In today’s world, cybersecurity threats played an important role to defeat the enemy. Recently in the Russia Ukraine war Ukraine said Russia played with its cybersecurity data which is called cyberwarfare.Â
What is cybersecurity?Â
According to cybersecurity and infrastructure security agency (CISA) Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else’s system?Â
What are cybersecurity threats?Â
- Cyber espionage- the art of obtaining secret information through malicious software.Â
- Cyber-attack- targets the computer information system, infrastructures, computer networks.Â
- Cyber terror- cyberspace used by terrorist for number of purposes such as planning terrorist attacks, to raise funding etc.Â
- Cyberwarfare – it is carried out by country or its proxies to attack the computer system in other countries. Such as theft, vandalism, destruction of critical information.Â
Software of cybersecurity threats-Â
- Malware-Â
 it is program or file that is harmful to computer user and includes viruses, worms, trojans and spyware and performs the functions stealing, encrypting, deleting sensitive data, altering or hijacking core computing functions.Â
- Types of malwares-Â
- Virus- it can execute itself and spread by infecting other program or files.Â
- Worm- it replicates self without a host program. They spread without any human interacts.Â
- Trojan- it is a legitimate program once activated than trojan executes malicious functions.Â
- Xafecopy- it operates normally malwares uses technology to bypass ‘captcha’ systems designed to protect users by confirming the action is being performed by humans.Â
- Spyware- it is designed to collect information and data without user`s knowledge.Â
- Pegasus-It is the surveillance spyware that enables the remote surveillance of mobile phones. It can read every message and call once it infects the phones.Â
- Distributed denial of service-Â
- Â Â Denials of service (DOS)- it is the malware attack that prevents or impairs the authorized use of information system resources. It creates the number of botnets and these botnets then ping a single server all at the same time. As the number of pings are far beyond the capacity of the target server. Then the server crashes and denies service of genuine usersÂ
- Distributed denial-of-service- it is a variant of denial-of-service attack that users a coordinated attack from a distributed system of computers rather than a single source.Â
Impacts of cyberattacks-Â
- Unauthorized changes made to data and information technology system which results in inaccuracy.Â
- It effects the national security threats or confidential data.Â
- It destructs the information systemsÂ
- It impacts the integrity and availability of information.Â
- It destructs the information infrastructure.Â
- Also affects financial loss.Â
Challenges and strategies in India’s cyber security-Â
- International convention-Â
Presently, Budapest convention is the 1st international treaty seeking to address internet and computer crime by harmonizing national laws. This promotes greater cooperation between countries in fighting cyberattacks.Â
India has not joined this convention because of allowance of cross border of data to carry out investigation.Â
- PPP framework for cybersecurity-Â
Presently most of cybersecurity operations done by government agencies there is a need to change to leverage private sector expertise in combating cybercrimes through this network.Â
- Strength information technology act and national cybersecurity policy 2013 needs reform.Â
Cybersecurity preparedness by India-Â
According to international telecommunication union (ITU) released global cybersecurity index in2017 this measures performance of countries in terms of improve cybersecurity, India placed 23rd rank among 165 countries.Â
- Section of 66f of ITA- special provision deals with cyber terrorism and cybercrime, denial of access, unauthorized access, critical infrastructure, sensitive dataÂ
- National cybersecurity policy 2013-this document id drafted by department of electronics and information technology. Establish national critical information infrastructure protection center (NCIIPC) to improve the protection of country`s critical infrastructure information.Â
- National cybersecurity coordinator (NSCS)– under this NSCS coordinate with different agencies at national level cybersecurity matters.Â
- Cyber Swaachha Kendra- introduce for internet users to wiping all virus and malwares out Â
- Information security education and awareness project (ISEA)- training of personnel to raise awareness and to provide research, education, training in the field if information securityÂ