Cyber security, Unveiling the Cyber Threat Landscape: Safeguarding Your Digital Assets in an Evolving World

Cyber security, Unveiling the Cyber Threat Landscape: Safeguarding Your Digital Assets in an Evolving World

Insights from a Recent Talk with LTIMind Tree: Path to Effective Cybersecurity

Intro

Greetings, readers! Today, we are gonna deep dive into the world of Cyber security and cyber threats. This article represents Insights from a recent talk with LTIMind Tree by Chakravarthy (Chakry) YSSKK - Director: Program & Project Management at LTIMindtree ( LinkedIn ) conducted by Vardhaman College of Engineering. In collaboration with Vardhaman College of Engineering, I had this opportunity to engage in a stimulating discussion with Mr Chakry from LTIMindtree, a prominent global IT services and solutions company. During this insightful interaction, I explored various aspects of cybersecurity and gained valuable insights into their expertise in the field and here goes what I learned.

About LTIMindtree

LTIMindtree is a global technology consulting and digital solutions company that enables enterprises across industries to reimagine business models, accelerate innovation, and maximize growth by harnessing digital technologies. As a digital transformation partner to more than 700+ clients, LTIMindtree brings extensive domain and technology expertise to help drive superior competitive differentiation, customer experiences, and business outcomes in a converging world. Powered by nearly 90,000 talented and entrepreneurial professionals across 30+ countries, LTIMindtree — a Larsen & Toubro Group company — combines the industry-acclaimed strengths of erstwhile Larsen and Toubro Infotech and Mindtree in solving the most complex business challenges and delivering transformation at scale. For more info, please visit www.ltimindtree.com ( From about LinkedIn LTIMindtree)

Impact of Cyber security :

  1. Asking ransom

    --> Demanding payment from a victim or organization in exchange for resolving a cyber attack or releasing encrypted data.

  2. Industrial espionage

    --> Gathering of confidential or valuable information from companies without their permission

  3. Selling to criminals

    --> Selling to criminals means knowingly providing goods or services to individuals involved in illegal activities.

  4. Using for crime

    --> Act of utilizing something, such as tools, or technology, with the intent to commit illegal activities or offences.

Examples of cyber attacks :

  1. DDoS( Distributed Denial-of-Service )

    --> The goal of a DDoS attack is to make a website or online service unavailable to its intended users, causing inconvenience, financial losses, and reputational damage to the targeted entity.

    example by Mr Chakry: Blocking booking of tickets in cricket stadium to make stadium owners fall in the loss.

  2. Malware ( short for malicious software )

    --> refers to any software specifically designed to disrupt, damage, or gain unauthorized access to computer systems, networks, or user devices.

    some types are Viruses, Worms, Trojans, Ransomware, Spyware, Adware

    , Keyloggers.

  3. Phishing

    Phishing is a type of cyber attack where attackers attempt to deceive individuals into providing sensitive information, such as usernames, passwords, credit card details, or personal data, by anonymous links.

  4. Credential attack

    It is a type of cyber attack where an attacker aims to steal user credentials, such as usernames and passwords, to gain unauthorized access to accounts, systems, or networks.

The motive of cyber attacks

  1. Disrupting business continuity

  2. Info theft and manipulation of data

  3. Creating fear and chaos by disrupting physical infrastructure

  4. Financial loss to the target

  5. Acheivig state military objective

  6. demanding ransom

  7. damaging reputation

Types of attackers

Black Hat Hackers( malicious hackers / illegal hackers )

Black hat hackers, also known as malicious hackers or crackers, are individuals who engage in hacking activities for personal gain, or to cause harm.

The opposite of white hat hackers, black hat hackers have only one intention – to create chaos and get away with the spoils. They target systems of government and big businesses with the wrong intentions of stealing information from them.

key characteristics :

  1. Unauthorized Access

  2. Malicious Activities

  3. Exploiting Vulnerabilities

Red Hat Hackers( Opposes black hat illegally )

Red hat hackers, also known as ethical hackers or vigilante hackers, are individuals who use their hacking skills and knowledge for the greater good or to expose vulnerabilities in computer systems, networks, or software.

In simple words, they stop the black hat hackers from stealing information in the black hat hackers way that is illegally

Red hats are the frontline warriors against black hats. A red hat hacker directly targets and fends off the attacks of different types of hackers’ hats. They are known to be pretty ruthless when dealing with black hats.

Green Hat Hackers(Newbie hacker)

This represents a beginner or novice hacker who is enthusiastic about learning and exploring the field of cybersecurity. These individuals may have limited knowledge or experience but possess a strong interest in hacking and aim to develop their skills.

Green hat hackers are newbies to the hacking world. They are still learning and have not mastered the science of hacking yet. They typically hack low-end systems of other individuals and are not interested in hacking bigger yet.

They usually follow other types of hackers, intending to learn from them.

Grey Hat Hackers( Newbie hacker )

Grey hat hackers are the nerdiest and geekiest hackers among all other types of hackers. They do not fall under black or white hackers because they hack not for any particular motive. These hackers hack only for the fun of it.

Blue Hat Hackers(learning hacking )

Like green hat hackers, blue hat hackers are other types of hackers that are also new to hacking. Their aim is also to learn how to hack, mainly focusing on what they do not know yet.

for taking revenge they learn hacking

White Hat hackers

White hat hackers are some of the best hackers in the world. They specialize in all matters related to cybersecurity and can hack them to destroy systems or strengthen them.

The security goal of a Company (Should be followed by every employee)

Confidentiality

Ensure private or confidential information is not being disclosed to unauthorized individuals.

Integrity

Ensure data & systems are free from unauthorized manipulation.

Availability

Ensure systems work promptly for their intended use and service is not denied to authorized users.

Security Domains

Do's in cyber security

  1. Use strong and unique passwords.

  2. Enable two-factor authentication (2FA).

  3. Keep software updated.

  4. Use reliable security software.

  5. Practice safe browsing.

  6. Regularly back up your data.

  7. Educate yourself and your employees.

  8. Secure your Wi-Fi network.

  9. Implement firewall protection.

  10. Create regular data backup and recovery plans.

Do not's in Cyber security

  1. Don't reuse passwords across multiple accounts.

  2. Don't click on suspicious links or download files from unknown sources.

  3. Don't share sensitive information through unsecured channels.

  4. Don't disable or ignore security updates.

  5. Don't leave devices unattended or unlocked.

  6. Don't overshare personal information on social media.

  7. Don't use public Wi-Fi networks without proper security precautions.

  8. Don't open email attachments from unknown or suspicious senders.

  9. Don't fall for phishing scams or provide personal information in response to unsolicited requests.

  10. Don't neglect to regularly review and monitor your financial accounts for any unauthorized activity.

Certifications

  1. Certified Information Systems Security Professional (CISSP)

  2. Certified Information Systems Auditor (CISA)

  3. Certified Information Security Manager (CISM)

  4. CompTIA Security+

  5. Certified Ethical Hacker (CEH)