Besides the use of AI to replace humans in repetitive tasks, data becomes an important asset to achieve global power. Cybersecurity assumes a lot more importance in 2020 because:
• Increased availability of high-speed internet, rapid digitization happening globally, and an equivalent growth in cybercrimes to gain unauthorized access to confidential and sensitive information, data and network security assume prioritized significance.
• Cyber related crimes are estimated to cause damages about $6tn worldwide.
• Fastest-growing segment. The market grew by 35X over 13 years.
• Forbes stated “Cybersecurity — job sector of the future” in one of its articles. The focus on cybersecurity in the next 5 years throughout the world by private companies & national governments.
• Huge supply gap estimated; approximately 3.5 million vacancies will be present in the cybersecurity job sector by 2021.
• Promotion of the Digital India scheme by the Government of India through.
• Exponential growth in online transactions.
• Digitization of government records.
• Citizens availing e-services from businesses and the government ever-increasing.
• Hacktivism being identified as a form of protest.
• Relatively low awareness among the masses about Cyber threats.
CYBERTHREATS IN IoT BASED TRANSPORTATION
IoT and Smart, self-driving vehicles and drones are a reality. Much research and financial investments are being made in these fields. It is necessary to know that these devices work on the basis of commands which they receive, and if those signals/commands are in any way, altered will lead to the failure of the intelligent transport system.
An intelligent transport system is a cyber-physical system. The objective of such a system is to effectively use the technologies to provide reliable, efficient mobility with safe driving experience and a better traffic management system, with minimalized congestion, time-effective, and cost-effective transportation.
The intelligent transport system is completely dependent upon the communication network through which it receives signals for its operation. Any vulnerability in the network could lead to failure in any of the performance parameters and lead to failure of multiple desired objectives. Simulation studies have shown that such systems are very much prone to cyber threats and hence before being deployed in the real-world case, these systems must be checked for all vulnerabilities to make them secure as a single vulnerability can be potentially life-threatening in rare cases.
CYBERTHREATS IN MOBILE DEVICES
Mobile devices have become very much handy and a major part of your work involving sensitive data occurs through them. It becomes important to list the cybersecurity threats in these devices:
1. Data leak
3. Insecure routers
4. Network spoofing
5. Spywares-Unsecure apps accessing confedential information
7. SMiShing- Getting Malware through SMS
8. Frauds and Scams
9. Broken Cryptography- In apps with weak cryptographic algorithms
Recently, the government has also advised the citizens to stay alert from malware attacks and do not open unverified links as there could be a surge in malware attacks in the coming weeks after India-China skirmish in Ladakh.
It must also be noted that when availing free services on your mobile device (free apps, free-wifi etc.) one should keep in mind that what information these services have access to as most of the times they are insecure and can lead to data leak or installation of malware in the device.