You are on page 1of 7

Question:

Technical issues and challenges in cyber security.


Answer:
What is cyber security:
Cybersecurity is the process of defending computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks. It is also known as information security. The term applies
in a difference of contexts, from business to mobile computing, and can be divided into some
common categories.
· Network security is the act of securing a computer network from unwanted entry, whether targeted
attackers or opportunistic malware.
· Application security use to keep software and devices free of threats. An undetermined application
could provide access to the data is designed to protect. Effective security begins in the design stage,
well before a program or device is deployed.
· Information security ensures the integrity and privacy of data, both in storage and in transit.
· Operational security adds the processes and decisions for handling and ensuring data assets. The
permissions actor has when accessing a network and the methods that determine how and where data
may be stored or shared all fall under this umbrella.
· Disaster recovery and business continuity define how a company responds to a cyber-security
incident or whatever another event that causes the loss of task or data. Disaster recovery policies
manage how the association re-establishes its operations and information to return to a similar
operating capacity as before the event. Business congruity is the plan the organization depends on
while trying to operate without certain resources.
· End-user education addresses the most erratic cyber-security factor: people. Anyone can
inadvertently introduce a virus to an otherwise secure system by neglecting to follow good security
practices. Instructing users to delete suspicious email attachments, not plug in unidentified USB
drives, and different other significant exercises are crucial for the security of any association.
The scale of the cyber threat
The worldwide cyber threat keeps on advancing at a rapid pace, with a rising number of data breaks
each year. A report by Risk Based Security uncovered that a stunning 7.9 billion records have been
exposed by data breaks in the first nine months of 2019 alone. This figure is more than double (112%)
the number of records uncovered in the same period in 2018.
Medical services, retailers and public entities encountered the most penetrates, with malicious
criminals responsible for most occurrences. Some of these sectors are more speaking to cyber
criminals because they gather financial and medical data, but all organizations that utilized networks
can be targeted for customer data, corporate espionage, or customer attacks.
With the size of the cyber threat set to keep on rising, the International data corporation predicts that
global spending on cyber-security solutions will reach a massive $133.7 billion by 2022.
Governments over the globe have reacted to the rising cyber threat with guidance to help association
implement effective cyber-security practices.
Issues:
1) The Rise of Multi-Cloud Computing

With more stages and services dwelling in the virtual world, multi-cloud and remote computing are
the workspace of the future. Nonetheless, having a borderless worldwide society and more cloud-
based arrangement also means a broader attack surface, with more access and endpoints to secure, and
even greater chances of overlooking an exploitable vulnerability.
2) State-Sponsored Attacks

Hacking is not, at this point only the space of shadowy people or assemblages acting from a far
distance. The new criminal ventures are state-sponsored agents who are utilizing technology to cripple
adversaries through widespread attacks on critical systems. There is a threat of heightening not seen
since the nuclear arms race of the 50s. With such capacities, the playing field is levelled for littler,
progressively hazardous countries to wage large-scale attacks on bigger, better-prepared countries,
who will not be able to respond.
3) Insufficient logging and monitoring

Systems need to be checked constantly and in real-time, in order to detect any unusual behaviour.
Cautious observing additionally assists work with increasing far reaching
framework logs that are of extraordinary use in the measurable examination of any assault that occurs.
Recent developments in the IT world have shown that one of the most effective ways to spot new and
evolving threats is through host-based monitoring, such as with Endpoint Detection and Response
tools. These tools can facilitate effective incident response processes.
4) Poor systems hardening

Systems solidifying is prime to bring vulnerability to attack, through getting rid of practical assault
vectors and consolidating the ambush surface of the structures. Yet many tool installations have either
no or minimal hardening measures in place. Vulnerabilities are created in structures whilst, for
instance, access credentials are left of their default state or corporations use insecure protocols or
permissive services.
5) Shortage of Cybersecurity Professionals

• Cybersecurity spending is evaluated to reach $133.8 billion inside the following two years. In any
case, there is a worldwide deficiency of 2,930,000 cybersecurity-related place that are unfilled. Much
like the ascent in real-world crime leads to unsafe streets, absence of personnel to combat cybercrime
will promote more losses in money, reputations, and trust.

• One arrangement is to encourage students to investigate into cybersecurity careers instead of simply
directing them toward general STEM degrees.

Challenges:
1) Advanced Persistent Threats
• • Advanced Persistent Threats are those threats that go the subtle route around to entire
systems and servers and stays there for a more extended time without getting noticed/recognized by
anybody.

• • They are structure specially to mine highly delicate information and nowadays days many
organizations fail to protect themselves from advanced persistent threat attacks.

• • The APTs are dislike ordinary malware, they are structure specially to serve a purpose, and
in other words, they are being made for targeted attacks The following is one delineated lifecycle of
advanced persistent threat.
2) Evolution of Ransomware
• • The recent couple of years have seen a far reaching ascend in Ransomware attacks.
Ransomware can likewise be named one type of apt attack where a malware penetrates inside your
system, and as the days pass, it starts to encrypt all of your files slowly.

• • Finally, all the documents on one’s system get locked and a ransom is being requested
usually in the form of Bitcoin (Because it is hard to track it down).

• • Once the payment is made, a decryption key is being given by hackers, utilized which all the
data can be decrypted back and the access is returned.

• • There can be situations where a hacker with a very awful attitude may take all the demanded
money but still don’t give the decryption key.

• • Ransomware is the most despicable aspect of cybersecurity, data professionals, IT, and
officials. The following is a living structure of a Ransomware attack.
examples of Ransomware are Cryptolocker, Bad Rabbit, Wanna cry, Goldeneye, Zcrypter, Jigsaw,
Petya, etc.
3) IoT Threats (Attacks through compromised IOT devices)
• IoT represents the internet of things. The IoT is a system of interrelated computing, digital,
mechanical devices that can transmit information over a network without the need of any human to
human and human to devise intervention.
• All of these IoT gadgets have one kind of identifier that identifies the device through a unique code.
In today’s world, each computerized device that we use can be associated with a network and yes, it is
happening in almost all parts of the globe.
• By doing this, we have control over most of appliances and devices from a solitary purpose of
operation- let’s say your cell phone. In this day and age, you can use your cell phone to turn off the
lights, operate Alexa, operate collar and washing machines, etc. So, many consumer devices are now
interconnected.
• In different words, if you access one device, you’ve gotten to them all and this leads to increased
risk of attacks and gaps in securities.
• There could be numerous purposes behind these holes, for example, uncertain web interfaces and
information moves, absence of information about security, lacking validation techniques, unreliable
WIFI, and so forth. The following is a guide that shows dangers identified with the Internet of things.
4) Cloud Security
• There is dread is and numerous organizations are not willing to put their data on the cloud and they
need to be held for a time unless it is ensured that cloud is an exceptionally secure place and it
matches with on-premise security standards.
• The primary reason is, big organizations have their own Data place and they have full control over
it, the data is located at their sites and their network, if there should be an occurrence of cloud, the
information no longer stands at organization's own Data communities and furthermore the system
becomes outer which represents a risk.
• Few issues lead to cloud attacks, few of them are – Cloud misconfigurations, Insecure APIs,
Meltdown and Spectre vulnerabilities, Data misfortune because of natural disaster or human error.
5) Attacks on Cryptocurrencies and Blockchain Adopted Technologies
• It’s not all that long that technologies like cryptocurrencies and blockchains have started to being
implemented.
• As these advanced technologies just have crossed their infancy level and there lies an extraordinary
path for their evolution, so adopting these technologies by the organization but not implementing the
appropriate security controls is a big threat, in the first place, they might not be aware of the gap itself.
• So, it is being exhorted, to comprehend the security controls before implementing these
technologies. A portion of the attacks made is Eclipse attack, Sybil attack, and DDOS attack.
6) Attacks Designed with the help AI and Machine Learning
Almost certainly the big data from all over the world is being fed to AI systems for different purposes,
and it helps us to make our decisions. While this is a decent side of it, there can be a bad side as well.
Hackers can also use AI and Machine Learning to design innovative solutions for performing out
increasingly advanced attacks.

You might also like