Professional Documents
Culture Documents
Group 8 CyberSecurity
Group 8 CyberSecurity
1
GENERAL THEME
Therefore, it is crucial to understand and identify the pattern of attacks and its consequences.
Like other developing countries, India has strived to keep up with the exponential technological
advancements and has skipped many crucial stages. Because of this, people's privacy and
sensitive data are more at risk now than before the internet was widely accessible. India
reported more than 1.3 million cyber-attacks in 2022, a substantial increase compared to 2019.
In addition, India is ranked third in terms of Internet users.
2
EVOLUTION & HISTORY
Cybersecurity's past and development have been shaped by how quickly technology has
changed and how much more people depend on digital systems. Here is a list of the most
important things that have happened and changed in the area of cybersecurity:
1. From 1940 to 1950, the focus was to build and run a centralised computer called the
mainframe. Security was not a high priority because only a small group of known people could
use the system.
2. In the 1960s, the first computer viruses like Creeper and Reaper appeared, and they were not
as dangerous as viruses of today but were worrisome at that time because of hacking threats.
3. In the 1970s, the creation of the multi-user system and ARPANET, which were early versions
of the internet, concerned security problems. Passwords were implemented, and user access
was restricted only to eligible persons.
4. In the 1980s, “Computer Safety” was first introduced and used frequently. In the year 1988,
Morris Worm cyber-attack got much attention.
5. In the 1990s, the number of people using the internet increased drastically, which led to an
increase in hacking and the need for more robust and powerful security measures. There are
now firewalls and intrusion detection systems (IDS).
6. In the late 1990s and early 2000s, there was a rise in the need for secure company operations
due to the increase in online banking and online shopping. The Public Key Infrastructure (PKI)
and SSL/TLS encryption algorithms were introduced to protect internet surfing.
7. Malware, such as worms, viruses, and Trojans, became more popular in the 2000s. This
increased the demand for the creation of security software and more advanced intrusion
detection and prevention systems (IDPS).
9. In 2013, Edward Snowden’s leaks about NSA and other government agencies spying on
people raised concern for more privacy issues and better encryption.
10. 2017 The WannaCry ransomware outbreak compromised hundreds of thousands, if not
millions, of machines worldwide. This showed the importance of regular software updates and
what happens if we do not fix security holes.
11. In the 2020s, cybersecurity threats continue to change as the increased number of IoT
(Internet of Things) devices and IT settings become more complicated. AI and machine
learning are used to attack and defend against computer attacks.
12. Ongoing: Zero-day flaws, hacking by nation-states, ransomware attacks, and data breaches
are always risks. Because of this, cybersecurity practices keep changing, focusing on proactive
measures, dangerous information, and the ability to respond to incidents.
3
APPLICABILITY OVER TIME
Over time, the relevance of cybersecurity has witnessed a significant surge due to the growing
reliance of individuals and organisations on technology. In the past, cybersecurity primarily
centred on safeguarding large businesses and government entities. However, in the present
scenario, it has become indispensable for everyone, encompassing individuals, small
enterprises, and non-profit organisations.
Several factors highlight the criticality of cybersecurity today. Firstly, the ubiquity of the
internet has made it more convenient for malevolent actors to access and pilfer data. Secondly,
the advent of cloud computing and mobile technology has ushered in fresh security
complexities. Lastly, the rise of cutting-edge technology, such as artificial intelligence and
machine learning, has provided new opportunities for prospective attackers.
The evolution of cybersecurity applicability is also apparent in the diversity of threats
organisations confront. Traditionally, viruses and malware constituted the primary
cybersecurity threats. However, contemporary organisations must contend with broader
dangers, including phishing assaults, ransomware incidents, and attacks that result in a denial
of service.
Here are some instances illustrating how the relevance of cybersecurity has magnified over
time:
1. Elevated Dependence on Technology: In the past, many organisations relied on paper-based
records and manual procedures. Technology plays a pivotal role in data storage, processing,
and transmission. This heightened reliance on technology has rendered organisations more
susceptible to cyberattacks.
2. Emergence of Novel Technologies: Introducing fresh technologies such as cloud computing,
mobile computing, and artificial intelligence has introduced novel security challenges. For
instance, while cloud computing enables remote data storage and access, it can also expose
data to threats if cloud providers are compromised.
3. Proliferation of New Threat Types: Cybercriminals continually innovate, leading to the
emergence of novel attack methods. Ransomware assaults, for example, have increased in
prevalence; they encrypt a company's data and hold the critical hostage until a ransom is paid.
To protect citizens' Personally Identifiable Information (PII), UIDAI introduced the idea of a
digital locker to ensure the security of Aadhaar credentials, known as the "Aadhaar Vault."
4
CONTRIBUTION OF CYBERSECURITY IN THE DEVELOPMENT OF
AN ORGANISATION
Aadhaar is the largest biometric identity database in the world. Cybersecurity is an integral part
of its growth and how it works. Aadhaar saves biometric information about more than 1.3
billion people, such as fingerprints, iris scans, and pictures of their faces. This information is
used to give each person a unique name and to make sure they are who they say they are when
they use services like banking, getting government benefits, and connecting to a cell phone
network. Cyber security steps help keep Aadhaar data safe from people who are not supposed
to see, use, share, disrupt, change, or destroy it.
For Aadhaar to stay valid and trustworthy, cybersecurity steps are necessary. Cybersecurity
helps ensure that Aadhaar can continue to offer a safe and easy way for people to access
essential services by keeping Aadhaar data safe from online threats.
5
As an example of how cybersecurity has helped the growth of Aadhaar, here are some
examples:
Safekeeping of data: Aadhaar data is kept in safe data centres guarded by many physical and
digital steps.
Robust authentication methods: To make sure people are who they say they are, Aadhaar
uses several powerful authentication methods, such as fingerprints, iris scans, and face images.
Daily security checks: Independent security experts check Aadhaar systems daily to find and
fix any security holes.
In Aadhaar, data is secured from when it is collected until it is used. This is called end-to-end
encryption. This helps keep data safe from people who should not have access to it, even if it
gets hacked while being sent. Strong cybersecurity means built into the Aadhaar system are a
vital part of keeping the private data of over 1.3 billion people safe. Through significant
investments in protection measures, the Indian government is working hard to make Aadhaar
safer and more reliable for people to access essential services.
MARKET CHALLENGES
6
5. IoT Attacks
IoT attacks use any device to get essential consumer data. Attackers usually destroy devices,
install malware, or steal company data. IoT device security demands ongoing awareness,
security analysis, and communication protection methods like encryption.
6. Cloud Attacks
Cyberattacks target remote service companies that offer cloud hosting, computing, or storage.
This covers service delivery paradigm assaults against SaaS, IaaS, and PaaS service platforms.
Knowing cloud security fundamentals and the most frequent vulnerabilities will help us reduce
our exposure to cloud intrusions.
7. Old Hardware
Old equipment poses a severe security risk that many companies need to be made aware of.
Companies that put off updating equipment due to expense may spend more money recovering
from a cyberattack. Security breaches may harm an organisation's reputation, reduce revenue,
and be expensive. Despite the cost of replacing hardware, obsolete software has serious
financial consequences for your firm. Also crucial for combating cybercrime.
Here are some key areas and trends that will likely shape the future of cybersecurity:
1. AI and ML in cyber security: With innovations every day, AI and ML become more critical
for safety. They can stop cyber-attacks and threats in real-time through detention, anomaly
detection, and analysis.
2. Zero Trust Security: The implementation of the zero trust model states that no one should be
trusted by default, whether insiders or outsiders. More use of this method in organisations will
lead to better security.
3. Cloud Security: With the increase in cloud services, cloud security has become a significant
concern for many businesses solely running on a cloud-based architecture.
4. Security for IoT: The Internet of Things (IoT) proliferates, and keeping billions of connected
devices safe is a big challenge. IoT devices and networks must be the focus of future
cybersecurity efforts to protect them from cyber threats.
5. Cybersecurity rules and following them: Governments and regulatory bodies are introducing
more cybersecurity rules. Organisations will put much effort into making sure they follow these
rules.
6. Skilled Workforce: There is a growing need for people who work in cybersecurity. There are
not enough skilled workers in this field, so it is an excellent place to start a career.
7. Cybersecurity training and awareness: As cyber threats get more complicated, it will
continue to be essential to teach employees and individuals about best practices for
cybersecurity.
7
8. Automation: It will become increasingly usual to automate regular security duties and
coordinate handling events to enhance efficiency and reaction times.
9. Insurance for cyberspace: The cyber insurance market proliferates as businesses try to protect
themselves from cyberattacks financially.
10. Programs for ethical hacking and finding bugs: Organizations should hire more "ethical
hackers" and incentivise security researchers to find and report security flaws before bad people
can use them.
CHALLENGES IN FUTURE