Note:
Upload you handwritten answers photos in comment section. Our team will check and reach you ASAP.
A simple introduction to this answer can revolve around a general statement about cyber space and cyber security.
The different types of threats which have been identified are:
Malware – Malicious software to disrupt computers
Viruses and worms
Theft of Intellectual Property or Data
Hacktivism – Cyber protests that are socially or politically motivated
Mobile Devices and applications and their associated Cyber Attacks
Social Engineering – Entice Users to click on malicious links
Spear Phishing – Deceptive Communications (e-mails, texts, tweets)
Domain Name System (DNS) Attacks
Router Security – Border Gateway Protocol (BGP) Hijacking
Denial of Service (DoS) – blocking access to websites
The motives are different for different cyber players such as:
Cybercriminals seek commercial gain from hacking banks and financial institutions as well as phishing scams.
Cyber terrorist seeks to penetrate and attack critical assets and national infrastructure.
Cyber espionage seeks to penetrate both corporate and military data using stealthy IT malware.
Cyber hacktivists have political agendas that hack sites and servers to virally communicate messages.
Body
You may incorporate some of the following points in the body of your answer:
Steps to Strengthen Cyber Security in India
1.Network Security: Protect your networks against external and internal attacks.
2.Malware Protection: Produce relevant policies and establish anti-malware defences that are applicable and relevant to all business areas.
3.Incident Management
4.Monitoring: Establish a monitoring strategy and produce supporting policies. Continuously monitor all ICT systems and networks.
5.User Education and Awareness
6.Home and Mobile Working
7.Secure Configuration: Apply security patches and ensure that the secure configuration of all ICT systems is maintained.
8.Removable Media Controls: Produce a policy to control all access to removable media.
9.Managing User Privileges: Establish account management processes and limit the number of privileged accounts.
10.Information Risk Management Regime: Establish and effective governance structure and determine your risk appetite.
Conclusion
Your conclusion should be short.
The government shall take appropriate steps for enhancing the awareness of citizens and small businesses for cybersecurity.
Cybersecurity Capacity building and training for professionals, extending the ISEA program, introducing curricula academia and organizing conferences.
Other Points to Consider
Cyber Security Challenges
Previous Year Questions 1.Discuss the potential threats of Cyber attack and the security framework to prevent it. (2017) 2.Discuss different types of cyber crimes and measures required to be taken to fight the menace. (2020) 3.What are the different elements of cyber security? Keeping in view the challenges in cyber security, examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy. (2022) |