Of the cybersecurity attacks ransomware attacks have

  • No School
  • AA 1
  • 61

This preview shows page 46 - 48 out of 61 pages.

coincides with rapid growth and innovation in the ICT sector. Of the cybersecurity attacks, Ransomware attacks have been the most common in the last few years (Ransomware is a type of software that threatens to publish a person’s data or block it unless a ransom is paid). Apart from WannaCry and Petya, other Ransomware attacks
Image of page 46

Subscribe to view the full document.

47 | Page 9004418746 [email protected] that made news globally were Locky, Cerber, Bucbi, SharkRaaS, CryptXXX and SamSam . The success of each of these inspired new attacks. The ransom demands also increased — the average mean ransom demand rose from $294 in 2015 to $1077 in 2016, according to Symantec. Cybersecurity attacks have also rendered dataof many users vulnerable. Recent examples being data breach in Zomato and Uber. While Windows operating systems were the most vulnerable to cyberattacks, a number of Android threats have been reported in the last couple of years, including potent crypto- ransomware attacks on Android devices. The attacks aren’t limited to mobile phones and e-Pads. All devices, including televisions that use Android, are also potentially vulnerable . In 2016, the first known Ransomware, named KeRanger, targeting Mac users was also reported. The Mirai botnet malware affected 2.5 million home router users and other Internet of Things devices. A number of viruses, malware and cryptoworms are also being developed in the JavaScript, which gives the attackers cross-platform options. INDIA’S RESPONSE Given the huge number of online users and continued efforts on affordable access, cybersecurity needs to be integrated in every aspect of policy and planning. At the 15th Asia Pacific Computer Emergency Response Team conference in Delhi , Minister for Electronics and Information Technology Ravi Shankar Prasad highlighted the need for robust cybersecurity policies and frameworks. The government is keen to fund cybersecurity research. It announced that it will award a grant worth ° 5 crore to startups working on innovations in the field of cybersecurity. India needs to quickly frame an appropriate and updated cybersecurity policy, create adequate infrastructure, and foster closer collaboration between all those involved to ensure a safe cyberspace. Minister of Communications Manoj Sinha said at the Global Conference on Cyberspace 2017 that there must be enhanced cooperation among nations and reaffirmed a global call to action for all United Nations member nations to not attack the core of the Internet even when in a state of war . This also clearly emphasises the fact that more than ever before, there is a need for a Geneva-like Convention to agree on some high-level recommendations among nations to keep the Internet safe, open, universal and interoperable. 38. Despite of immense knowledge and talent the scientific research in India is not gaining momentum. What according to you are the reasons for the same?
Image of page 47
Image of page 48
  • Fall '19

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes