- INFORMATION & COMMUNICATION TECHNOLOGIES
- Fundamentals of ICT and the Internet
- Telecommunications and Connectivity
- Emerging Technologies
- Cyber Security and the Legal Framework
- ICT Prelims Previous Year Questions
Cyber Security
Definition
It is the ongoing practice of defending computers, servers, mobile devices, electronic systems, and digital networks from malicious cyber attacks.
The Core Objective
The entire field of cyber security is based on maintaining the CIA Triad:
- Confidentiality: Ensuring data is accessed strictly by authorized individuals.
- Integrity: Ensuring data is completely accurate and not tampered with by hackers.
- Availability: Ensuring networks and data are always available to authorized users when needed.
Cyber Security Fundamentals: Types of Cyber Threats
Cyber threats are malicious acts intended to steal sensitive data, cause digital damage, or disrupt the normal functioning of computer networks. Understanding these highly specialized threats is the crucial first step in building a strong national digital defense.
1. Malware (Malicious Software)
To deliver these services, e-Districts rely on core e-Governance infrastructure:
- State Wide Area Networks (SWANs) – connectivity backbone.
- State Data Centres (SDCs) – hosting of applications and data.
- Common Service Centres (CSCs) – physical front-end for service delivery, especially in rural areas.
- Service Delivery Gateways (SDGs) – integration across departments.
2. Botnets (Robot Networks)
- Definition: A Botnet is a massive network of thousands of infected, ordinary computers (often called “zombies”) that are controlled remotely by a single cybercriminal.
- Mechanism: The attacker secretly infects these computers with specific malware. Without the real owners knowing, the attacker uses the combined computing power of all these infected machines to launch large-scale coordinated attacks.
- Usage: They are most commonly used to send out millions of spam emails or to execute massive cyber attacks against government or banking servers.
3. DDoS (Distributed Denial of Service)
- Definition: A highly disruptive attack designed to completely shut down a website, server, or digital network, making it inaccessible to its actual, legitimate users.
- Mechanism: The attacker uses a Botnet to artificially flood the target server with an overwhelming amount of fake internet traffic and data requests.
- Impact: Unable to handle the massive sudden load, the system crashes. For example, a DDoS attack on an airline portal would prevent real passengers from booking tickets or checking flight statuses.
4. Cryptojacking
- Definition: A stealthy, financially motivated cybercrime where a hacker secretly uses a victim’s computing power and electricity to artificially “mine” cryptocurrency.
- Mechanism: The attacker infects a computer or a website with a malicious script. While the victim is browsing the internet or working, the script runs quietly in the background, solving complex math problems to generate digital coins for the hacker.
- Impact: It does not steal personal data, but it severely slows down the victim’s device, overheats the hardware, and drastically increases electricity consumption.
Types of Cyber Security
To effectively protect massive digital infrastructures and highly sensitive citizen data, the field of cybersecurity is divided into specialized domains. Each specific domain focuses strictly on defending a different layer of the digital ecosystem from unauthorized access.
1. Network Security
- Focus: Designed to protect the usability and integrity of the underlying corporate or government network infrastructure.
- Function: It acts as the digital boundary wall. It actively monitors incoming and outgoing internet traffic to prevent hackers from entering the internal network.
- Tools Used: It heavily relies on hardware and software tools like Firewalls (which block suspicious traffic), Intrusion Detection Systems (IDS), and Virtual Private Networks (VPNs) for secure, encrypted communication.
2. Cloud Security
- Focus: Specifically protects sensitive data, applications, and infrastructure hosted in remote cloud computing environments (like Amazon Web Services or the government’s National Cloud).
- Function: Since the data is not stored on a local computer, cloud security ensures that data remains strictly confidential and available only to authorized users, even when accessed from different parts of the world.
- Tools Used: Involves strict Identity and Access Management (IAM), advanced data encryption, and continuous monitoring of cloud storage configurations.
3. Endpoint Security
- Focus: Protects the actual “endpoints”—the individual end-user devices such as laptops, desktop computers, and servers connected to a corporate network.
- Function: Hackers often target these devices as the weakest link to gain access to the main network. Endpoint security ensures that if a device is compromised, the threat cannot spread further.
- Tools Used: Relies on modern, continuously updated Antivirus software, anti-malware programs, and behavior-blocking technologies installed directly on the user’s machine.
4. Mobile Security
- Focus: A specialized subset of endpoint security that strictly focuses on protecting smartphones, tablets, and wearable devices from targeted digital threats.
- Function: Protects users from downloading malicious, fake applications, prevents data theft over unsecured public Wi-Fi networks, and secures mobile banking transactions.
- Tools Used: Features include Mobile Device Management (MDM) software, remote data wiping (if a phone is stolen), and strict biometric app authentication.