The Rising Threats: The Importance of Cybersecurity






                                                                    

Plabita Borbora

    With advances in technology and a greater desire to be informed, individuals are increasingly turning to online resources like blogs and news sites to receive reliable information. Recent data indicates that Google alone processed over 99,000 searches every single second in 2022, averaging 8.5 billion queries a day. YouTube, the global pioneer for video sharing, registers over 2.6 billion users per month. Research by Global WebIndex shows that as of April 2023, 60% of the world’s population uses social media with an average daily usage of 2 hours and 24 minutes. Due to this widespread phenomenon, a significant amount of our personal and public information is now available online. At this point, the most important thing to ask oneself is whether or not these details are safe and secure when transmitted over the internet.

On August 5, 2022, Twitter disclosed that a hacker nicknamed "Devil" exploited a flaw in their algorithm and offered a sizably large dataset of personal identifiers such as phone numbers and emails on internet forums for $30,000. Upon further investigation, it was discovered that the bug had impacted more than 5 million people. Another infamous incident took place on July 2022 when hackers gained control of the British Army's Twitter account. The social media account had its name and picture changed several times and even went on to organize a full fledge contest to win Angry Apes non-fungible tokens (NFTs), digital art stored on a blockchain. According to minister of State for Electronics and Information and Technology, India reported 14.02 Lakh cybersecurity incidents in 2021 and13.91 Lakh such incidents in 2022. These are just a few of the numerous cyber-attacks that took place in recent years. So, what is Cyber-security and why is it important?

Cyber Security is a process that is designed to protect networks and devices from external threats. It is the protection of Internet-connected systems, including hardware, software, and data from cyber-attacks The word "Cyber" refers to technologies that involve systems, networks, and programmes or data. While "security" refers to the protection of networks, information, and computer systems. Effective cybersecurity implementation requires knowledge of both Cyber Security Principles and cybersecurity domains.

The Cyber Security Principles are a set of guiding principles developed for improving the online security of Internet users. They protect and provide strategic guidance against cyber threats or malicious security breaches.   These principles have been developed to mitigate the cyber threats ingrained in internet usage. The Cyber Security Principles can guide, inform, educate, support, and secure us against online crimes. These Principles are necessary to provide tactical guidance for understanding and implementing measures to protect any organisation from cyber threats. These principles can be better understood when we group them into four activities: Govern, Protect, Detect and Respond.  

a) Governing principles are used to identify and manage security risks.  

b) Protecting principles help in implementing controls to reduce security risks.  

c) Detecting principles help detect and understand cyber security events to identify cyber security threats.  

d) Responding principles help in recovering and responding to cyber security incidents. 

Along with the Cyber security principles, the cyber security domains should also be taken into consideration while developing the cybersecurity policy. The following is a comprehensive cybersecurity domain list:

·     Career development                                   

·     Computer operations security

·     Cyber forensics

·     ERM

·     Identity management

·     Incident response

·     Security architecture

·     Telecommunications security

·     User education 

Nowadays, there are more users, devices, and programmes than ever before, and there is also a greater volume of data—much of it private or sensitive—than ever before. The rise in the number, sophistication, and variety of cyber attackers and attack techniques further complicates the issue. Keeping up with new technologies, security trends, and threat information is a challenging task. Let's examine a few of the horrifying cyberattacks that shocked the world and ultimately prompted fundamental changes in how intrusions are addressed.

1. The Melissa Virus: In 1999, programmer David Lee Smith created the Melissa Virus, one of the first and most dangerous cyberthreats. He emailed recipients a file to open using Microsoft Word that was infected. After being opened, the virus started to work and severely damaged hundreds of businesses, including Microsoft. The anticipated cost of fixing the damaged systems was $80 million.

2. NASA Cyber Attack: Around the same time, James Jonathan, a 15-year-old boy from South Florida, was successful in hacking and shutting down NASA’s computers for 21 days! During the attack, there were about 1.7 million software downloads, and the space giant had to spend $41,000 on fixes. He later made history by becoming the country's first juvenile to be imprisoned for cybercrime.

3. The 2007 Estonia Cyber Attack: As a result of Estonia's disagreement with Russia over the relocation of the Bronze Soldier of Tallinn, a series of cyberattacks began on April 27, 2007 and targeted websites of Estonian organisations, including the Estonian parliament, banks, ministries, newspapers, and broadcasters. The direct result of the cyberattacks was the creation of the NATO Cooperative Cyber Defence Centre of Excellence in TallinnEstonia. As of January 2008, only one ethnic-Russian Estonian national had been charged and convicted.

4. Cyber Attack on Sony’s PlayStation Network: The cyber-attack on Sony’s PlayStation Network in 2011 compromised the personal information of 77 million users. The attack occurred between April 17 and April 19, 2011, forcing Sony to deactivate the PlayStation Network servers on April 20. The outage lasted 23 days. On May 14, Sony released PlayStation 3 firmware version 3.61 as a security patch. The firmware now ensures that users change their account's password upon signing in.      

5. The 2014 Cyber Attack on Yahoo: In 2014, Yahoo was subject to one of the biggest cyber-attacks in history. The hackers had obtained data from over 500 million user accounts, including account names, email addresses, telephone numbers, dates of birth, hashed passwords, and in some cases, encrypted or unencrypted security questions and answers. On March 15, 2017, the FBI officially charged four men, including two who worked for Russia's Federal Security Service (FSB). The four men accused included Alexsey Belan, a hacker on the FBI's Ten Most Wanted Fugitives list; FSB agents Dmitry Dokuchaev and Igor Sushchin, whom the FBI accused of paying Belan and other hackers to conduct the hack, and Canadian hacker Karim Baratov,whomo the FBI claimed was paid by Dokuchaev and Sushchin to use data obtained by the Yahoo! breaches to breach into about 80 non-Yahoo! accounts of specific targets.

6.Attack on PayPal customers: In a very recent event, popularly known as "credential stuffing," hackers entered tens of thousands of user IDs and passwords obtained through prior breaches into fields intended for users. Credential stuffing truly works since it is common for people to use the same credentials for several accounts.  In this particular case of PayPal users, hackers got two days' worth of access to 34,942 users' full names, birthdates, social security numbers, postal addresses, and unique tax identification numbers. This is the very reason why cybersecurity experts emphasise using two-factor authentication whenever possible. In addition, people should always use long, unique, and random passwords for each of their online accounts. Those will be less likely to show up on the lists of passwords used to crack accounts in credential-stuffing attacks.

While an overwhelming number of cyber-attacks were taking place globally, India was not spared either. In 2022 alone, the country was shaken by the following major cyber-attacks:

 

(i)  Attack on Jawaharlal Nehru Port Container Terminal (JNPCT): India’s only state-owned and operated container terminal Jawaharlal Nehru Port Container Terminal (JNPCT) was reported to have begun turning away ships after a ransomware attack took place on 21st February, 2022. JNPCT is India’s largest container port and handles half of all the containers in India. The local reports discovered the attack and began diverting ships to the other terminals in a complex located near Mumbai. 

(ii) Ransomware Attack in May 2022 - SpiceJet Airline: Indian airline SpiceJet was attacked on 24th, May which slowed down the departure of flights the next morning. It led to hundreds of passengers stuck in the airport and stranded in several locations in the country. The airline later posted on Twitter and confirmed that its system had faced ransomware attacks. 

(iii) Attack on Tata Power: India’s largest integrated power company – Tata Power, faced ransomware attacks on 14th Oct, 2022. The Hive ransomware organisation, which has victimised over 1,300 businesses globally and collected almost $100 million in ransom payments, was responsible for the cyberattack. The organisation started releasing the stolen information on their dark web forum soon after the attack was launched. The leaked data included bank accounts of the company, bank statements as well as details of its employees including their remuneration and passport information. Tata Power's battery usage information as well as schematics for some of its grids were also included in the hacked material.

(iv)  Attack on All India Institute of Medical Service or AIIMS: India’s leading public medical institute, All India Institute of Medical Service or AIIMS, experienced a cyber-attack on 23rd November, 2022. This attack affects hundreds of patients and doctors accessing primary healthcare services, including discharge, billing, and patient admission systems.

Cyber-attacks could be of different types:

 

1.       Injection attacks: Involves injection of malicious data into a web application in order to manipulate the application and fetch the required information.

2.       DNS Spoofing: DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker’s computer or any other computer.

3.       Phishing: Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number.

4.       Brute force: It is a type of attack which uses a trial-and-error method. This attack generates a large number of guesses and validates them to obtain actual data like user password and personal identification number. This attack may be used by criminals to crack encrypted data, or by security analysts to test an organization's network security.

5.       Denial of Service: It is an attack which is meant to make a server or network resource unavailable to the users.

6.       Dictionary attack: The attack involves storing a list of commonly used passwords and validate them to get original password.

7.       URL Interpretation: It is a type of attack where one could change a certain part of a URL, and make a web server deliver web pages for which he is not authorized to browse.

8.       Man in the middle attacks: The attack allows the attacker to intercept the connection between client and server and acts as a bridge between them. Due to this, the attacker would be able to read, insert and modify the data in the intercepted connection.

9.       Virus: The Melissa Virus is a classic example, where a software program spreads throughout the computer files without the knowledge of a user. It is a malicious computer programme which when executed, self-replicates by incorporating copies of itself into other programmes.

10.    Trojan horse: It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent.

 

With the rapid development of information technology, it has become critical for the Indian Government to provide a safe and secure cyberspace. The government of India has taken a number of steps to ensure that the nation reaches the goal of a $5 trillion economy in an effort to create a "cyber-secure nation" for businesses and individuals. The introduction of the "Indian Computer Emergency Response Team" (CERT-In), which serves as the national organisation to address the nation's cyber security, is one such endeavour. This initiative has had a significant impact on lowering the frequency of cyberattacks on government networks.

Another initiative taken up by the government is the NCIIPC. It is a central government establishment, formed to protect critical information about our country, which has an enormous impact on national security, economic growth, and public health care. Additionally, The Indian Government has published a written guideline for CISOs of government organizations, outlining best practices for safeguarding apps, infrastructure, and compliance. Considering the security of personal data and information of individuals and to protect Indian users from global breaches, the Personal Data Protection Bill 2019 (PDP Bill 2019) was tabled in the Indian Parliament by the Ministry of Electronics and Information Technology on 11 December 2019. The bill addresses the processing and storage of any important data pertaining to individuals only in India. Additionally, the measure seeks to hold social media corporations more responsible and to pressure them to stop the spread of objectionable content. The government also introduced the National Cyber Security Policy in 2013, whose purpose is to establish a secure and resilient cyberspace for individuals, organisations, and the government. Through coordinated efforts of institutional structures, people, processes, and technology, the objective is to offer protection to cyberspace information and infrastructure, build capacities to prevent and respond to cyberattacks, and minimise damage.

In addition to the government's efforts, it is also the duty of netizens to educate people about the need to keep their systems free of malware and viruses. People can use certain inexpensive cyber security methods to protect themselves from various sorts of cyber-attack.

1.       Changing passwords is the easiest way to improve security.

2.       We could always use a password manager tool like LastPass, Dashlane, or Sticky Password to keep track of everything for us. These applications help us use unique, secure passwords for every site we need while also keeping track of all of them for us.

3.       An easy way for an attacker to gain access to our network is to use old credentials that have fallen by the wayside. Hence, we should always remember to delete unused accounts.

4.       Enabling two-factor authentication to add some extra security layers to our logins. An extra layer of security that makes it harder for an attacker to get into our accounts.

5.       Keeping Softwares up to date.

 

India is the second-fastest digital adapter among 17 of the most digital economies globally, and rapid digitisation does require forward-looking measures to boost cybersecurity. However, the country is facing a shortage of cyber security professionals and active cyber defences. Currently, the country relies heavily on international companies for its cyber security tools. This makes India's cyberspace vulnerable to cyber-attacks motivated by state and non-state actors. Therefore, it is becoming increasingly important for educational institutions, such as public and private colleges, business groups, and Industrial Training Institutes (ITIs), to offer courses on cybersecurity. It is also important that opportunities are created for developing software in order to protect digital communications and cyber security. The need of the hour for the Indian government is to develop core skills in cyber security, data integrity, and data security fields while also setting stringent cyber security standards to protect banks and financial institutions.

Plabita Borbora, HOD Dept. of Computer Engineering, AEI

Source: Internet.


Plabita Borbora, HOD, Dept. of Computer Engineering