Cybersecurity is concerned with preventing unauthorised access to, damage to, or inaccessibility of computer systems. All information assets, whether they are in hard copy or digital form, are protected by information security, a more general term.
Types of Cyber Security:
1.Critical Infrastructure security.
5.Internet of Things security
1.Critical infrastructure security:
The protection of systems, networks, and assets whose continuing functioning is judged important to ensure a given nation’s security, its economy, and the health and/or safety of the general population is the subject of critical infrastructure security.
In order to guard against dangers like illegal access and alteration, application security is the process of creating, integrating, and testing security measures within applications.
A group of technologies known as network security guard against a wide range of potential dangers from entering or spreading within a network, preserving the usefulness and integrity of a company’s infrastructure.
Cloud security, often referred to as cloud computing security, is a group of security controls intended to safeguard data, programmes, and infrastructure that are hosted in the cloud. These steps guarantee data and resource access control, user and device authentication, and data privacy protection.
5.Internet of Things security:
The technique of protecting IoT devices and the networks they use is known as internet of things security. Its key objectives are to uphold user privacy and data confidentiality, guarantee the security of equipment and other relevant infrastructures, and permit the smooth operation of the IoT ecosystem.
Importance of Cyber security:
Because of various security concerns and cyberattacks, cybersecurity is crucial in today’s environment. Many businesses create software for data protection. The data is shielded by this software. Cybersecurity is crucial since it protects not only our systems from virus attacks but also helps to secure information.
Ten tips for cyber security:
1.Back up the data from your divices
2.Choose your accounts having memorable passwords.
3.Keep your devices are update
4.Toggle two factor authentication on.
5.Avoid making important purchases via public wifi.
6.Install an antivirus programme, and perform routine virus scans.
7.Careful for social media account information
8.Can give less information for online related apps
9.Check bank account details for safety way
10.Be imaginative while responding to your account recovery inquiries.
What is the work ofPegasus and What is its origin ?
Pegasus owned by a NSO group- a private foundation, which many leading countries believe that it is the most powerful spyware ever created, it was coded to infiltrate into the smartphones of target users, be it IOS or Android, and it converts personal devices into surveillance devices. It is the main product of NSO group which was founded by Niv Carmi, Shalev Hulio and Omri Lavie. It is a Herzliya based company located near Tel Aviv, Israel which was founded in 2010, it is a subsidiary of Q Cyber Technologies group of companies.
What is the actual meaning of a Spyware?
Let’s get this straight, in simple words, a spyware is the term given to a category of software which aims to steal personal or organisational data/information without the consent of host. Once a spyware is successfully installed, it starts sending the data from that computer/mobile in the background to a third-party which is controlling this spyware. This third-party can be any government or The NSO group itself.
Pegasus can bypass your phone’s security and install malware that grants complete access to your device. It can access every message you’ve ever sent and received, every photo, video and email, can turn on your microphone, even when you’re not using a phone call, just record what you’re doing in the room. It can turn on your camera, and is also able to record what’s on your screen, can access your GPS, it can monitor your location. And it is able do all of this without you ever knowing.
So if you think that you are using online chatting apps like WhatsApp owned by Facebook or Signal owned by Moxie Marlinspike and Brian Acton which are famous for end-to-end encryption but this gets meaningless once Pegasus is on your phone. It is virtually undetectable which makes it even more lethal.
History of Pegasus software :
To begin with the brief history of Pegasus, in 2016 the Canadian Cybersecurity Organisation The Citizen Lab encountered it’s first case on the smartphone of Human Right activist Ahmed Mansoor.
In addition, in September 2018 The Citizen Lab published a report identifying 45 countries in which Pegasus was being used.
Furthermore, in the year 2019 WhatsApp exposed that journalists and Human Rights Activists in India were under surveillance by operators using Pegasus.
The latest case of this spyware is found India in July 2021, The Pegasus Project revealed that various governments used the software to spy on governmentofficials, oppositionpoliticians and many more eminent faces. Some records state that Indian government used the software to spy on around 300 people between 2019 and 2021.
Is spying legal in India?
The laws governing surveillance in India are The Telegraph Act, 1885 which indicates about the interception of calls and The Information Technology Act, 2000, it deals with the interception of data. Under both the laws, only government, under certain circumstances, is allowed to conduct surveillance. Moreover, hacking in India is illegal under IT Act.
Is there any solution to save us from this cyber attack havoc ?
Many Cybersecurity experts state that a phone infiltrated by Pegasus might not be able to recover completely, some traces can be found even after a strong factory reset.
Although they have introduced some preventive measures to save oneself from getting hitched with this software.
Open links only from trusted websites, contacts and sources while using your device.
Please make sure that your device is fully upgraded with the latest patches and system/app updates.
Keep your device safe by limiting physical access. This can be done by applying pin, password, biometric locking and face-locking facility.
Also avoid using open Wi-fi or hotspot as the host may steal your data from the network connection. Try using VPN to prevent this condition while using Wi-fi or hotspots it is a safer option to prevent your information.
Do have a backup of your credentials and important documents, if in case your device is lost, stolen or broken you will never lack from your data.
I for one, got sceptical about the internet, when I was signing up for a newsletter for some website. The ones that end up being unread in the spam folder of the inbox.
As I was about to type in my details, an option popped up on my device, offering to type out the my details for me. The moment I clicked ‘ok’, it entered all my details, which even I, myself got wrong at times. Alarmed was not the word for it.
Being a law student, a paper in the current semester brought me up close with the nuances of cyber security and its relevance in this new age world.
Prior to that, me, being a victim of a cyber attack, never crossed my mind. It felt as the fort of the ‘big body corporates’ and hackers as we’ve seen in the movies.
The scene starting of with a shot of the outside of a high rise building and then the scene progressing into the interiors filled with people in expensive suits hustling and bustling. Then we were shown a guy Sitting in a shady corner, mostly, in a far away place, with blood shot eyes behind the specs, with the hoody on and staring onto the screen with the concentration of a heart surgeon conducting bypass surgery, not concerned about the realities of the world.
The power of what all a person can accomplish with a gadget connected to the internet is old news for us, but the intensity of the troubles are worth pondering about.
The need for educating people of all walks of life about the dangers of the internet and how to steer clear is indeed the need of the hour.
If systems of international banks can be compromised over the web, why not a person like you and me, who are unaware of the pool we’ve our legs dipped in.
Surely, it has made our lives easier, closer and more colourful, but don’t forget that there are two sides to every coin. We go about living our lives believing that the ‘common man’ will never be vulnerable to cyber attacks.
In the quest of becoming more social, we often get carried away on a few things. A couple of decades back and even now at times, the society as a whole gets sceptical of exposing sensitive datas like addresses, contact details and other stuff to a complete stranger.
But now, to fit in, we’ve all details from our DOB to mail ids and everything and anything on the web for people to access. What if it goes into the hands of the wrong kind?
Completely forgetting that everything about them is just a few taps away on some site.
Most importantly I believe conversations in the past were restricted due to the fear of getting punched in the face. But now the power of the internet has made anybody a ‘somebody’, a ‘keyboard warrior’; people, hiding away behind a screen, doing anything, feeling assured against not getting punched, at all.
Sure, we can justify all these, that we’ve progressed and become free thinking but people are still people.
We were taught not to step into the cars of a stranger but now we book and share cabs with people who we’ve never met.
Whole of my life I was asked to live by the rules and I believe that’s the best way to live. When all my peers started downloading movies and songs, from random sites, I’ve never felt the need; because I’ve always been certain that there’s nothing like a ‘free lunch’ in this world. People play it smart, by downloading pirated stuff, believing that they pulled a fast one, unaware of the threats posed by such sites.
Cyber security experts have time and again conferred that such articles are often kept out as baits for snatching the weak ones. You may never know when your luck runs out.
Everything comes with a cost.
The very websites that may host such pirated content may contain malware that might end up compromising your system.
Taking everything from basic details to bank info along with it. Enough to make you lose everything you own to your name in a matter of seconds. Losing everything you’ve had to strive for your entire life, gone, in just a matter of minutes, to download a movie or two, is something we can surely live without, right?
Most websites know us like the back of their hands with the algorithms they use. Next time when you see an ad for something you were searching for a little while back, coincidence, I think not.
Digital footprint is something that’s not talked about. It’s the track of what all we’ve done across the Internet. The track would itself suffice to tell a tale or two about us.
They say energy can’t be destroyed, same applies to data, once created it can never be destroyed. Every single time we send a doc or text to the Recycle bin and get it erased from there, we feel we’ve got it out of the system. But apparently what happens is that the data gets taken out from the view but will continue to be stored on the hard disk. The tech is so advanced that, nowadays anyone can buy a software and retrieve all kinds of data from your device.
The vastness of the internet has made us ever so negligent of what all we do. .
Every time we hear somebody being a victim of a cyber attack, we judge them, that very moment, that ‘they should’ve been more careful.’ But how safe do you think you’re? It might be somebody today, and you tomorrow. Think twice before your next type/leap.
It’s better to be safe than sorry.
As the internet gets more and more entangled with our day to day lives, going the extra mile to ensure that no data is unnecessarily shared can make all the difference in all the world.
The internet is nothing more than a large network connecting and abridging the gaps between networks. It grants us access to everything and anything.
But always remember a bridge has two ends, what may connect us to everything, connects us to them too.
You must be logged in to post a comment.