Cyber Security is the security of the information and its communicating channels as applied to computing devices such as computers and the smartphones as well as computer networks such as private and public networks including the Internet as a whole.

Cyber Security protecting cyber space including the critical information infrastructure from attack, damage, misuse and economic espionage.

  • Field covers all the processes and the mechanisms by which computer-based equipment information and services are protected from the unintended or unauthorized access, change or the destruction.
  • The Computer security also includes protection from unplanned events and natural disasters.
  • The Cyber security is a complex issue that cuts across multiple domains and calls for multi-dimensional, multilayered initiatives and responses.


Global Issue:

It has proved a challenge for the governments all around the world.

Task is made difficult by the inchoate and diffuse the nature of the threats and the inability to frame an adequate response in the absence of the tangible perpetrators.

Rapidity in the development of information technology (IT) and the relative ease with which applications can be commercialized has seen the use of cyberspace expand dramatically in its brief existence.

Cyber Attack

It is a malicious and the deliberate attempt by an individual or organization to breach the information system of the another individual or organization.

Motives behind Cyber Attacks

  1. To seek the commercial gain by hacking banks and financial institutions.
  2. To attack the critical assets of a nation.
  3. To penetrate into both corporate and the military data servers to obtain plans and intelligence.
  4. To hack sites to virally communicate a message for some specific campaign related to the politics and society.

 Types of Cyber Attacks

  • Malware: short for malicious software refers to any kind of the software that is designed to cause damage to a single computer, server, or computer network. So Ransomware, Spy ware, Worms, viruses, and Trojans are all varieties of malware.
  • Phishing: It is the method of trying to gather the personal information using deceptive e-mails and websites.
  • Denial of Service attacks: Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. The DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.
  • Man-in-the-middle the (MitM) attacks also known as eavesdropping attacks occur when attackers insert themselves into a two-party transaction. So Once the attackers interrupt the traffic they can filter and steal the data.

 Components of Cyber Security

  1. Application Security: It encompasses measures or the counter-measures that are taken during an application’s development process to protect it from the threats that can come through flaws in the app design, development, deployment, upgrade and maintenance.
  2. Information security: It is related to the protection of the information from an unauthorized access to avoid identity theft and to protect the privacy.
  3. Network Security: includes activities to protect the usability, reliability, integrity and safety of the network.
  4. Disaster Recovery Planning: It is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of an attack.

 Need for Cyber Security

  • For Individuals: Photos, videos and the other personal information shared by an individual on social networking sites can be inappropriately used by others, leading to serious and even life-threatening incidents.
  • For Business Organizations: the Companies have a lot of data and information on their systems. Cyber attack may lead to loss of competitive information (such as patents or original work), loss of the employees/customers private data resulting into complete loss of the public trust on the integrity of the organization.
  • For Government: A local, state or central government maintains huge amount of confidential data related to the country (geographical, military strategic assets etc.) and citizens. So Unauthorized access to the data can lead to serious threats on a country.

International Mechanisms

  • The International Telecommunication Union (ITU) is a specialized agency within the United Nations which plays a leading role in standardization and the development of telecommunications and cyber security issues.
  • Budapest Convention on Cybercrime: It is an international treaty that seeks to address Internet and the computer crime (cybercrime) by harmonizing national laws, improving investigative techniques, and increasing cooperation between nations. It came into force on 1 July 2004. India is not a signatory to this convention.
  • Internet Governance Forum (IGF): It brings together all stakeholders i.e. government, private sector and civil society on the Internet governance debate. It was first convened in October–November 2006.
  • Internet Corporation for Assigned Names and Numbers (ICANN): It is a non-profit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network’s stable and secure operation. It has its headquarters in Los Angeles, U.S.A.

Laws related to Cyber Security in India

Information Technology Act, 2000

  • So The Act regulates use of computers, computer systems, computer networks and also data and the information in electronic format. The act lists down among other things, following as offences:
  1. Tampering with the computer source documents.
  2. Hacking with computer system
  3. The Act of cyber terrorism i.e. accessing a protected system with the intention of threatening the unity, integrity, sovereignty or security of country.
  4. Cheating using computer resource etc.


National Critical Information Infrastructure Protection Centre (NCIIPC

  • The National Critical Information Infrastructure Protection Centre (NCIIPC) of National Technical Research Organisation (NTRO) as the nodal agency under the Section 70A(1) of the Information Technology (Amendment) Act 2008 for taking all measures including associated Research and the Development for the protection of CIIs in India.

National Cyber Policy, 2013

  • India released its first cyber security policy – National Cyber Security Policy in 2013.
  • National Cyber Policy 2013 document outlines a road-map to create a framework for comprehensive, collaborative and the collective response to deal with the issue of cyber security at all levels within the country.
  • Vision: To build a secure and resilient cyber space for citizen, businesses and Government.
  • Mission: To protect information and information infrastructure in cyberspace, build capacities to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structure, people, process, technology and cooperation.












Abhishek Rana @Lexcliq

Leave a Reply

Tru Boost Keto Gummies
Advocates Articles

Tru Boost Keto Gummies

➢ Product Name ⮞ Tru Boost Keto Gummies ➢ Benefits ⮞ Weight Loss ➢ Composition ⮞ Natural ➢ Side-Effects ⮞ NA ➢ Rating: ★★★★★ ➢ More Info ⇒ Click Here To Go On Official Website ➢ Where to Buy – ✅Click Here To Visit – “OFFICIAL WEBSITE”✅ ✅Click Here To Visit – “OFFICIAL WEBSITE”✅ ✅Click Here To Visit – “OFFICIAL WEBSITE”✅ For what reason are Tru Boost Keto Gummies more prevalent than other weight […]

Read More

Skincell Advanced #1 Premium Fast Acting Liquid Solution To Remove Moles | Skin Tags Anywhere From Body[REAL OR HOAX]

Skincell Advanced • Product Name – Skincell Advanced • Side Effects – No Side Effects (100% Natural) • Main Benefits – Remove Moles And Pesky Skin Tags • Category – Skin Tag Remover Serum • Results – In 1-2 Months • Availability – Online • Customer Reviews – 5/5 • Price – Visit Official Website […]

Read More

LeanBiome – Shocking Reviews, Uses, Benefits And 21 Days Results?

Leanbiome promises a clean stomach and a healthy body. Constipation will disappear once you begin to use it. There are several natural ways to treat constipation that you may not have realized. There are many ineffective and cheap remedies. Leanbiome is our solution. We are here to help you with your constipation. Leanbiome is a term you may have heard […]

Read More