Session 01 Digital Device and Data
Session 01 Digital Device and Data
Abhinav Mishra
•
•
Cyber Crime Incidents at a Glance
Total cyber incidents reported in India
• Cyber crime cases have witnessed a 2018 2,08,456
steady spike since 2018.
2019 3,94,499
• Two months of 2022 saw more 2020 11,58,208
cybercrimes than the entire 2018
2021 14,02,809
• 15.56 lakh cases reported in 2023 2022 13.91 Lakh
• 740,957 in the first four months of 2023 15.56 Lakh
2024 alone 2024 : 7.40 Lakh(First Four Month)
Source: CERT-In
Delhi AIIMS cyberattack was the handiwork work
of unknown threat actors and was caused due to
improper network segmentation
Five servers of AIIMS Delhi were impacted in the
November cyberattack and 1.3 TBs of data was
encrypted
Cyber Crime Incidents at a Glance
The National Crime Records Bureau (NCRB) of India
publishes statistical data on crimes in the country in its
publication Crime in India.
In May 2024, the Indian Cyber Crime Coordination Centre
(I4C) reported that the average number of cybercrime
complaints recorded daily was 7,000, which was a 113.7%
increase from 2021–2023 and a 60.9% increase from 2022–
2023
Social Media related Cyber Crime Incidents at a Glance
Cyber Crime Incidents at a Glance
State wise Cyber Crimes - No. of Crimes & Crime Rate (Top 20 States/UTs)
(Cumulative from 2002 to 2021)
City-wise Cyber Crimes - No. of Crimes & Crime Rate (19 Metropolitan Cities)
(Cumulative from 2002 to 2021)
Top 10 Cybersecurity Trends in 2024
• Industrial Control System
• Automotive Hacking is on the Rise
• Artificial Intelligence (AI)
• Mobile
• Cloud Computing
• Data Breach: A High-priority Target
• Integration and Automation
• Ransomware with a Specific Target
• Cyber Warfare Supported by the
Government
• Threats from Within
• IoT Vulnerabilities
11
Connected World
Increased dependence on connectivity
• Increased operational efficiency, faster processing, and increased cost efficiency has driven
this transformation significantly.
• The Covid-19 pandemic has further accelerated the growth of digital transformation.
Connectivity: Digital platforms enable users to connect Integration: Digital platforms often integrate various
with each other, often through the internet. This services, applications, or functionalities. This
connectivity can be established for communication, integration allows users to access multiple services
collaboration, or transaction purposes. within a single platform, enhancing convenience and
efficiency.
Interactivity: Users on digital platforms can interact with
the platform itself and with other users. This interaction Scalability: Digital platforms are designed to
may include communication, sharing content, making accommodate a large number of users and
transactions, and more. transactions. They can scale up to handle increased
demand or user activity without a significant loss of
User Experience (UX): A good digital platform prioritizes performance.
a positive user experience. This includes an intuitive
interface, easy navigation, and responsive design to ensure Security: This involves protecting user data, ensuring
users can effectively use the platform. secure transactions, and safeguarding the platform
against unauthorized access or cyber threats.
15
Examples of Digital Platforms
Social Media Platforms: Facebook, Twitter, Instagram
17
Digital Platform for performing Routine Task
For performing daily, routine, and personal tasks, Communication Platforms
various digital platforms and tools are available to
Productivity Suites:s
help streamline and organize activities.
These platforms can help simplify and organize Task Management and
various aspects of your daily life, from managing Collaboration Tools
tasks and appointments to staying connected with
Financial Management Platforms
others, tracking health and fitness, and enjoying
entertainment. E-commerce Platforms
Choosing the right combination of platforms
based on your preferences and needs can enhance Social Media Platforms
your overall efficiency and productivity. Streaming Platforms
Health and Fitness Platforms
21
Electronic gadgets/devices for performing routine tasks
Entertainment Devices: Office Equipment:
Smart TVs Scanners
Streaming devices (e.g., Roku, Chromecast, Amazon Fire Stick) Fax machines (traditional and digital)
Gaming consoles Document shredders
Media players (e.g., Blu-ray players) Label printers
Security Devices: Gaming Devices:
Security cameras (CCTV, IP cameras) Gaming consoles (PlayStation, Xbox, Nintendo
Video doorbells Switch)
Smart locks Gaming PCs
Security alarms Gaming laptops
Virtual reality (VR) headsets
Healthcare Devices:
Digital thermometers Educational Devices:
Blood pressure monitors E-readers
Glucose meters Educational tablets
Pulse oximeters Interactive whiteboards
Educational robots
22
Software used to connect with the digital platform in the cyber world
Networking Software Communication Software:
• Network Stacks (e.g., TCP/IP stack) • Web Browsers (e.g., Google Chrome, Mozilla Firefox,)
• Network Drivers • Email Clients (e.g., Microsoft Outlook, Thunderbird,)
• Network Configuration Utilities (e.g., ipconfig, ifconfig) • Instant Messaging Apps (e.g., WhatsApp, Telegram, Signal)
• Virtual Private Network (VPN) Clients • Voice over IP (VoIP) Software (e.g., Skype, Zoom, Teams)
• Video Conferencing Software (e.g., Zoom, Teams, Meet)
• Remote Desktop Software (e.g., TeamViewer, AnyDesk)
• Collaboration Platforms (e.g., Slack, Teams, Trello)
• Network Monitoring Tools (e.g., Wireshark, Nagios)
• Social Media Apps (e.g., Facebook, Twitter, Instagram)
• Network Security Tools (e.g., Nmap, Metasploit)
Remote Access Software:
Security Software:
• Remote Desktop Protocol (RDP) Clients (e.g., Microsoft
• Antivirus Software (e.g., Norton, McAfee, Avast)
Remote Desktop)
• Firewall Software (e.g., Windows Defender Firewall, ZoneAlarm,
• Virtual Network Computing (VNC) Software (e.g.,
Comodo Firewall)
RealVNC, TightVNC)
• Encryption Software (e.g., VeraCrypt, BitLocker, FileVault)
• SSH Clients (e.g., PuTTY, OpenSSH)
• Password Managers (e.g., LastPass, Dashlane, 1Password)
• Intrusion Detection and Prevention Systems (IDS/IPS)
File Transfer Software:
• Endpoint Security Software (e.g., Symantec Endpoint Protection,
• FTP Clients (e.g., FileZilla, WinSCP)
CrowdStrike Falcon)
• Secure File Transfer Protocol (SFTP) Clients
• Security Information and Event Management (SIEM) Software
• Peer-to-Peer (P2P) File Sharing Software (e.g., BitTorrent,
23
uTorrent)
Software used to connect with the digital platform in the cyber world
Backup and Recovery Software: Web Development Software:
• Backup Software (e.g., Acronis True Image, EaseUS Todo • Integrated Development Environments (IDEs) (e.g.,
Backup) Visual Studio Code, IntelliJ IDEA, Sublime Text)
• Web Servers (e.g., Apache HTTP Server, Nginx)
• Data Recovery Software (e.g., Recuva, Stellar Data Recovery)
• Content Management Systems (CMS) (e.g., WordPress,
Joomla, Drupal)
Cloud Storage and Collaboration Software: • Version Control Systems (e.g., Git, SVN)
• Cloud Storage Services (e.g., Google Drive, Dropbox,
OneDrive) Entertainment and Multimedia Software:
• Collaboration Platforms (e.g., Google Workspace, • Media Players (e.g., VLC Media Player, Windows
Microsoft 365, Software (e.g., Adobe Photoshop, GIMP, Media Player, iTunes)
Canva) • Video Editing Software (e.g., Adobe Premiere
Pro, Final Cut Pro, DaVinci Resolve)
Productivity Software: • Audio Editing Software (e.g., Audacity, Adobe
• Office Suites (e.g., Microsoft Office, Google Workspace, Audition, GarageBand)
LibreOffice) • Graphics Editing Software (e.g., Adobe
• Project Management Software (e.g., Microsoft Project, Photoshop, GIMP, Canva)
Asana, Trello)
• Note-Taking Apps (e.g., Evernote, OneNote, Notion) 24
Networking Devices used to connect with the digital platform
Networking devices are hardware devices
that facilitate communication and data
transfer between different devices within
a computer network.
These devices play a crucial role in
enabling connectivity, data sharing, and
communication in both local area
networks (LANs) and wide area
networks (WANs).
Networking devices work together to
create a reliable and efficient
communication infrastructure, whether
in a small local network or a large-scale
enterprise environment.
25
Networking Devices used to connect with the digital platform
Network Interface Card (NIC) Router Repeater:
NICs are hardware components that enable Routers connect multiple networks together and Function: Repeaters amplify and
computers or other devices to connect to a facilitate the transfer of data between them. They regenerate network signals, extending the
network. They provide the necessary interface determine the most efficient path for data packets range of a network. They are often used
for devices to communicate with each other to travel from the source to the destination across a in large networks to overcome signal
over the network. network. degradation over long distances.
27
Internet Protocol (IP) Address
IP Address
• It is the unique numerical address of a device in a computer network that uses Internet Protocol for
communication.
• Allow you to pinpoint a particular device from the billions of devices on the Internet.
Dynamic
Static
Usually never change but they may be
changed as a result of network
02 These are temporary IP addresses. These IP
addresses are assigned to a computer when
they get connected to the Internet each time.
administration. They serve as a
permanent Internet address and provide 01 They are actually borrowed from a pool of
IP addresses, shared over various computers.
a simple and reliable way for the
Types
communication
of
IP
Address Public
Private Public IP address of a system is the IP
Private IP address of a system is the IP address which is used to communicate
address which is used to communicate
within the same network. Using private IP 04 outside the network. Public IP address is
basically assigned by the ISP (Internet
data or information can be sent or received
within the same network.
03 Service Provider).
28
Internet Protocol Versions
IP Versions
There are currently two version of Internet Protocol (IP): IPv4 and a new version called IPv6. IPv6 is an evolutionary
upgrade to the Internet Protocol. IPv6 will coexist with the older IPv4 for some time
IPV4 IPV6
• It is the successor to Internet
• It is the fourth revision of the Protocol Version 4 (IPv4). It was
Internet Protocol (IP) used to designed as an evolutionary
upgrade to the Internet Protocol
identify devices on a network and will, in fact, coexist with the
through an addressing system. older IPv4 for some time.
• IPv6 is designed to allow the
• Designed for use in interconnected Internet to grow steadily, both in
systems of packet-switched terms of the number of hosts
connected and the total amount of
computer communication networks data traffic transmitted.
• Uses a 32-bit address scheme • IPv6 is often referred to as the "next
generation" Internet standard and
allowing for a total of 2^32 has been under development since
addresses (just over 4 billion the mid-1990s. IPv6 was born out of
concern that the demand for IP
addresses). addresses would exceed the
available supply.
29
Internet Protocol Version 6
Internet Protocol Version 6
IPv6 was developed by Internet Engineering Task Force (IETF) to
deal with the problem of IP v4 exhaustion. IP v6 is 128-bits
address having an address space of 2^128, which is way bigger
than IPv4. In IPv6 we use Colon-Hexa representation. There are 8
groups and each group represents 2 Bytes.
30
Navigation Systems
Navigation System provides a real-time map of our current location, as well as
including route planning tools to give us directions to a chosen destination.
Example of core satellite navigation systems,
currently
• GPS (United States),
• GLONASS (Russian Federation), \
• NavIC (Navigation with Indian
Constellation) ,
• Beidou (China)
• Galileo (European Union).
• QZSS (Japan)
31
Operating System
Operating System
An operating system is the system software that works as an interface to enable the user to
communicate with the computer.
32
Operating System
A mobile operating system (OS) is software that allows
smartphones, tablets and other devices to run applications and
programs. A mobile OS provides an interface between the device's
hardware components and its software functions.
33
Security Software
Encryption Software:
Function: Encrypts data to protect it from unauthorized access, ensuring that only authorized users with
the appropriate decryption key can read or modify the information e.g., VeraCrypt, BitLocker, FileVault
Endpoint Protection:
Function: Secures individual devices (endpoints) such as computers, laptops, and mobile devices against
various cyber threats (e.g., Symantec Endpoint Protection, CrowdStrike Falcon)
Intrusion Detection Systems (IDS):
Function: Monitors network or system activities for signs of malicious behavior or security policy
violations and alerts administrators to potential threats.
Security Information and Event Management (SIEM) Software:
Function: Collects and analyzes log data from various sources across an organization's network to identify
and respond to security incidents.
Patch Management Software:
Function: Ensures that operating systems and software applications are up-to-date with the latest security
patches, reducing vulnerabilities that could be exploited by attackers.
34
Remote Access Software
Remote access software allows users to connect and control a computer or network from a remote
location. This type of software is commonly used for technical support, system administration, file
sharing, and collaborative work. Here are some common types of remote access software:
Remote Desktop Software:
Function: Allows users to view and control a desktop or entire computer remotely. Examples include
Microsoft Remote Desktop, TeamViewer, and AnyDesk.
37
Personal information Data base
A Personal Information Database (PIDB) is a collection of structured data that contains
personal information about individuals. This database can include a wide range of details,
such as names, addresses, contact numbers, social security numbers, dates of birth,
financial information, and more. The purpose of a PIDB is to organize and store personal
data for various applications
Social Media Platforms: Social media platforms store personal information such as user profiles,
photos, posts, messages, and contact lists. Examples include Facebook, Twitter, Instagram,
LinkedIn, and Snapchat.
Email Services: Email services like Gmail, Outlook, Yahoo Mail, and others store personal email
communications, contact lists, and sometimes additional personal details provided during account
creation.
Financial Institutions: Banks, credit card companies, and other financial institutions store
personal financial information such as bank account details, transaction history, credit card
numbers, and financial statements.
38
Personal information Data base
Online Shopping Platforms: E-commerce websites like Amazon, eBay, and Alibaba store
personal information such as shipping addresses, purchase history, payment details, and
sometimes browsing habits.
Healthcare Providers: Healthcare databases store personal health information such as
medical records, prescriptions, lab results, and insurance information. Examples include
electronic health records (EHR) systems used by hospitals and clinics
39
Business Data Database
A Business Data Database (BDB) is a structured collection of data that contains information relevant to
the operations and management of a business. It serves as a central repository for storing, organizing,
and managing various types of business-related data. The specific data included in a Business Data
Database can vary depending on the industry, the size of the business, and its specific needs. Here are
some common types of data that may be stored in a Business Data Database:
Customer Relationship Management (CRM) Systems: CRM systems like Salesforce, HubSpot, and
Zoho CRM store business data related to customer interactions, sales leads, customer profiles, and sales
pipelines.
Enterprise Resource Planning (ERP) Systems: ERP systems such as SAP, Oracle ERP, and
Microsoft Dynamics store business data related to finance, human resources, supply chain management,
inventory, and manufacturing processes.
Supply Chain Management Systems: Supply chain management systems store business data related
to supplier information, inventory levels, procurement processes, order tracking, and shipping logistics.
40
Business Data Database
Document Management Systems: Document management systems like SharePoint, Google
Drive, and Dropbox Business store and organize business documents, contracts, invoices, and
other important files.
Human Resources Information Systems (HRIS): HRIS platforms like Workday,
BambooHR, and ADP store business data related to employee information, payroll, benefits
administration, performance evaluations, and training records.
Business Intelligence (BI) Tools: BI tools like Tableau, Power BI, and QlikView store and
analyze business data to generate insights and reports related to sales performance, market
trends, customer behavior, and operational efficiency.
41
Database and Storage Mechanism used to Store data in
Digital Environment
In a digital environment, data is stored using various database and storage mechanisms. The choice
of the database and storage system depends on factors such as the type of data, performance
requirements, scalability, and the specific use case. Here are some common database and storage
mechanisms
Relational Databases:
Examples: MySQL, PostgreSQL, Oracle Database,
Microsoft SQL Server.
Use structured tables and enforce a schema for data
organization.
Suitable for applications with well-defined relationships
between data.
42
Database and Storage Mechanism used to Store data in
Digital Environment
NoSQL Databases:
Examples: MongoDB, Cassandra, Couchbase, Redis.
Designed for flexibility and scalability, often used in
scenarios with large amounts of unstructured or semi-
structured data.
No rigid schema requirements, allowing for dynamic and
agile data models
Cloud-based Storage Services:
Examples: Amazon S3, Google Cloud Storage, Microsoft
Azure Blob Storage.
Provide scalable and durable storage in the cloud.
Suitable for storing large amounts of unstructured data,
such as images, videos, and backups. 43
Risks involved while performing routine operations
in the digital environment
• Cybersecurity Risks
• Privacy Risks
• Identity Theft and Fraud
• Data Loss and Data Leakage
• Online Scams and Fraudulent Activities
• Social Engineering and Manipulation
• Device and Software Vulnerabilities
• Unsecured Networks and Wi-Fi Risks
• Social Media and Online Reputation Risks
• Compliance and Legal Risks
44
Risks involved in the digital environment
Cybersecurity Risks
Encompasses various threats such as
Privacy Risks
malware infections, phishing attacks, and
Involves the unauthorized collection, use,
data breaches that compromise the security
or disclosure of personal information,
of digital devices, networks, and data.
including sensitive data, without the Identity Theft and Fraud
individual's consent, potentially leading to Refers to the illegal acquisition and
Data Loss and Data Leakage identity theft, stalking, or discrimination. misuse of an individual's personal
Involves the accidental or intentional loss or
information, such as social security
exposure of sensitive data, such as
Device and Software Vulnerabilities numbers or financial details, for
customer records or intellectual property,
Involves security weaknesses or flaws fraudulent activities, including
which may occur due to system failures,
financial fraud or impersonation.
human error, or malicious activities. in hardware devices, operating systems,
applications, or software programs that
Social Engineering & Manipulation
Online Scams and Fraudulent can be exploited by attackers to gain
Refers to psychological manipulation
Activities unauthorized access, execute malicious techniques used by cyber attackers to
Encompasses a wide range of deceptive code, or compromise system integrity. deceive individuals into divulging
schemes conducted online, including
confidential information, performing
phishing scams, fake websites, fraudulent
unauthorized actions, or compromising
emails, or online shopping scams, designed 45
security measures.
to defraud victims of money or personal
information.
Q&A
46
47