Emerging technologies and cybersecurity
INTRODUCTION
Today man can send and receive any form of data be it an e-mail or an audio or video just by the click of a button but did he ever think how securely his data is being transmitted or sent to the other person safely without any leakage of information?? The answer lies in cyber security. Today the Internet is the fastest-growing infrastructure in everyday life. In today’s technical environment, many latest technologies are changing the face of mankind. But due to these emerging technologies we are unable to safeguard our private information in a very effective way and hence these days cyber crimes are increasing day by day. Today more than 60 percent of total commercial transactions are done online, so this field requires a high quality of security for transparent and best transactions. Hence cyber security has become the latest issue. The scope of cyber security is not just limited to securing the information in the IT industry but also to various other fields like cyberspace etc. Even the latest technologies like cloud computing, mobile computing, E-commerce, net banking, etc also need a high level of security. Since these technologies hold some important information regarding a person their security has become a must thing.
Emerging technologies have been both sensationalized and under-studied. They have been sensationalized because investment and interest in their development partially depend on their potential. They have been understudied because that potential is yet unknown and is likely to be far greater and more widely applicable than imaginable. Underscoring all of this is the translation of technological and scientific development to policy. Overshadowing all of this is the cybersecurity of these technologies and how vulnerable these technologies may be to cyber threats. Crucially, emerging technologies will not only impact the cyber domain. Engineered biology will impact the healthcare sector and pharmaceutical industries. Nanotechnology could contribute to new solutions for dealing with the climate emergency.
CYBER SECURITY
Data privacy and security will always be top security measures that any organization takes care of. We are presently living in a world where all the information is maintained in a digital or a cyber form. Social networking sites provide a space where users feel safe as they interact with friends and family. For home users, cyber-criminals would continue to target social media sites to steal personal data. Not only on social networking but also during bank transactions a person must take all the required security measures
There will be new attacks on Android operating system-based devices, but it will not be on a massive scale. The fact tablets share the same operating system as smartphones means they will be soon targeted by the same malware as those platforms. The number of malware specimens for Macs would continue to grow, though much less than in the case of PCs. Windows 8 will allow users to develop applications for virtually any device (PCs, tablets, and smartphones) running Windows 8, so it will be possible to develop malicious applications like those for Android, hence these are some of the predicted trends in cyber security.
TRENDS CHANGING CYBER SECURITY
Here mentioned below are some of the trends that are having a huge impact on cyber security.
Web servers
The threat of attacks on web applications to extract data or distribute malicious code persists. Cybercriminals distribute their malicious code via legitimate web servers they’ve compromised. But data-stealing attacks, many of which get the attention of the media, are also a big threat. Now, we need a greater emphasis on protecting web servers and web applications. Web servers are especially the best platform for these cyber criminals to steal data. Hence one must always use a safer browser, especially during important transactions in order not to fall prey to these crimes.
TRENDS CHANGING CYBER SECURITY
Here mentioned below are some of the trends that are having a huge impact on cyber security.
Web servers
The threat of attacks on web applications to extract data or distribute malicious code persists. Cybercriminals distribute their malicious code via legitimate web servers they’ve compromised. But data-stealing attacks, many of which get the attention of the media, are also a big threat. Now, we need a greater emphasis on protecting web servers and web applications. Web servers are especially the best platform for these cyber criminals to steal data. Hence one must always use a safer browser, especially during important transactions in order not to fall prey to these crimes.
Cloud computing and its services
These days all small, medium, and large companies are slowly adopting cloud services. In other words, the world is slowly moving towards the clouds. This latest trend presents a big challenge for cyber security, as traffic can go around traditional points of inspection. Additionally, as the number of applications available in the cloud grows, policy controls for web applications and cloud services will also need to evolve to prevent the loss of valuable information. Though cloud services are developing their models still a lot of issues are being brought up about their security. The cloud may provide immense opportunities but it should always be noted that as the cloud evolves so as its security concerns increase.
APTs and targeted attacks
APTs and targeted attacks APTs (Advanced Persistent Threats) are a whole new level of cyber crimewave. For years network security capabilities such as web filtering or IPS have played a key part in identifying such targeted attacks (mostly after the initial compromise). As attackers grow bolder and employ more vague techniques, network security must integrate with other security services to detect attacks. Hence one must improve our security techniques to prevent more threats coming in the future.
Mobile Networks
Today we can connect to anyone in any part of the world. But for these mobile networks security is a very big concern. These days firewalls and other security measures are becoming porous as people are using devices such as tablets, phones, PCs, etc all of which again require extra securities apart from those present in the applications used. We must always think about the security issues of these mobile networks. Further mobile networks are highly prone to these cyber crimes a lot of care must be taken in case of their security issues.
IPv6: New Internet protocol
IPv6 is the new Internet protocol that is replacing IPv4 (the older version), which has been the backbone of our networks in general and the Internet at large. Protecting IPv6 is not just a question of porting IPv4 capabilities. While IPv6 is a wholesale replacement in making more IP addresses available, there are some very fundamental changes to the protocol that need to be considered in security policy.
Encryption of the code
Encryption at the very beginning level protects data privacy and its integrity. However, more use of encryption brings more challenges in cyber security. Encryption is also used to protect data in transit, for example, data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercoms, etc. Hence by encrypting the code, one can know if there is a leakage of information.
The most common types of cyber threats include
Hence the above are some of the trends changing the face of cyber security in the world.
Remote Procedure Call.
SQL Injections.
Browser.
Cross Site Scripting.
Hacking.
Social Engineering.
Physical Security Attacks.
Viruses and Malware (malicious software).
ROLE OF SOCIAL MEDIA IN CYBER SECURITY
will contribute a lot to personal cyber threats. Social media adoption among personnel is skyrocketing and so is the threat of attack. Since social media or social networking sites are almost used by most of them every day it has become a huge platform for cybercriminals to hack private information and steal valuable data. In a world where we’re quick to give up our personal information, companies have to ensure they’re just as quick in identifying threats, responding in real time, and avoiding a breach of any kind. Since people are easily attracted by these social media hackers use them as bait to get the information and the data they require. Hence people must take appropriate measures, especially in dealing with social media to prevent the loss of their information. The ability of individuals to share information with an audience of millions is at the heart of the particular challenge that social media presents to businesses. In addition to giving anyone the power to disseminate commercially sensitive information, social media also gives the same power to spread false information, which can be just as damaging. The rapid spread of false information through social media is among the emerging risks identified in the Global Risks 2013 report. Though social media can be used for cyber crimes these companies cannot afford to stop using it as it plays an important role in the publicity of a company. Instead, they must have solutions that will notify them of the threat to fix it before any real damage is done. However, companies should understand this, recognize the importance of analyzing the information, especially in social conversations, and provide appropriate security solutions to avoid risks. One must handle social media by using certain policies and the right technology.
CYBER SECURITY TECHNIQUES
Access control and password security
The concept of username and password has been the fundamental way of protecting our information. This may be one of the first measures regarding cyber security.
Authentication of data
The documents that we receive must always be authenticated before downloading that is it should be checked if it has originated from a trusted and reliable source and that they are not altered. Authenticating these documents is usually done by the anti-virus software present on the devices. Thus good anti-virus software is also essential to protect the devices from viruses.
Malware scanners
This software usually scans all the files and documents in the system for malicious code or harmful viruses.
CYBER ETHICS
Cyber ethics are nothing but the code of the internet. When we practice these cyber ethics there are good chances of us using the internet properly and more safely.
Below are a few of them DO use the Internet to communicate and interact with other people. The Internet is considered as world’s largest library with information on any topic in any subject area, so using this information correctly and legally is always essential. Do not operate others' accounts using their passwords. Never try to send any kind of malware to other’s systems and make them corrupt. Never share your personal information with anyone as there is a good chance of others misusing it and finally, you would end up in trouble. When you’re online never pretend to be the other person, and never try to create fake accounts on someone else as it would land you as well as the other person into trouble. Always adhere to copyrighted information and download games or videos only if they are permissible. The above are a few cyber ethics one must follow while using the internet. We are always taught proper rules from our very early stages the same here we apply in cyberspace.
CONCLUSION
As we come to conclude that discussion on cybersecurity we conclude that this is an issue that affects everyone, from individuals to a large organization. Computer security is a vast topic that is becoming more important because the world is becoming highly interconnected, with networks being used to carry out critical transactions. Cybercrime continues to diverge down different paths with each New Year that passes and so does the security of the information. The latest and disruptive technologies, along with the new cyber tools and threats that come to light each day, are challenging organizations with not only how they secure their infrastructure, but also how they require new platforms and intelligence to do so. There is no perfect solution for cyber crimes but we should try our level best to minimize them to have a safe and secure future in cyberspace