Recommendations About Cyber Security

Digitization is becoming the key to future growth in our society and economy. In today’s world, human and technology are interconnected through wired or wireless network connections. This is the age of internet and smart mobile devices. Everyday activities like working, playing, shopping, watching movies and serials, talking on the phone, writing lyrics of our favorite music, ordering food, paying bills, making friends, and greeting our friends and relatives on their special occasions are all technology based. It is attaching us virtually with style and comfort. Due to the massive growth of technology our data can be tracked and therefore the objects are accessible using the IP address. Today we are completely depending on the internet, but we deserve it to be secure and trustworthy. Cybersecurity issues are happening unjustified to a magical wand by attackers but due the vulnerability present within the system gets a good advantage. Presently we live in a world where all folks are surrounded by numerous heterogeneous wireless devices and technologies. Attack on Information Technology (IT) networks is one thing; but attack on mobile networks may be a matter of life and death especially with mobile networks being the Critical Information Infrastructure (CII). As we move ahead, we’ll see television white spaces and other spectrum white spaces being utilized for emerging spectrum needs for broadband Internet access. Alongside that fifth generation of mobile communication system (5G) is knocking our door within the sort of user-centric system. According to the author, 5G is going to be an extended version of worldwide Information Multimedia Communication Village (GIMCV) and Wireless Innovative System for Dynamically Operating Mega-communications (WISDOM) concepts envisioned around 2008 (Prasad, 2008).

Cyber security is the accumulation of skills, techniques, processes, and run-throughs which are built for safeguarding the protection of the network, computers, programs and data against malware, attacks, damage, and unauthorized access. Mobile communications have brought ease and indulgence in our lives. The progress and developments in Information and Communications Technology (ICT) in the form of mobile communications towards 5G is no doubt inevitable. But the negative side in the form of threats to our assets makes us insecure. ICT systems are hacked every day for robbing money and business secrets, for political aspirations or for stealing intellectual property. Mat Honan, a senior staff writer with Wired, had been a victim of cyber-attack in 2012. He explained his experience in detail, how within one hour of time span, the attackers erased all of his data from his iPhone, iPad, and MacBook by getting illegal access to his Twitter and Google accounts (Honan, 2012). The attackers also deleted Honan’s Google account, including almost eight years’ worth messages from his Gmail inbox. This attack compromised Honan’s information on all three levels that is, Confidentiality, Integrity, and Authenticity (C–I–A) model of information security. There are different types of vulnerabilities surrounding us every day. There are an emerging number of vulnerabilities including spyware, virus, malware, phishing, hacking, spam, Internet worm, identity thefts, password scams, firewall vulnerabilities, etc. ((LEAP), 2018) Cyberterrorism is the intentional use of Information and Communication Technology devices and techniques for malign purposes. Computers, mobile devices, networks, and the Internet can be used for destructive causes for personal gains or political benefits. Cyberwar and cyberterrorism go hand in hand with each other. According to the author, by making use of cyber tools, cyber physical infrastructure such as finance, energy, transport and government are targeted by cyber-attacks to increase terror and physical injuries or deaths (Ivanov, 2019). Another author stated that, “New cyber threats are emerging everyday including ransomware, endpoint attacks, phishing, third party attacks, supply chain attacks, artificial intelligence and machine learning driven attacks, crypto jacking, cyber physical attacks, state sponsored attacks, IoT attacks, threats to smart medical devices and electronics medical records, attacks on connected cars, semi-autonomous vehicles and driverless cars” (O’Brien, 2011). The whole world needs strong cyber security techniques which can successfully combat these ever-increasing forms of threats. 

Global conversion brings vast opportunities and guarantees simple life. Sensible Cities is that first and extremely essential step towards it. It guarantees cheap housing for economically backward folks, economical urban quality and conveyance, adequate clean facility, assured electricity provides, sanitation, sturdy IT condition, smart governance with subject participation, property atmosphere, health and education facilities, and last but not the least enough amount of safety and security of people. “In proportion to the present growth, the chance of cyber-attacks on the ICT network infrastructure that area unit used for sensible town are increasing” (Elvira Ismagilova, 2020). As per ITU-T definition, “Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment” (ITU-T, 2017). Nowadays personal and professional life is totally hooked into interconnected things and the automation in almost every stage of human life that has brought smartness and luxury into standard of living. These sensible devices generate vast information which can include some important and sensitive data that’s kept on the cloud. This information is at risk of a style of attacks intending data thefts and/or data leakage. ICT counterparts need to be a lot prepared for these sorts of threats and vulnerabilities. Security isn’t a one-time course of action; it’s a nonstop method that desires innovative defense mechanisms.

To achieve cyber security awareness among people is the first and foremost thing. Otherwise, users can’t be prepared to combat such threats. To face the cyber-attack, the system and user need to design and develop strong vulnerability scanning mechanism, email virus or spam filtering system, personal information and password protection, robust firewall services, etc. Security is not a one time mechanism. It is a continuous process. So, awareness and prepared readiness can save the cyber systems from cyber-attacks.

Sources:

(LEAP), L. E. (2018). A to Z of Cyber Crime. Pune: Laws, Asian School of Cyber.

Elvira Ismagilova, L. H. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers. doi:https://doi.org/10.1007/s10796-020-10044-1

Honan, M. M. (2012, June 8th). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved from Wired: https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/

ITU-T. (2017). Committed to connecting the world. Retrieved from ITU-T SG17 – Security: https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx

Ivanov, I. (2019). Cyber Security and Cyber Threats: Eagle VS “New Wars”. Academia.edu: San Francisco, CA, USA.

O’Brien, D. (2011, January 11). The A to Z of Cyber Security. Retrieved from Medium.com: https://medium.com/threat-intel/the-a-to-z-of-cyber-security-93150c4f336c

Prasad, R. (2008). Keynote speech—wireless innovative system dynamic mega communications (WISDOM). IEEE CogART, 8.