Cyber Security
Cyber Security
Cyber Security
Deepa.T.P.,
Assistant Professor, Department of CSE,
Acharya institute of Technology, Bangalore, Karnataka, India
deepatp@acharya.ac.in
In 2009, compared to physical theft fraudulent before. Majority of people want to access to
money transfers has exceeded in bank branches of corporate networks through their mobile
United States. Crimes have gone up by 60% every year, devices for day to day activities. Though
in 2012, 3500 cases and 2070 in 2011 reported in India. smarter technology devices increases
As per report from National Crime records Bureau connectivity and but present latest types of
(NCRS), Maharashtra reports 561 cases, Andhra 454 security threats. Hackers can crack these
cases, Karnataka 437 cases in the year 2012 crimes securities and get an easy entry into corporate
which are done by age group of 18 to 30 [18].
Haryana networks.
registered 3 cases in 2011 but 116 in the year 2012 3. Malicious Software like viruses and spyware
which is a drastic raise. Compared to other crimes, this are strong enough to take the partial control of
cyber crime doesn’t require much investment and can main applications.
be done in various locations. These crimes originate 4. In business, customer and vendors are joined
from various sources and exhibits to the networks to increase their business
socio-educational/economic and technological factors profits. In December 2010, a famous E-
including addiction which also includes counterfering, business website was attacked by dozens of
economic crimes, money laundering, child people claiming to be part of the unnamed
group. They attempted to perpetrate a denial of
2 Prof. Deepa.T.P.
service attack in retaliation for website to shut 1. Application security which is the use of
down payment services to other websites. software, hardware, and procedural methods to
More than a dozen hackers were arrested in protect applications from external threats.
that crime. 2. Information security is the practice of avoiding
5. There is more technology advanced hackers, information from unauthorized access, use,
professional cyber crime organization. For disclosure, disruption, modification, perusal,
example, hacker receives payment to infect inspection, recording or destruction. IT
end user device with malware. Today’s Security and Information assurance are two
Malwares are difficult to trace and they steal major aspects of information security.
data for financial gain. Some people think that
they get more money if they become hackers 3. Network security which consists of the
technology may play a more pivotal role, and conditions to destabilize a network in unpredictable
the BC/DR plan may have more of a focus on ways.
systems recovery. For example, the plan at one The defense of cyberspace necessarily
global manufacturing company would restore involves the forging of effective partnerships between
critical mainframes with vital data at a backup the public organizations charged with ensuring the
site within four to six days of a disruptive security of cyberspace and those who manage the use of
event, obtain a mobile PBX unit with 3,000 this space by myriad users like government
telephones within two days, recover the departments, banks, infrastructure, manufacturing and
company's 1,000-plus LANs in order of service enterprises and individual citizens. The defense
business need, and set up a temporary call of cyberspace has a special feature. The national
center for 100 agents at a nearby training territory or space that is being defended by the land, sea
facility. and air forces is well defined. Outer space and
cyberspace are different. They are inherently
5. End-user education involves educating end international even from the perspective of national
users with various information attacks and interest.
how to avoid them. For example, while
registering password, tell end user what should
4 Methods of Attacks and avoidance
be the length and characteristics of complex
The most popular weapon in cyber terrorism is the use
password. Provide suitable education about
of computer viruses and worms. That is why in some
what are the precautions they have to take to
cases of cyber terrorism is also called 'computer
avoid cyber crimes. Also, sometimes actions to
terrorism'[1]. The attacks or methods on the computer
be taken in case if they are victim.
infrastructure can be classified into three different
categories.
3 Challenges in Cyber Security
(a) Physical Attack. The computer infrastructure is
Cyber security has been considered as one of the most damaged by using conventional methods like bombs,
urgent national security problems. A report says, in a fire etc.
speech during his presidential campaign, President (b) Syntactic Attack. The computer infrastructure is
Obama promised to “make cyber security the top damaged by modifying the logic of the system in
priority that it should be in the 21st century . . . and order to introduce delay or make the system
appoint a National Cyber Advisor who will report unpredictable. Computer viruses and Trojans are used
directly” to the President. in this type of attack.
Cyber security must address not only (c) Semantic Attack. This is more treacherous as it
deliberate attacks, such as from disgruntled employees, exploits the confidence of the user in the system.
industrial espionage, and terrorists, but inadvertent During the attack the information keyed in the system
compromises of the information infrastructure due to during entering and exiting the system is modified
user errors, equipment failures, and natural disasters. without the user’s knowledge in order to induce
Vulnerabilities might allow an attacker to penetrate a errors.
network, gain access to control software, and alter load
4 Prof. Deepa.T.P.
The first step in protecting yourself is to recognize the intentionally negative impact to
risks and become familiar with some of the terminology stealing or altering information.
associated with them.
Malicious code - This category
Viruses - This type of malicious code requires
includes code such as viruses,
you to actually do something before it infects
worms, and Trojan horses. Although
your computer. This action could be opening
some people use these terms
an email attachment or going to a particular
interchangeably, they have unique
web page.
characteristics.
Worms - Worms propagate without user
intervention. They typically start by exploiting E-Mail Related Crime- Certain emails are used
a software vulnerability (a flaw that allows the as host by viruses and worms. E-mails are also
software's intended security policy to be used for spreading disinformation, threats and
violated), then once the victim computer has defamatory stuff.
been infected the worm will attempt to find Denial of Service -These attacks are aimed at
and infect other computers. Similar to viruses, denying authorized persons access to a
worms can propagate via email, web sites, or computer or computer network.
network-based software. The automated self- Cryptology-Terrorists have started using
propagation of worms distinguishes them from encryption, high frequency encrypted
viruses. voice/data links etc. It would be a Herculean
task to decrypt the information terrorist is
Trojan horses - A Trojan horse
sending by using a 512 bit symmetric
program is software that claims to be
encryption.
one thing while in fact doing
something different behind the
5 Need for Cyber Security in India
scenes. For example, a program that
claims it will speed up your 9.4% houses in India have computer (any of Laptop or
computer may actually be sending Desktop). Chandigarh (U/T), Goa and NCT of Delhi are
confidential information to a remote top three stats/union territories with highest computer
intruder. usage.
According to 2011 Census, Only 3.1 percent of total
Hacker, attacker, or intruder -
houses have Internet access in India. The census
people who exploit weaknesses in
covered 24,66,92,667(246.7 million) houses in India
software and computer systems for
and found only 76,47,473 (3.1%) of this houses use
their own gain. Though they do it for
Internet. The Internet includes both broadband and low-
curiosity,their actions are typically
speed connections.
in violation of the intended use of
According to Internet World Stats on June 30 2012,
the systems. The results can range
there were 2.4 billion internet users (2,405,510,175)
from creating a virus with no
worldwide. China was the largest countries in terms of
Survey on need for cyber security in india 5
growth of information technology, increasing number direction of fighting against Cyber Threats and
of cyber crimes, plans for social transformation [6]
. It Cyber Attacks including Cyber Terrorism Against
has 14 objectives which includes enhancing the India, Cyber Warfare Against India, Cyber
protection of India’s Critical infrastructure to Espionage Against India, Critical Infrastructure
investigation and prosecution of cyber crime, Protection in India, Managing India’s Cyber
developing 50,000 skilled cyber security professionals Security Problems, Issues and Challenges, etc.
in next five years. 6.3 Indian Government Initiatives for
Cyber Security Research And Development Education on Cyber Security
Centre Of India (CSRDCI) - This concentrates on
Information security awareness – This is launched
Techno Legal Cyber Security Issues of India and
from over a five years period. One of the objectives is
World Wide . This Platform and Website is
[5]
to create awareness about information security to
managed by Perry4Law, Perry4Law Techno Legal
children, home users and non-IT professionals in a
Base (PTLB) and Perry4Law Techno Legal ICT
systematic way. C-DAC Hyderabad has been assigned
Training Centre (PTLITC)[12]. the Cyber Security
this project.
Initiatives and Projects of PTLB at a single place.
Information security education and awareness
Cyber Crimes Investigation Centre Of India -
project- Objectives are to train System Administrators
The Cyber Crime Investigation Centre of India
by offering Diploma Course in Information Security,
(CCICI) is the exclusive Techno Legal Cyber and
Certificate Course in Information Security, 6-weeks/2-
Hi-Tech Crimes Investigation and Training Centre
weeks training programme in Information Security,
(CHCIT) of India[7]. The objective of CCICI is to
train Government Officers of Center and State on
spread Cyber Law Awareness and Cyber Security
Information Security issues and Education Exchange
Awareness in India and abroad. Further, CCICI
Programme
also intends to develop Cyber Crimes Investigation
National Initiative for Cybersecurity Education
Capabilities and Expertise in India and abroad.
(NICE) - The goal of NICE is to establish an
National Intelligence Grid (NATGRID) - This operational, sustainable and continually improving
Project of India is one of the most ambitious cyber security education program for the nation to use
Intelligence Gathering Project of India. It has been sound cyber practices that will enhance the nation’s
launched at a time when the Intelligence security[15].
Infrastructure of India is in a bad shape [11]
. It is an
essential requirement for robust and effective 6.4 Top colleges which offer cyber security
Intelligence Agencies and Law Enforcement course in india[17]
functions in India. Indian Institute of Information Technology
- Allahabad, Uttar Pradesh
National Critical Information Infrastructure Master of Science in Cyber Law and
Protection Centre (NCIPC) Of India - intends to Information Security
ensure critical infrastructure protection and critical
ICT infrastructure protection in India.
National Cyber Security Database of India
(NCSDI) - This Database would work in the
Survey on need for cyber security in india 7
The Indian Institute of Information security administrators, network defense analysts, web
Technology Allahabad - Allahabad, Uttar security administrators, application security testers,
Pradesh
security analysts, forensic analysts, penetration testers
Master of Science in Cyber Law and
Information Security and security auditors. the job role would be to develop
and test IT products and services of organizations and
Institute of Management and Technology -
Ghaziabad, Uttar Pradesh ensure that they are as secure as possible. Secure
MS in Cyber Law and Security programming, authorized hacking and network security
Post Graduate Diploma in Cyber Security surveillance are specializations in this domain.
the growing countries like India. According to recent Compliance NASSCOM : Cyber Security Initiatives in India
[7] CECSRDI: http://perry4law.org/cecsrdi/?p=123
survey , which announced in TOI that India will
[8] http://techinasia.com
require five lakh cyber security professionals by 2015
[9] www.nasscom.in
to support its fast growing internet economy as per an
[10] ptlb.in/ccici/
estimate by the Union ministry of information [11] en.wikipedia.org/wiki/NATGRID
technology. The financial sector alone is expected to [12] perry4law.org/cecsrdi/?p=735
hire over 2 lakh people while telecoms, utility sectors, [13] www.infosecawareness.in/
power, oil & gas, airlines, government (law & order and [14] www.isea.gov.in/
[17] http://study.taaza.com/study/top-ten-college-
which-offer-cyber-security-course-in-india
[18] www.indiastats.com
[19] techcircle.vccircle.com › Feature