Unit 1 (All)
Unit 1 (All)
1. what is cyberspace.
Cyberspace is an interconnected digital environment.
3. Advent of internet.
Ans.
The internet originated back in the 1970s; Bob Kahn and Vint Cerf created the
Internet.
The term cyber security refers to techniques and practices designed to protect
digital data.
Implications for Security: As cyberspace has grown rapidly, so have security risks. Cyberattacks on
individuals, corporations, and even nations have become widespread. Understanding cyberspace is critical for
creating successful cybersecurity strategies to combat threats like hacking, malware, and data breaches.
Governments and armed forces must know cyberspace to protect national security interests and key
infrastructure.
Information Exchange: Cyberspace provides a vast platform for information sharing and dissemination. It
allows people to access a variety of information, connect with others worldwide, and participate in online
communities. Understanding cyberspace enables people to navigate the digital realm responsibly, separating
reputable sources from misinformation or disinformation.
Economic Development: Cyberspace is important in fostering economic growth and wealth. Businesses may
access clients worldwide using e-commerce platforms promoting global trade and commerce. Cloud
computing and artificial intelligence are examples of cyberspace-powered digital technologies that improve
productivity and efficiency across industries. To capitalize on cyberspace’s potential for long-term economic
growth, politicians and corporate leaders must first understand it.
In the 1960s, research into what was then known as packet switching gave birth to the Internet.
It was believed that packet switching would be a better and faster way to convey data than the hardware
option, which was the circuits.
The United States Military's development of ARPANET required packet-switching technology.
The ARPANET is regarded as the earliest known network of connected computers or the internet.
The military used this technique to exchange private information. Then, this data-sharing technology was
made available to American educational institutions so they could use the government's supercomputer,
initially at 56 kbit/s, then at 1.5 Mbit/s, and finally at 45 Mbit/s.
In the US, the internet was completely commercialised by 1995, and internet service providers started to
appear in the late 1980s.
4. What are “layers” and how are they relevant to Internet governance?
One way to conceptualize this more holistic approach is with reference to “layers” of governance.
This method was originally proposed by law professor Yochai Benkler, who argued that modern
communications networks should be understood as a series of “layers” rather than as an assorted bouquet of
different technologies.
Benkler lists three such layers: a “physical infrastructure” layer, through which information travels; a
“code” or “logical” layer that controls the infrastructure; and a “content” layer, which contains the information
that runs through the network.
Today, it has become fairly common to conceptualize the Internet in this fashion. Some would change the
names of the layers, and others would include additional layers.
The important point, however, is not which specific layers we choose, but the more general point that the
Internet can be broken up into discrete analytical categories; and that, consequently, Internet governance itself
takes place on multiple levels (or “layers”).
In taking a holistic approach to governance, therefore, it is critical that we consider multiple layers. In this
primer, we focus on the three original layers mentioned by Benkler: infrastructure, logical, and content.
5. Rules and regulations framed under the IT Act regulate different aspects of cybersecurity as follows:
Information Technology (The Indian Computer Emergency Response Team and Manner of Performing
Functions and Duties) Rules, 2013 (2013 rules), established the Computer Emergency Response Team (CERT-In)
as the administrative agency responsible for collecting, analysing and disseminating information on
cybersecurity incidents, and taking emergency response measures. These rules also put in place obligations on
intermediaries and service providers to report cybersecurity incidents to the CERT-In.
Directions on information security practices, procedure, prevention, response and reporting of cyber
incidents for a safe and trusted internet, issued in 2022 by the CERT-In, add to and modify existing cybersecurity
incident reporting obligations under the 2013 rules.
Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011 (SPDI rules) require companies that process, collect, store or transfer sensitive
personal data or information to implement reasonable security practices and procedures
The Information Technology (Guidelines for Intermediaries and Digital Media Ethics Code Rules, 2021)
require intermediaries to implement reasonable security practices and procedures to secure their computer
resources and information, maintaining safe harbour protections. Intermediaries are also mandated to report
cybersecurity incidents to the CERT-In.
Information Technology (Information Security Practices and Procedures for Protected System) Rules, 2018,
oblige companies that have protected systems – as defined under the IT Act – to put in place specific
information security measures.
Other laws that contain cybersecurity-related provisions include the Indian Penal Code 1860, which
punishes offences committed in cyberspace (such as defamation, cheating, criminal intimidation and
obscenity), and the Companies (Management and Administration) Rules 2014 which require companies to
ensure that electronic records and systems are secure from unauthorised access and tampering.
There are also sector-specific rules issued by regulators and agencies, including the Reserve Bank of India,
the Insurance Regulatory and Development Authority of India, the Department of Telecommunications, the
Securities Exchange Board of India, the National Health Authority of India, among others, which mandate
cybersecurity standards to be maintained by their regulated entities
Cybersecurity of critical information infrastructure (CII) – defined as any computer resource that can have a
debilitating impact on national security, the economy, public health or safety if incapacitated or destroyed – is
regulated by guidelines issued by the National Critical Information Infrastructure Protection Centre (NCIIPC).
Under the IT Act, the government may notify any computer resource that affects the facility of CII to be a
protected system, prescribing cybersecurity obligations for companies handling protected systems.
Designated CII sectors include transport, telecoms, banking and finance, power, energy and e-governance.
Within these sectors, the appropriate authority can notify certain computer systems as protected systems.
Sectoral regulators and agencies, including the Central Electricity Authority, have also formulated rules and
guidelines on cybersecurity and CII.
It also means trying to keep the identity of authorized parties involved in sharing and holding
data private and anonymous.
Integrity
Integrity refers to protecting information from being modified by unauthorized parties. Standard
measures to guarantee integrity include:
Cryptographic checksums
Using file permissions
Uninterrupted power supplies
Data backups
Availability
Availability is making sure that authorized parties are able to access the information when needed.
Standard measures to guarantee availability include:
• Communicationandwebtechnology
• Internet,Worldwideweb
• Adventofinternet
• Internetinfrastructurefordatatransferandgovernance
• Internetsociety
• Regulationofcyberspace
• Conceptofcyber security
• Issuesandchallengesofcybersecurity
Communicationstechnologyandthe internet
Computers are frequently connected through networks to communicate with each other,
thus magnifying their usefulness.
Furthermore, since computers can be embedded in almost any device, arrays of devices
can be created that work together for coherent and common purposes.
The most widely known example of a network today is the Internet, which is a diverse set
of independent networks, interlinked to provide its users with the appearance of a single,
uniform network.
That is, the Internet is a network of networks. The networks that compose the Internet share
a
commonarchitecture(howthecomponentsofthenetworksinterrelate)andprotocols(standards
governingtheinterchangeofdata)thatenablecommunicationwithinandamongtheconstituent
networks.
These networks themselves range in scale from point-to-point links between individual
devices (such as Bluetooth) to the relatively small networks operated by individual
organizations, to regional Internet service providers, to much larger “backbone” networks
that aggregate traffic from many small networks, carry such traffic over long distances, and
exchange traffic with other backbone networks.
Internally,theInternethastwotypesofelements:communicationlinks,channelsoverwhichdata
travelfrompointtopoint;androuters,computersatthenetwork’snodesthatdirectdataarriving
along incoming links to outgoing links that will take the data toward their destinations.
Datatravelalongthe Internet’scommunication linksin packetsadheringto the standard
Internet Protocol (IP) that defines the packets’ format and header information.
Header information includes information such as the origin and destination IP addresses of
a packet, which routers use to determine which link to direct the packet along.
Amessagefromasendertoareceivermightbebrokenintomultiplepackets,eachofwhichmight
follow a different path through the Internet.
Information in the packets’ headers enables the message to be restored to its proper order
at its destination.
However, as a general rule, it is not possible to specify in advance the particular sequence
of routers that will handle a given packet—the routers themselves make decisions about
where to
send a packet in real time, based on a variety of information available to those routers
about the cost of transmission to different routers, outages in adjacent routers, and so on.
TheoriginsanddestinationsofdatatransitingtheInternetarecomputers(orotherdigitaldevices),
which are typically connected to the Internet through an Internet service provider (ISP) that
handles the necessary technical and administrative arrangements.
ThelinksandroutersoftheInternetprovidethecriticalconnectivityamongsourceanddestination
computers, but nothing else.
DifferenceBetweenWWWandInternet
EvolutionoftheInternet
Internetinfrastructurefordatatransferandgovernance&Internetsociety,
Whatisinternet governance?
Internet governance is ‘the development and application by governments, the private
sector, and civil society, in their respective roles, of shared principles, norms, rules,
decision-making procedures, and programs that shape the evolution and use of the
Internet’.
Whodefined‘internetgovernance’,and why?
The2003–2005 World Summit on the Information Society (WSIS) officially placed the issue
of the internet’s governance on diplomatic agendas. Several controversies emerged at that
point.
On the one hand, some countries wanted a restrictive definition of the term. This meant
referringonlytothetechnicalmanagementof criticalInternetresources.Otherswereinfavour of
a broader definition.
Thiswouldalsocoverpolicyissuessuchase-commerce,spam,andcybercrime.
On the other hand, several countries supported a private-sector led model. Others argued
that governments should be in charge of internet governance, in the framework of an
intergovernmental body.
These controversies led to the creation of a multistakeholder Working Group on Internet
Governance, which came up with the above definition.
Participantsinthesecond phaseof WSIS(Tunis,2005) embracedthisdefinition.Itbecamepart
of the Tunis Agenda for the Information Society.
Whoaretheinternetgovernance actors?
Accordingtothedefinition,there isnosingleorganisation ‘in charge ofthe Internet’. However,
various stakeholders – governments, intergovernmental organisations, the private sector,
the technicalcommunity,andcivilsociety–
sharerolesandresponsibilitiesinshapingthe‘evolution and use’ of this network.
Therearenowmultipleactorsinvolvedinthegovernanceoftheinternet,inonewayoranother.
Theseformtheso-calledinternetgovernance ecosystem.
They include various UN bodies, organisations such as the Internet Corporation for
Assigned Names and Numbers (ICANN), and the Internet Engineering Task Force (IETF),
theInternet Governance Forum (IGF), Internet companies, and NGOs.
TheDigitalWatchobservatoryusesthefollowingclassificationofactors:
o academia/think tanks, business sector, civil society, governments,
intergovernmental organisations,technicalcommunity, and international
organisations. In some instances, the same actor fits under more than one
stakeholder group.
Whatare“layers”andhowaretheyrelevanttoInternetgovernance?
One way to conceptualize this more holistic approach is with reference to “layers” of
governance.
ThismethodwasoriginallyproposedbylawprofessorYochaiBenkler,whoarguedthatmodern
communications networks should be understood as a series of “layers” rather than as an
assorted bouquet of different technologies.
Benkler lists three such layers: a “physical infrastructure” layer, through which information
travels;a“code”or“logical”layerthatcontrolstheinfrastructure;anda“content”layer,which
contains the information that runs through the network.
Today, it has become fairly common to conceptualize the Internet in this fashion. Some
would change the names of the layers, and others would include additional layers.
Theimportantpoint,however,isnotwhichspecificlayerswechoose,butthemoregeneralpoint
that the Internet can be broken up into discrete analytical categories; and that,
consequently, Internet governance itself takes place on multiple levels (or “layers”).
In taking a holistic approach to governance, therefore, it is critical that we consider multiple
layers.Inthisprimer,wefocusonthethreeoriginallayersmentionedbyBenkler:infrastructure,
logical, and content.
Regulationofcyberspace
NeedforRegulationofCyberspace
Themostvisibleandreadilysensationalconcernisabouttheuseofinternetparticularlyforthe
distribution of obscene, indecent and pornographic content.
The challenge that Cyberspace is posing to traditional notions of jurisdiction and regulation
is another factor.
The increasing business transaction from tangible assets to intangible assets like
Intellectual Property has converted Cyberspace from being a mere info space into
important commercial space.
With the inventions of new technologies, the media has enhanced thepossibility of invasion
of the privacy of individual and bringing it into the public domain.
Themajorareaofconcernwheresomesortofregulationisdesirableisdataprotectionanddata
privacy sothat industry,publicadministrators,netizens, andacademicscan have
confidenceas on-line user.
Encryption is the process of converting a message or document into a form which hides
the content of the communication from the eyes of an eavesdropping third party and needs
to be decrypted if its content is to be read.
New cryptographic techniques (cryptography is the process used to encode/encrypt
electronic
information)arecommonlycrackedinarelativelyshorttimebycomputationalforceorbyother
analytical means.
Internet has emerged as the ‘media of the people’ as the internet spreads fast there were
changesinthepressenvironmentthatwascenteredonmassmedia.Unlikeasintheestablished
press, there is no editor in the Internet.
Another concern is that, money laundering, be ‘serious crime’ becomes much simpler
through the use of net. The person may use a name and an electronic address, but there
are no mechanisms to prove the association of a person with an identity so that a person
can be restricted to a single identity or identity can be restricted to a single person.
Rules and regulations framed under the IT Act regulate different aspects of
cybersecurity as follows:
Information Technology (The Indian Computer Emergency Response Team and Manner
of Performing Functions and Duties) Rules, 2013 (2013 rules), established the Computer
Emergency Response Team (CERT-In) as the administrative agency responsible for
collecting, analysing and disseminating information on cybersecurity incidents, and taking
emergency response measures. These rules also put in place obligations on intermediaries
and service providers to report cybersecurity incidents to the CERT-In.
Directions on information security practices, procedure, prevention, response and reporting
of cyberincidentsforasafeandtrustedinternet,issuedin2022bytheCERT-In,addtoandmodify
existing cybersecurity incident reporting obligations under the 2013 rules.
Information Technology (Reasonable Security Practices and Procedures and Sensitive
Personal Data or Information) Rules, 2011 (SPDI rules) require companies that process,
collect, store or transfer sensitive personal data or information to implement reasonable
securitypractices and procedures.
TheInformationTechnology(GuidelinesforIntermediariesandDigitalMediaEthicsCodeRules,
2021) require intermediaries to implement reasonable security practices and procedures
to secure their computer resources and information, maintaining safe harbour protections.
Intermediaries are also mandated to report cybersecurity incidents to the CERT-In.
Information Technology (Information Security Practices and Procedures for Protected
System) Rules, 2018, oblige companies that have protected systems – as defined under
the IT Act – to put in place specific information security measures.
Other laws that contain cybersecurity-related provisions include the Indian Penal Code
1860, which punishes offences committed in cyberspace (such as defamation, cheating,
criminal intimidation and obscenity), and the Companies (Management and Administration)
Rules2014 which require companies to ensure that electronic records and systems are
secure from unauthorised access and tampering.
Therearealsosector-
specificrulesissuedbyregulatorsandagencies,includingtheReserveBank of India, the
Insurance Regulatory and Development Authority of India, the Department of
Telecommunications, the Securities Exchange Board of India, the National Health
Authority of India, among others, which mandate cybersecurity standards to be maintained
by their regulated entities
Cybersecurityofcriticalinformationinfrastructure(CII)–definedasanycomputerresourcethat
can have a debilitating impact on national security, the economy, public health or safety if
incapacitated or destroyed – is regulated by guidelines issued by the National Critical
Information Infrastructure Protection Centre (NCIIPC).
Under the IT Act, the government may notify any computer resource that affects the facility
of CII to be a protected system, prescribing cybersecurity obligations for companies
handling protected systems.
Designated CII sectors include transport, telecoms, banking and finance, power, energy
and e- governance.
Within these sectors, the appropriate authority can notify certain computer systems as
protected systems.Sectoral regulatorsandagencies, includingthe Central
ElectricityAuthority, have also formulated rules and guidelines on cybersecurity and CII.
QUE .2 the 7 layer of cyber security :
1. MissionCriticalAssets –Thisisthedatayouneedtoprotect
2. DataSecurity–Datasecuritycontrolsprotectthestorageandtransferofdata.
TheEvolutionoftheCyberSecurityThreatLandscape
The cyber threats of today are not the same as even a few years ago. As the
cyber threat landscape changes, organizations need protection against
cybercriminals’ current and future tools and techniques.
GenV Attacks
o The cyber security threat landscape is continually evolving, and,
occasionally, these advancements represent a new generation of cyber
threats. To date, we have experienced five generations of cyber threats and
solutions designed to mitigate them, including:
o Gen I(Virus):
• In the late 1980s, virus attacks against standalone
computers inspired the creation of the first antivirus
solutions.
o Gen II(Network):
• As cyberattacks began to come over the Internet, the
firewall was developed to identify and block them.
o GenIII (Applications):
• Exploitation of vulnerabilities within applications caused
the mass adoption of intrusion prevention systems (IPS)
o Gen IV (Payload):
• As malware became more targeted and able to evade
signature-based defences, anti-bot and sandboxing
solutions were necessary to detect novel threats.
o GenV (Mega):
• The latest generation of cyber threats uses large-scale,
multi-
vectorsattacks,makingadvancedthreatpreventionsolutions
a priority.
QUE .3 supply the chain attack :
SupplyChainAttacks
o Historically,manyorganizations’securityeffortshavebeenfocusedontheirown
applicationsandsystems.Byhardeningtheperimeterandonlypermittingacces
s toauthorizedusersandapplications,theytrytopreventcyberthreatactorsfrom
breaching their networks.
o Protectingagainstsupplychainattacksrequiresazerotrustapproachtosecurity
. While partnerships and vendor relationships are good for business, third-
party users and software should have access limited to the minimum
necessary to do their jobs and should be continually monitored.
Ransomware
o Whileransomwarehas been around for decades, it only became the dominant
form of malware within the last few years. The WannaCry ransomware
outbreak demonstrated the viability and profitability of ransomware attacks,
driving a sudden surge in ransomware campaigns.
o Sincethen,theransomwaremodelhasevolveddrastically.Whileransomwareus
ed toonlyencryptfiles,itnow will stealdatatoextortthevictimandtheir customers
in double and triple extortion attacks. Some ransomware groups also
threaten or employ Distributed Denial of Service (DDoS) attacks to
incentivize victims to meet ransom demands.
Phishing
o Phishingattacks have long been the most common and effective means by
which cybercriminals gain access to corporate environments. It is often much
easier to trick a user into clicking a link or opening an attachment than it is to
identify and exploit a vulnerability within an organization’s defences.
o In recent years, phishing attacks have only grown more sophisticated. While
the original phishing scams were relatively easy to detect, modern attacks
are convincing and sophisticated to the point where they can be virtually
indistinguishable from legitimate emails.
o cyber security awareness training is not enough to protect against the
modern phishing threat. Managing the risk of phishing requires cyber security
solutions that identify and block malicious emails before they even reach a
user’sinbox.
o Malware
o The different generations of cyberattacks have been defined mainly by
the evolution of malware.
o Malwareauthorsandcyberdefendersareplayingacontinualcatandmousega
me, where attackers try to develop techniques that overcome or bypass
the latest in security technology. Often, when they succeed, a new
generation of cyberattacks is created.
o Modern malware is swift, stealthy, and sophisticated. The detection
techniques usedbylegacysecuritysolutions(suchassignature-
baseddetection)arenolonger
effective,and,often,bythetimesecurityanalystshavedetectedandresponde
dto a threat, the damage is already done.
o Detection is no longer “good enough” to protect against malware attacks.
Mitigating the threat of Gen V malware requires cyber security
solutionsfocused.
o onprevention,stoppingtheattackbeforeitbeginsandbeforeanydamageisdo
ne.
.