You are on page 1of 1

The world is hardly wired for cyber resilience

Defending civilian targets and infrastructure against rising cyberattacks will stretch the capability of governments
processing company, was the tar- to entire communities. and abuse. With mobile and cloud
get of a ransomware attack; the It would be a mistake to believe computing expanding rapidly, and
company also paid a ransom in that we can hope for a respite from also given the nature of the on-go-
millions. cyberattacks such as ransomware ing pandemic, cybersecurity pro-

GETTY IMAGES/ISTOCKPHOTO
and phishing. Cybercriminals are fessionals are now engaged in
Now, civilian targets becoming more sophisticated, and building a ‘Zero Trust Based Envi-
M.K. Narayanan These attacks were all primarily are now engaged in stealing sensi- ronment’, viz., zero trust on end
on civilian targets, though each tive data in targeted computers be- point devices, zero trust on identi-
one was of critical importance. fore launching a ransomware at- ty, and zero trust on the network

A
string of high-profile cyber- Obviously cyber, which is often re- tack. This is resulting in a kind of to protect all sensitive data. What
attacks in recent months has ferred to as the fifth domain/di- ‘double jeopardy’ for the targeted is of interest is that there do exist
exposed vulnerabilities in mension of warfare, is now largely victim. Also, today’s cybercrimi- quite a few niche companies to-
the critical infrastructure of even being employed against civilian region. nals, specially those specialising in day, which have developed (or are
advanced nations. This has rein- targets, bringing the war into our Cyber warfare is replete with ransomware and similar attacks, developing) newer technologies to
forced the need for improved de- homes. Most nations have been several damaging methodologies. are different from the ordinary create a Zero Trust Based environ-
fences against actual, and poten- concentrating till date mainly on In the civilian domain, two key run-of-the-mill criminals. Many ment employing: software defined
tial, cyberattacks by all countries erecting cyber defences to protect manifestations of the ‘cat and are known to practise ‘reverse en- solutions for agile perimeter se-
across continents. military and strategic targets, but mouse game’ of cyber warfare to- gineering’ and employ ‘penetra- curity, secure gateways, cloud ac-
this will now need to change. The day, are ransomware and phish- tion testers’ to probe high secure cess security, privileged access
America under attack obsession of military cyber plan- ing, including spear phishing. networks. management, threat intelligence
Several high-profile cyberattacks ners has been to erect defences Ransomware attacks have skyrock- The bad news is that the cyber platforms, static and dynamic data
were reported from the United against software vulnerabilities re- eted, with demands and payments landscape is poised to undergo masking, etc. The moot point is
States during the past several ferred to as ‘Zero-day’, that had going into multi-millions of dol- more fundamental changes. Mo- whether not only those in authori-
months. Towards the end of 2020, the capability to cripple a system lars. India figures prominently in tivation for cyberattacks vary: for ty but even more so those in the
for instance, a major cyberattack and could lie undetected for a long this list, being one of the most af- (some) nation states, the motiva- world of business, (specially oil
headlined ‘SolarWinds’ — and be- time. (The most celebrated Zero- fected. Also experts believe that of tion is geopolitical transformation; and finance, and specifically
lieved to have been sponsored day software of this kind to date is late, the recovery cost from the im- for cybercriminals, it is increased health care) are aware of this —
from Russia — had rocked the U.S. Stuxnet, which almost crippled pact of a ransomware attack — in profits; for terror groups, the mo- and, more important, are ready to
It involved data breaches across Iran’s uranium enrichment pro- India, for example, has tripled — tivation remains much the same, utilise these technologies — to
several wings of the U.S. govern- gramme some years back). Today, and mid-sized companies, in par- but the risk factor may be lower. ward-off a cyberattack and safe-
ment, including defence, energy other Zero-day software, no doubt ticular, today face a catastrophic However, it is ‘insider threats’ — guard their data.
and state. Before the U.S. could exist, though little is known about situation, if attacked, and may due to discontent with the man-
even recover from this breach, them. What is, however, evident is even have to cease operations. agement or for personal reasons — Preparation is needed
thousands of U.S. organisations that a whole new market currently Thus, the need to be aware of the that could well become an omni- Building deep technology in cyber
were hacked in early 2021 in an un- exists for Zero day software out- nature of the cyber threat to their potent reality. is essential. New technologies
usually aggressive cyberattack, by side the military domain, and the businesses and take adequate pre- such as artificial intelligence, Ma-
a Chinese group Hafnium, which world must prepare for this cautionary measures, has become Need for data protection chine learning and quantum com-
had exploited serious flaws in Mi- eventuality. extremely vital. Banking and fi- Cybersecurity essentially hinges puting, also present new oppor-
crosoft’s software, thus gaining re- Defending civilian targets, and nancial services were most prone on data protection. As data be- tunities. Nations that are
mote control over affected more so critical infrastructure, to ransomware attacks till date, comes the world’s most precious adequately prepared — concep-
systems. against cyberattacks such as ran- but oil, electricity grids, and lately, commodity, attacks on data and tually and technologically — and
In quick succession, thereafter, somware and phishing, including health care, have begun to figure data systems are bound to intensi- have made rapid progress in artifi-
the U.S. has witnessed three more spear phishing, apart from un- prominently. fy. Reportedly, we create more cial intelligence and quantum
major attacks: an audacious ran- known Zero day software, is al- than three quintillion bytes of data computing and the like will have a
somware attack by Russia/East Eu- most certain to stretch the capabil- Zeroing in on health care everyday (some put it at over 2.5 clear advantage over states that lag
rope-based cybercriminals, styled ity and resources of governments What is specially worrisome at this quintillion) — with several billion behind in these fields. Pressure al-
DarkSide, on Colonial Pipeline across the globe, somewhat in the time, when a pandemic is raging, devices interconnected to billions so needs to be put on officials in
(which is the main supplier of oil manner that nations have been is the number of cyberattacks on of end point devices exchanging the public domain, as also compa-
to the U.S. East Coast), compelling forced to find the resources and health-care systems. With data be- petabytes of sensitive data, on the ny boards, to carry out regular vul-
the company to temporarily shut the methods to deal with the CO- coming a vital element in today’s network. This is only bound to nerability assessments and create
down operations. The siege was VID-19 pandemic. One related pro- world, personal information has grow. Ensuring data protection necessary awareness of the grow-
lifted after Colonial Pipeline paid blem is that the distinction bet- become a vital commodity. One of could, hence, prove to be a rather ing cyber threat. In the end, it
out several million dollars as ran- ween military and civilian targets the more vulnerable areas where thankless task, complicating the might be appropriate to quote IBM
som to unlock its computers and is increasingly getting erased and data tends to be linked to a specific lives of Information and other se- Chairman, Arvind Krishna, that
release its files. There are reports the consequences of this could be individual is in health care. Com- curity professionals. cybersecurity will be “the pressing
of the ransom being received in indeterminate. For instance, the promised ‘health information’ is The data life cycle can broadly issue of this decade” and that “va-
bitcoins which was later seized by 2012 cyberattack on Aramco, em- proving to be a vital commodity be classified into data at rest lue lies in the data and people are
the U.S government. Another Rus- ploying the Shamoon virus, which for use by cybercriminals. All indi- (when it is being created and going to come after that data”.
sia-backed group, Nobellium, next wiped out the memories of cations are that cybercriminals are stored), data in motion (when it is
launched a phishing attack on 30,000 computers of the Saudi increasingly targeting a nation’s being transmitted across insecure M.K. Narayanan, currently Executive
3,000 e-mail accounts, targeting Aramco Oil Corporation, has ever health-care system and trying to and uncontrolled networks), and Chairman of CyQureX Pvt. Ltd., a U.K.-
USAID and several other organisa- since been one reason for the very gain access to patients’ data. The data in use (when it is being con- U.S.A. cybersecurity joint venture, is a
tions. Early this month, JBS SA, the frosty relations between different available data aggravates the risk sumed). Constant exposure lends former National Security Adviser and a
U.S. subsidiary of a Brazilian meat countries in West Asia and the Gulf not only to the individual but also itself to ever increasing data thefts former Governor of West Bengal

You might also like