SlideShare a Scribd company logo
1 of 3
Download to read offline
December 2020 | Science Reporter | 29
Image credit: Flickr
W
ITH hackers trying to break into a
computer every 39 seconds on an
average, cybersecurity continues to be
the number one “external concern” for Indian
policymakers and industry leaders, regardless of
their industry. The annual costs of these attacks
are expected to reach an incredible $6 trillion
by 2021, according to Cyber Security Ventures
(https://cybersecurityventures.com/cybercrime-
damages-6-trillion-by-2021/).
As a result of this data privacy crisis, major
companies are boosting internal investments in
cybersecurity and collaborating with industry
tycoons to protect their customers’ data. Looking
forward, 2020-21 promises to be the year when
several cybersecurity trends converge. 5G and the
Internet of Things (IoT) will also add billions of
internet-connected devices into the world. Each
of these is a potential target for hackers. Further,
the tech talent crisis will continue to affect the data privacy
sector disproportionately. That is because the number of job
openings for cybersecurity experts is increasing faster than the
supply of these specialists.
5G and IoT
The fifth generation of wireless technology is already here.
Telecommunications companies like Reliance, AT&T and
Sprint have begun testing and rolling out 5G service in major
cities of the world, and consumers are expected to have full
access to the technology by the end of 2021.
5G tech is important because it will make IoT a reality.
This interconnected network of internet-enabled devices
already exists. However, its potential is limited by the slow
speeds of 4G wireless. The ultra-fast 5G network will allow
these devices to transfer exponentially more information, with
download speeds of up to 10 Gbps.
5G & IoT vs Cyber Security
Addressing the Elephant in the Room
Naman Agrawal & Neeraj Sinha
Image credit: Pxfuel
Image credit: Pxfuel
The upcoming 5G rollout is one reason why experts
predict that more than 36 billion devices will be connected
to the internet by the end of 2020 (https://www.pcr-online.
feature Article
30 | Science Reporter | December 2020
biz/2020/01/15/2020-will-be-a-smarter-year-for-retail/).
Unfortunately, all of them will be exposed to security threats.
In fact, research has found that the “first wave of IoT attacks”
had already begun in 2016.
This makes the expanded IoT a nightmare for
cybersecurity experts, who must figure out how to protect cell
phones, security systems, vehicles, smart homes and more
devices from being breached. The types of vulnerabilities and
threats on IoT Devices include:
• Cyber espionage: It involves the utilisation of cracking
techniques and malicious software to conduct surveillance
on the targeted users to gain access to personal information
on the existing systems.
prepare for are botnets, distributed denial of service, Radio
Frequency Identity (RFID) spoofing, trojan viruses, malware
and malicious scripts.
Protecting IoT Systems and Devices
IoT security methods vary depending on your specific IoT
application and your place in the IoT ecosystem. For example,
IoT manufacturers should concentrate on building security
from the start, making hardware tamper-proof, building
secure hardware, ensuring secure upgrades, providing
firmware updates/patches and performing dynamic testing.
A solution developer’s focus should be on stable software
development and reliable integration. For those deploying
IoT systems, hardware security and authentication are critical
measures. Likewise, for operators, keeping systems up to
date, mitigating malware, auditing, protecting infrastructure
and safeguarding credentials is essential.
Image credit: Pixabay
• Instinctual force attack: It simply means making
attempts to guess users’ passwords with the help of
automated software, which makes multiple attempts
unless it gets the right password to gain access.
Image credit: Needpix
Software developers must respond to these threats by
integrating security patches into the devices and waiting
to release electronics until security has been fully tested
and assured. Some of the most common types of attacks to
Some common IoT security measures include:
• Network security: Protecting an IoT network
includes ensuring port security, disabling port
forwarding, and only supervised opening of network
ports. Use of anti-malware, firewalls and intrusion
detection system/intrusion prevention system,
blocking of unauthorized IP addresses, and ensuring
systems are always patched and are up to date.
• Security gateways: As an intermediary between IoT
devices and the network, security gateways must
have more computing power, memory and functions
than the IoT devices themselves. In this way, they
can implement functions such as firewalls to ensure
that hackers cannot access the IoT devices to which
they connect.
• Strong encryption measures are crucial for securing
communication between devices. Data storage and
transmission should be secured using cryptographic
algorithms.
• Inclusion of security measures in the design and
production phase: IoT developers should include
security measures at the start of the development
Image credit: Pixabay
December 2020 | Science Reporter | 31
Mr Naman Agrawal (naman.agrawal@nic.in) is Senior Associate,
NITI Aayog and Mr Neeraj Sinha is Adviser, NITI Aayog.
of IoT devices. Ensuring system and data security
by default is as critical as is deploying the latest
operating systems and using secure hardware.
• User sensitization: Users must also be informed
about the dangers of IoT systems and about measures
that they can take to ensure security from time to
time, which could be as simple as updating the
default credentials and applying software updates.
International Data Privacy Regulations
With the development of extremely fast 5G networks and
constantly improving smartphones, the enormous data
generation presents significant security threats. Governments
across the world are also responding to the global cyber
security crisis by creating new regulations that govern the
way companies handle and store valuable consumer data. This
includes important information such as personal identification,
banking, and credit card numbers, and purchase history.
The European Union, in particular, has been a leader in
this field. One of its pioneering efforts is the General Data
Protection Regulations (GDPR), which was passed in 2016
and went into effect in Spring 2018. It impacts all companies
that do business with European customers, regardless of
where the company is located.
The GDPR requires that companies receive consent
from consumers before processing data, collect and store
data anonymously, and notify the customers when their
information has potentially been breached. It also requires
large businesses to appoint a data privacy protection officer to
oversee the implementation of the regulations.
Furthermore, while the U.S. federal government has
yet to create a set of strong data privacy protections, several
states have drawn up their legislation, including Hawaii,
Massachusetts, Maryland, Mississippi, New Mexico, and
Washington.
Though it is not a party to any convention on the
protection of personal data, which is equivalent to the GDPR,
India has adopted international declarations and conventions
such as the Universal Declaration of Human Rights and the
International Covenant on Civil and Political Rights, which
recognize the right to privacy.
The Indian government also amended the Information
Technology Act (2000) (“IT Act”), which gives right to
compensation for improper disclosure of personal information.
The Indian government subsequently issued the Information
Technology (Reasonable Security Practices and Procedures
and Sensitive Personal Data or Information) Rules, 2011,
imposing additional requirements on commercial and business
entities in India relating to the collection and disclosure of
sensitive personal data or information.
Human Resource Crisis
Perhaps the most important cybersecurity challenge that will
be faced by Indian corporates is the shortage of cybersecurity
experts. Research conducted in the past year demonstrates
that 53 % of IT workers report that their company is short on
cybersecurity skills – an increase of 11% since 2016. What
is more, 69% of cybersecurity experts said that their team is
understaffed.
Today, more than 58% of cybersecurity experts have
also reported that their organisation has unfilled information
security roles. That’s a major reason why Cyber Security
Ventures recently estimated that the global shortage of
cybersecurity would reach 3.5 million unfilled positions by
2021.
Unfortunately, there’s no end in sight to this crisis. The
number of cybersecurity openings continues to grow rapidly,
while universities are still graduating the same, small amount
of qualified information security experts.
Businesses must increase their compensation packages
and other benefits in order to compete for the limited
number of data privacy specialists. In addition, companies
will have to focus on internal training programmes to
develop cybersecurity experts in-house while simultaneously
partnering with software outsourcing firms across the world
to fill the talent shortage in the meantime.
Cyber Security – Top Priority
Cybersecurity is expected to remain the top priority for Indian
policymakers and corporates over the next several years.
That’s because the number of data breaches is rising, and
hackers are increasingly using sophisticated techniques like
AI to break into well-protected systems. Countries such as
India, which are riding a wave of digitisation, must brace
themselves for the looming security challenges. Policymakers
of the countries have to take proactive measures to develop
innovative mechanisms to leverage the IT Potential of the
country.
Image credit: Pixabay
Finally, the global rollout of 5G wireless technology,
combined with the expansion of IoT, means that more
vulnerable devices will be connected to the internet over
the next several years. This will add up to the cybersecurity
challenge and will need a dedicated response from all the
stakeholders.

More Related Content

Similar to 5G-and-IoT-vs-cyber-security.pdf internet

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iotramesh209
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxsonubot1
 

Similar to 5G-and-IoT-vs-cyber-security.pdf internet (20)

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Intrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docxIntrusion Detection System Market Outlook.docx
Intrusion Detection System Market Outlook.docx
 

Recently uploaded

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 

Recently uploaded (20)

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 

5G-and-IoT-vs-cyber-security.pdf internet

  • 1. December 2020 | Science Reporter | 29 Image credit: Flickr W ITH hackers trying to break into a computer every 39 seconds on an average, cybersecurity continues to be the number one “external concern” for Indian policymakers and industry leaders, regardless of their industry. The annual costs of these attacks are expected to reach an incredible $6 trillion by 2021, according to Cyber Security Ventures (https://cybersecurityventures.com/cybercrime- damages-6-trillion-by-2021/). As a result of this data privacy crisis, major companies are boosting internal investments in cybersecurity and collaborating with industry tycoons to protect their customers’ data. Looking forward, 2020-21 promises to be the year when several cybersecurity trends converge. 5G and the Internet of Things (IoT) will also add billions of internet-connected devices into the world. Each of these is a potential target for hackers. Further, the tech talent crisis will continue to affect the data privacy sector disproportionately. That is because the number of job openings for cybersecurity experts is increasing faster than the supply of these specialists. 5G and IoT The fifth generation of wireless technology is already here. Telecommunications companies like Reliance, AT&T and Sprint have begun testing and rolling out 5G service in major cities of the world, and consumers are expected to have full access to the technology by the end of 2021. 5G tech is important because it will make IoT a reality. This interconnected network of internet-enabled devices already exists. However, its potential is limited by the slow speeds of 4G wireless. The ultra-fast 5G network will allow these devices to transfer exponentially more information, with download speeds of up to 10 Gbps. 5G & IoT vs Cyber Security Addressing the Elephant in the Room Naman Agrawal & Neeraj Sinha Image credit: Pxfuel Image credit: Pxfuel The upcoming 5G rollout is one reason why experts predict that more than 36 billion devices will be connected to the internet by the end of 2020 (https://www.pcr-online. feature Article
  • 2. 30 | Science Reporter | December 2020 biz/2020/01/15/2020-will-be-a-smarter-year-for-retail/). Unfortunately, all of them will be exposed to security threats. In fact, research has found that the “first wave of IoT attacks” had already begun in 2016. This makes the expanded IoT a nightmare for cybersecurity experts, who must figure out how to protect cell phones, security systems, vehicles, smart homes and more devices from being breached. The types of vulnerabilities and threats on IoT Devices include: • Cyber espionage: It involves the utilisation of cracking techniques and malicious software to conduct surveillance on the targeted users to gain access to personal information on the existing systems. prepare for are botnets, distributed denial of service, Radio Frequency Identity (RFID) spoofing, trojan viruses, malware and malicious scripts. Protecting IoT Systems and Devices IoT security methods vary depending on your specific IoT application and your place in the IoT ecosystem. For example, IoT manufacturers should concentrate on building security from the start, making hardware tamper-proof, building secure hardware, ensuring secure upgrades, providing firmware updates/patches and performing dynamic testing. A solution developer’s focus should be on stable software development and reliable integration. For those deploying IoT systems, hardware security and authentication are critical measures. Likewise, for operators, keeping systems up to date, mitigating malware, auditing, protecting infrastructure and safeguarding credentials is essential. Image credit: Pixabay • Instinctual force attack: It simply means making attempts to guess users’ passwords with the help of automated software, which makes multiple attempts unless it gets the right password to gain access. Image credit: Needpix Software developers must respond to these threats by integrating security patches into the devices and waiting to release electronics until security has been fully tested and assured. Some of the most common types of attacks to Some common IoT security measures include: • Network security: Protecting an IoT network includes ensuring port security, disabling port forwarding, and only supervised opening of network ports. Use of anti-malware, firewalls and intrusion detection system/intrusion prevention system, blocking of unauthorized IP addresses, and ensuring systems are always patched and are up to date. • Security gateways: As an intermediary between IoT devices and the network, security gateways must have more computing power, memory and functions than the IoT devices themselves. In this way, they can implement functions such as firewalls to ensure that hackers cannot access the IoT devices to which they connect. • Strong encryption measures are crucial for securing communication between devices. Data storage and transmission should be secured using cryptographic algorithms. • Inclusion of security measures in the design and production phase: IoT developers should include security measures at the start of the development Image credit: Pixabay
  • 3. December 2020 | Science Reporter | 31 Mr Naman Agrawal (naman.agrawal@nic.in) is Senior Associate, NITI Aayog and Mr Neeraj Sinha is Adviser, NITI Aayog. of IoT devices. Ensuring system and data security by default is as critical as is deploying the latest operating systems and using secure hardware. • User sensitization: Users must also be informed about the dangers of IoT systems and about measures that they can take to ensure security from time to time, which could be as simple as updating the default credentials and applying software updates. International Data Privacy Regulations With the development of extremely fast 5G networks and constantly improving smartphones, the enormous data generation presents significant security threats. Governments across the world are also responding to the global cyber security crisis by creating new regulations that govern the way companies handle and store valuable consumer data. This includes important information such as personal identification, banking, and credit card numbers, and purchase history. The European Union, in particular, has been a leader in this field. One of its pioneering efforts is the General Data Protection Regulations (GDPR), which was passed in 2016 and went into effect in Spring 2018. It impacts all companies that do business with European customers, regardless of where the company is located. The GDPR requires that companies receive consent from consumers before processing data, collect and store data anonymously, and notify the customers when their information has potentially been breached. It also requires large businesses to appoint a data privacy protection officer to oversee the implementation of the regulations. Furthermore, while the U.S. federal government has yet to create a set of strong data privacy protections, several states have drawn up their legislation, including Hawaii, Massachusetts, Maryland, Mississippi, New Mexico, and Washington. Though it is not a party to any convention on the protection of personal data, which is equivalent to the GDPR, India has adopted international declarations and conventions such as the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, which recognize the right to privacy. The Indian government also amended the Information Technology Act (2000) (“IT Act”), which gives right to compensation for improper disclosure of personal information. The Indian government subsequently issued the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011, imposing additional requirements on commercial and business entities in India relating to the collection and disclosure of sensitive personal data or information. Human Resource Crisis Perhaps the most important cybersecurity challenge that will be faced by Indian corporates is the shortage of cybersecurity experts. Research conducted in the past year demonstrates that 53 % of IT workers report that their company is short on cybersecurity skills – an increase of 11% since 2016. What is more, 69% of cybersecurity experts said that their team is understaffed. Today, more than 58% of cybersecurity experts have also reported that their organisation has unfilled information security roles. That’s a major reason why Cyber Security Ventures recently estimated that the global shortage of cybersecurity would reach 3.5 million unfilled positions by 2021. Unfortunately, there’s no end in sight to this crisis. The number of cybersecurity openings continues to grow rapidly, while universities are still graduating the same, small amount of qualified information security experts. Businesses must increase their compensation packages and other benefits in order to compete for the limited number of data privacy specialists. In addition, companies will have to focus on internal training programmes to develop cybersecurity experts in-house while simultaneously partnering with software outsourcing firms across the world to fill the talent shortage in the meantime. Cyber Security – Top Priority Cybersecurity is expected to remain the top priority for Indian policymakers and corporates over the next several years. That’s because the number of data breaches is rising, and hackers are increasingly using sophisticated techniques like AI to break into well-protected systems. Countries such as India, which are riding a wave of digitisation, must brace themselves for the looming security challenges. Policymakers of the countries have to take proactive measures to develop innovative mechanisms to leverage the IT Potential of the country. Image credit: Pixabay Finally, the global rollout of 5G wireless technology, combined with the expansion of IoT, means that more vulnerable devices will be connected to the internet over the next several years. This will add up to the cybersecurity challenge and will need a dedicated response from all the stakeholders.