Mains Practice Question

Back

Note:
Upload you handwritten answers photos in comment section. Our team will check and reach you ASAP.

Topic

What are the different types of cyber-attacks? Discuss steps to strengthen cyber security in India
 
Introduction

A simple introduction to this answer can revolve around a general statement about cyber space and cyber security.

  • Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
  • Cyber Intrusions and Attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy.
  • India ranks 3rd in terms of the highest number of internet users in the world after the USA and China which makes it more vulnerable to threats.
  • The Cyber & Information Security (CIS) division of MHA deals with matters relating to cybersecurity, cybercrime, national information security policy and guidelines (NISPG) and its implementation, and the national intelligence grid.

The different types of threats which have been identified are:

Malware – Malicious software to disrupt computers

Viruses and worms

Theft of Intellectual Property or Data

Hacktivism – Cyber protests that are socially or politically motivated

Mobile Devices and applications and their associated Cyber Attacks

Social Engineering – Entice Users to click on malicious links

Spear Phishing – Deceptive Communications (e-mails, texts, tweets)

Domain Name System (DNS) Attacks

Router Security – Border Gateway Protocol (BGP) Hijacking

Denial of Service (DoS) – blocking access to websites

The motives are different for different cyber players such as:

Cybercriminals seek commercial gain from hacking banks and financial institutions as well as phishing scams.

Cyber terrorist seeks to penetrate and attack critical assets and national infrastructure.

Cyber espionage seeks to penetrate both corporate and military data using stealthy IT malware.

Cyber hacktivists have political agendas that hack sites and servers to virally communicate messages.

 

Body

You may incorporate some of the following points in the body of your answer:

Steps to Strengthen Cyber Security in India

1.Network Security: Protect your networks against external and internal attacks.

2.Malware Protection: Produce relevant policies and establish anti-malware defences that are applicable and relevant to all business areas.

3.Incident Management

  • Establish an incident response and disaster recovery capability.
  • Produce and test incident management plans.
  • Provide specialist training to the incident management team.
  • Report criminal incidents to law enforcement.

4.Monitoring: Establish a monitoring strategy and produce supporting policies. Continuously monitor all ICT systems and networks.

5.User Education and Awareness

  • Produce user policies covering acceptable and secure use of the organisation’s systems.
  • Establish a staff training programme.

6.Home and Mobile Working

  • Develop a mobile working policy and train staff to adhere to it.
  • Apply the secure baseline to all devices.

7.Secure Configuration: Apply security patches and ensure that the secure configuration of all ICT systems is maintained.

8.Removable Media Controls: Produce a policy to control all access to removable media.

9.Managing User Privileges: Establish account management processes and limit the number of privileged accounts.

10.Information Risk Management Regime: Establish and effective governance structure and determine your risk appetite.

Conclusion

 

Your conclusion should be short.

The government shall take appropriate steps for enhancing the awareness of citizens and small businesses for cybersecurity.

Cybersecurity Capacity building and training for professionals, extending the ISEA program, introducing curricula academia and organizing conferences.

 

Other Points to Consider

Cyber Security Challenges

 

Previous Year Questions

1.Discuss the potential threats of Cyber attack and the security framework to prevent it. (2017)

2.Discuss different types of cyber crimes and measures required to be taken to fight the menace. (2020)

3.What are the different elements of cyber security? Keeping in view the challenges in cyber security, examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy. (2022)

02-Aug 2023
0 Comments