title=\"Telegram Link\" href=\"https:\/\/t.me\/triumphias\" target=\"_blank\"><strong>https:\/\/t.me\/triumphias<\/strong><\/a><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><strong>Click the link below to see the details about the UPSC \u2013Civils courses offered by Triumph IAS.<\/strong> <\/span><span style=\"color: #ff0000;\"><strong><a style=\"color: #ff0000;\" title=\"Courses available\" href=\"https:\/\/triumphias.com\/pages-all-courses.php\">https:\/\/triumphias.com\/pages-all-courses.php<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Relevance: G.S paper III: Cybersecurity; Essay; &amp; sociology Paper II: visions of Social changes in India Introduction: The world we<\/p>\n","protected":false},"author":1,"featured_media":6628,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[123,42,69,114,116],"tags":[392],"class_list":["post-6666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","category-general-studies-iii-technology-economic-development-bio-diversity-environment-security-and-disaster-management","category-science-and-technology","category-sociology-optional","category-sociology-optional-paper-ii","tag-union-public-service-commission-upsc"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/6666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/comments?post=6666"}],"version-history":[{"count":1,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/6666\/revisions"}],"predecessor-version":[{"id":6670,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/6666\/revisions\/6670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media\/6628"}],"wp:attachment":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media?parent=6666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/categories?post=6666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/tags?post=6666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}