Challenges to Cyber Security

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

Different Elements of Cyber Security Strategy

  • Application Security: Application security is all about keeping software applications impervious to threats.
  • Information Security: Information security covers the protection of company data and the data that you collect from customers, clients, or vendors.
  • Disaster Recovery Planning: Disaster recovery protections include two important components:
    1. Strategies for preventing a breach or malware infection
    2. Preparations for fast recovery should you fall victim to an attack
  • Network Security: Network security involves protecting your physical network and all the devices connected to it
  • End-user Security: End-user security is also known as end-point security. This refers to protecting the devices that users work with, and users themselves.
  • Operational Security: Operational security involves taking a step back and looking at your entire security strategy as a whole to ensure that all security tactics are working in unison throughout your operations, and that none are in conflict with one another.

Challenges of Cyber Security

  • It is becoming more difficult to distinguish between military and civilian targets, with potentially unpredictable results.
  • Attacks against data and data systems will inevitably increase as data becomes the most valuable commodity in the world.
  • Nowadays, cybercriminals steal private information from targeted devices before initiating a ransomware assault.
  • Digital divides between nations lead to an unsustainable online ecosystem.
  • Insecure Internet of Things architecture is common. Hackers also benefit from new technologies.

Need for National Cyber Security Strategy

  • Large scale digitisation of public services.
  • Developing institutional capability for assessment, evaluation, certification, and rating of the core devices.
  • Timely reporting of vulnerabilities and incidents.
  • Monitoring and mapping of the supply chain of the Integrated Circuits (ICT) and electronics products.
  • Devising audit parameters for threat preparedness and developing cyber-insurance products.
  • Developing state-level cybersecurity policies.
  • Policy intervention in cybersecurity granting incentives for a higher level of cybersecurity preparedness.
  • Research, innovation, skill-building and technology development.