top of page
  • Writer's picturePGCL Moot Court Society

Cyber Security - A Curse or a Boon

- Ritika Ghosh



Cyber-security is becoming a critical part of the country's overall national and economic security objectives. There are a plethora of cyber-security challenges in India. One should beware of the internet threats being rampant. With the rise in cyber-attacks, every company requires a security analyst to ensure that its systems are safe.

Businesses across all industries must encourage their IT departments to improve their cyber-security infrastructure and provide relevant cyber-security training to all important decision- makers in the company, whether the Internet of Things (IoT) grows in size and scale or an establishment of 5G technology.


1. Getting Used to Working with a Remote Team

It's no secret that the number of people working remotely has increased dramatically. The quantity and scope of cyber-security concerns for remote employees grow as a result of a distributed work environment. Remote workers who use their home networks are far more likely to be victims of security breaches.

2. Emerging 5G Use Cases

When 5G was first introduced this year, several businesses were eager to make use of its capabilities, whether it was mobile phone carriers selling it to their clients or manufacturer trying to boost operational efficiency.

3. Threats from the inside

Insider risks are precisely why data encryption and zero-trust access procedures are critical for the security and preservation of sensitive patient data. While it's a scary concept, not all cyber-security mishaps can be traced back to human error.


Anti-social - Social-media

One of the most common entry points for malware is social media platforms. While the majority of malware is delivered via emails and download links, it can also be spread via social media via shortened URLs or even concealed within social media adverts.


Whistle-blower: The term "whistle-blower" is commonly associated with criminal action by government agencies or huge enterprises. Whistle-blowers' involvement in cyber-security isn't usually as spectacular, but it's just as important. Even if a corporation hasn't broken any laws, data breaches are serious risks that all parties involved should be aware of. Whistle-blowers promote more than just fair customer service. They work to advance cyber-security. On social media, people are often reckless, they meet to tweet; they express their annoyance with their coworkers or superiors without thinking. They may purposefully divulge critical information in their posts, causing considerable damage to the organization's reputation.


Is someone invading your private space? You are being targeted. Know how


The term “cyber stalking” refers to online harassment. Cyber-stalkers use social media to harass victims by sending offensive and obscene messages. They change images of victims and publish them on social media, which eventually aids in making the victim's life difficult. Every year in India, a large number of cases are filed by victims against those individuals.


In India, ladies are the ones who report stalkers in the majority of cases; over 60% of females are victims of stalkers.The stalking is mostly seen in two Indian states:Maharashtra and Gujarat.

Maharashtra has the highest number of stalking instances (1,399). Second,over 1130 stalking cases have been registered in Delhi.


The use of third-party applications has the following risks: for all of the games and apps, these programs ask the user for permission to access personal information. The user authorizes the app a particular level of access to the user's data. Furthermore, some of these foreground applications may download malware onto the user's computer or phone without their knowledge.


Does Zoom pose a threat?" Is Zoom going to put our security at risk?


Zoom has become so common that even preschoolers are using the verb "Zoom me" to communicate.

Remember that most modern 'smart' devices are listening in on your every word, and Samsung,for example, has been pretty open about it. According to Samsung's terms and conditions, "If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through the use of Voice Recognition,


Inconvenience = Security


The Moral Dispute for cyber ethics


Is the Internet that different from real life? A crime is a crime, after all. This refers to the disparity in the socioeconomic status of people who have access to digital and information technology, such as cyberspace, and those who have limited or no access.


Internet Behaviors that are Respectful


The term "cyber ethics" refers to a set of guidelines for ethical online behavior. Just like how we are taught to act responsibly in our daily lives. In many ways, responsible internet behavior parallels all of the appropriate behaviors in everyday life, but the effects may be quite different. Different so as to not see it as a “quick-fix” approach but by addressing young people by teaching them to deal properly with the challenges and hazards that exist on the Internet.



Antivirus: Computer viruses and unwanted small programs that execute undesired commands without the user's explicit agreement have grown to monster dimensions. Antivirus software prevents viruses from being installed in a system, and it scans for infections that have already been installed.


VPN: Using public Wi-Fi to access private business accounts is dangerous, and doing so puts your entire firm at risk. When working outside your secure office network,a virtual private network (VPN) is a useful tool for safely transmitting and receiving data.


Digital signatures: The same mathematical procedures that are used in asymmetric encryption may be used to create digital signatures. A user can check whether or not he has a private key by encrypting some data with it. Anyone with the public-key that verifies the person's credentials can decrypt the same. This procedure is essentially the inverse of public-key encryption, and it also assumes that the authorized user only has access to the private key.

“The computer is eating all my files”.

- “Well, you shouldn’t have put them on the menu!!”


Threat detection systems with AI, Relying on Cloud services, Enhancing Multi-Factor Authentication (MFA), Naturalizing micro-segmentation by creating interior safe walls, Data privacy as a discipline and Smartphones is the new target.These constitute to be certain trends to combat cyber-security.


Botnet


What is a botnet, precisely?

A botnet is a collection of infected computers that can be used for hostile purposes by a third party. In other words, if you don't take proper precautions and install the essential security measures on your computer network, it could become a botnet without your knowledge!


The term "botnet" refers to the use of a botnet to carry out the attack, although what is happening is a DDoS (Distributed Denial of Service) attack. A DDoS attack,in its most basic form,inhibits legitimate users from accessing a networked service by flooding it with requests until it can no longer handle the volume.


Conclusion


There are a variety of reasons why someone may carry out such an attack, but they are all nasty. The fact that anyone can be a part of a botnet is perhaps the scariest aspect of them, which has led to them being dubbed "zombie" networks. Most systems can be protected from becoming zombies with a little common sense and sufficient security software.The capacity of servers to work around attack sand cyber dangers like this is becoming more efficient as cloud systems grow.


Ritika Ghosh is a third year student at SVKM's Pravin Gandhi College of Law, Mumbai.


(ritika151101@gmail.com)


82 views0 comments

Recent Posts

See All
bottom of page