Professional Documents
Culture Documents
20152021026
The Indian cyber laws are governed by the Information Technology Act,
penned down back in 2000. The principal impetus of this Act is to offer
reliable legal inclusiveness to eCommerce, facilitating registration of
real-time records with the Government. But with the cyber attackers
getting sneakier, topped by the human tendency to misuse technology,
a series of amendments followed. The ITA, enacted by the Parliament of
India, highlights the grievous punishments and penalties safeguarding
the e-governance, e-banking, and e-commerce sectors. Now, the scope
of ITA has been enhanced to encompass all the latest communication
devices.
The IT Act is the salient one, guiding the entire Indian legislation to
govern cyber crimes rigorously:
To briefly state what are some of the weaknesses of the existing cyber
laws in India:
A) Computer Virus
The talk about “what are network security threats” always begins with the
computer virus. There are plenty of network security examples in the past to help
you understand the impact a powerful virus like the Trojan can have on
organizations and personal machines. A study revealed that more than 30 percent
of computers in traditional homes can be affected by malware, especially viruses.
These are uniquely designed pieces of code that get distributed via emails and pen
drives (or even hard disks). The virus is known for disabling features and stealing
data from the target machine
B) Rogue Security Software
The talk about the different types of network security threats will remain
incomplete without the rogue security software. These are software programs,
designed to mimic the role played by an antivirus solution. However, the actual
purpose of the rogue software is extremely different. These programs do more
harm than good. They are often advertised as software programs that can remove
viruses. Yet, the actual job accomplished by these pieces of software is to steal user
data, and even leave the machine in a much worse state than, to begin with.
Moreover, the rogue software doesn’t come for free. Most of the time, users need
to pay for these programs.
C) Trojan
As mentioned previously, the virus is one of the biggest network security threats
and solutions have surfaced for years to fight powerful virus programs. Trojan is a
famous virus that hides behind legitimate pieces of software. Many times, this virus
spreads via email that is sent from known people. It can be in the form of an
attachment that is immediately downloaded into your machine.
The moment a Trojan program enters into your machine, it runs along with the
other programs. This allows the virus to extract crucial pieces of information from
your system. The virus is known for hijacking the web camera, and even stealing
account information.
The worm works by accessing the contacts stored in your machine. This could be
anything like a simple email address or a webpage. Fortunately, not all worms are
designed to result in trouble. These are smart programs that rely on the
vulnerabilities of the software to spread.
F) DDOS Attack
For many years, DOS and DDOS attacks have been recognized as active threats in
network security. These are errors that portray the impression of an overloaded
server. Many times, DDOS attacks surface when a group of people is awaiting
something interesting online. This could be anything like the launch of a product.
There have been occasions when famous search engines like Google have also
become victims of the DDOS attack. Few other terms used to identify such attacks
would be malicious traffic overload, denial of service, or the very famous DoS
Attack.
G) Phishing
Phishing is categorized as a form of social media engineering attacks. Fortunately,
some of the best network security software in the market can help your
organization steer clear from phishing attacks. The goal of these attacks is to fetch
your usernames, credit card numbers, and sensitive data like passwords. These
attacks are often framed in the form of text messages or emails. These messages
look and feel like legitimate requests.
They often trick the recipient into clicking a link or opening an attachment that can
install the malware in the computer of the recipient. Security Trails are a
great example of network security threat protection. These trails can help you
uncover many phishing domains.
H) Rootkit
Rootkit is often categorized under external network security threats. This is a
collection of tools that allow hackers to access computers and networks from
different origins. The tool allows the hacker to serve as the administrator of the
network or machine. This means they have the freedom and authorization to
perform a range of malicious operations.
The Rootkit tool is often accompanied by password hackers, keyloggers, and even
pieces of code to disable antivirus programs in the target machine. Just like many
other forms of modern network security threats, the Rootkits hide behind
legitimate pieces of software.