Volume 6, Issue 9, September – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Cyber-Attacks and Cybersecurity
The pressing need for the latter
Subhabrata Chakraborty
B.Tech., CSE
Maulana Abul Kalam Azad University of Technology
Kolkata, West Bengal, India
Abstract:- The importance of cybersecurity is rapidly Ransomware: Ransomware is a type of malware that takes
increasing with the enormous growth in the number and control of files and encrypts them. The attacker then demands
types of cyber-attacks. This article explores some of the money (ransom) from the victim for the decryption key. If the
most common types of cyber-attacks plaguing cyberspace victim does not pay, he destroys the decryption key, rendering
today and stresses the need for cybersecurity. It then goes the files useless. [1]
on to explain cybersecurity and its features. With the help
of cybercrime statistics from India and a unique Man-In- SQL Injection Attack: It involves the injection of malicious
The-Middle attack case from Kolkata, it further code into a website. It can result in stealing or removal of
strengthens the case for a robust cybersecurity. Finally, customer information from the website.
the criteria for a strong future cybersecurity framework is
provided. Cross-Site Scripting: The attacker silently includes malicious
scripts in the web browser of the victim. Generally, a
Keywords:- Cybersecurity; Cyber-Attacks; Need; Robust; legitimate web page or web application contains such scripts.
Framework The attack occurs when the victim visits the web page or web
application. It delivers the malicious script to the browser.
I. INTRODUCTION – THE CYBER-ATTACK
THREATS WE FACE Cross-Site Request Forgery: This forces the user to execute
unwanted actions. The help of social engineering is taken to
With the growing use of the internet, the threat for trick the users into executing unwarranted actions. A CSRF
transactions and activities has increased manifold. The attack can force the user to change his email address, transfer
increase in such threats has necessitated the rapid growth in funds, etc.
cybersecurity. One has to understand the nature of cyber-
attacks to provide robust security. This section defines and Distributed Denial-of-Service: This involves flooding the
explains the different kinds of cyber threats. Such cyber- network system with packets of data, messages, etc. These
attacks mainly affect data by corrupting confidentiality, packets are sent by several infected machines together. The
integrity, and availability – the three qualities that are so flood slows down or crashes the entire networking system.
integral to data. Such attacks may severely affect the Botnets: Botnets are the millions of systems infected with
reputation of a financial organization and jeopardize its malware to carry out Distributed Denial-of-Service attacks.
Information Technology systems. These bots or zombie systems carry out attacks against the
target systems, often overwhelming their bandwidth and
Now, how do these attacks take place? A simple answer processing capabilities. These attacks are difficult to trace
would be that hackers use malicious code and software to alter because botnets remain in different geographic locations.
computer code, logic, and data. Such disruption results in data
compromise. That, in turn, leads to dangerous consequences Drive-by Attack: This attack involves hackers looking for
like financial information theft or system infiltration. Not all insecure websites and planting malicious code on one of the
cyber-attacks are similar. They can be of various types based pages. It might install malware directly onto the computer of a
on the method used. Some of the common cyber-attack types site visitor. It might re-direct the victim to a website controlled
are: by hackers. Unlike the other cyber security attacks, a drive-by
does not rely on a user to do anything. One does not have to
Viruses: Viruses are lines of code hidden in malware or click a download button or open a malicious email attachment
phishing mails that, upon execution, replicate themselves by to become infected. With the help of an operating system, an
modifying computer programs. app, or web browser containing security flaws due to
unsuccessful updates or lack of updates the attack is
Malware: Malware(Malicious Software) can be spyware, channelized.
ransomware, or adware. It installs like software and takes
control of the computer. It then sends all the confidential data Eavesdropping Attack: Eavesdropping, also known as sniffing
to the attacker silently. or snooping, is a network security attack where individual
attempts to overhear the information that smartphones or
computers send. This hack capitalizes on accessing the data
IJISRT21SEP682 www.ijisrt.com 642
Volume 6, Issue 9, September – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
transmitted in an unsecured network. It is difficult to detect II. CYBERSECURITY – A FORMIDABLE
since it does not cause abnormal data transmissions. COUNTER AGAINST CYBER-ATTACKS
Man-in-the-middle Attack: In this attack, a hacker puts himself
between the communications of a client and a server. The Cyber security is the method of protecting networks,
hacker then gains access to the data being sent or received. systems, and programs from cyber-attacks. These are usually
aimed at changing, accessing, or destroying sensitive
Social Engineering: Social engineering techniques manipulate information, extorting money from users, or interrupting
human trust and extract information. An email or a phone call normal business processes by deliberate exploitation of
to reveal sensitive data might spell doom for the victim. computers, networks, and technology-dependent enterprises. It
protects information from malicious threats that affect
Malicious Emails: It tricks users into sharing personal details confidentially, integrity, and availability - the three qualities
or credentials. In Spear Phishing, carefully crafted emails are integral to information [2].
sent to a small list of people. A cybercriminal may
impersonate as an executive and attempt to get an employee, The key elements of cyber security are:
customer, or vendor to transfer funds or sensitive information i) Network security
to the phisher. ii) Application security
iii) Endpoint security
Smishing and Vishing: In these, telephones replace emails as iv) Data security
the method of communication. Smishing involves the sending v) Database and infrastructure security
of text messages by criminals, while vishing involves vi) Mobile security
telephone conversations. vii) Identity management
viii) Cloud security
Angler Phishing: A new type of attack, social media offers a ix) End-user education
myriad of ways for criminals to trick people. Cloned websites, x) Disaster recovery/business continuity planning
tweets, posts, fake URLs and instant messaging can be used to
make people download malware. Network Security
It covers numerous technologies, devices, and processes.
Password Attack: Passwords are the usual mechanism to It is the crafted set of rules and configurations implemented
authenticate users to an information system. So, obtaining for the protection of the confidentiality, integrity, and
passwords is a common and effective ploy. Such can be accessibility of networks and data. It protects internal
obtained by looking around a person’s desk, ‘‘sniffing’’ the networks from attackers by securing the infrastructure. Strong
connection to get unencrypted passwords, using social passwords and two-factor authentication (2FA) are examples
engineering, gaining access to a password database. Outright of network security.
guessing can also be used with Brute-force or Dictionary
attack. Application Security
It uses software and hardware for the protection and
AI-Powered Attack: Artificial intelligence is present in security against threats during the development stage of an
everyday applications through an algorithmic process referred application. Firewalls, antivirus programs, and encryption are
to as machine learning. Machine learning software trains a the different types of application security.
computer to perform particular tasks on its own. AI can hack
into many systems like autonomous vehicles and drones, Endpoint Security
converting them into potential weapons. It makes cyber- It is the protection of computer networks remotely
attacks more powerful and efficient. It can kill or injure bridged to client devices. The connection of endpoint devices
people, steal money, or cause emotional harm. Large attacks like tablets, mobile phones, laptops, Internet-of-things devices
can even affect national security. to corporate networks results in attack paths. A definite level
of compliance with standards is ensured by endpoint security.
Threats associated with outsourcing: Sophisticated cyber
activity against Third-Party Managed Service providers, Data Security
vendors that provide services to Banks. It means protecting digital data (a database, etc.) from
unwanted actions of unauthorized users and destructive forces.
Insider Threats: one of the biggest threats, and often one of
the hardest to detect, is that of malicious, careless, and Database and Infrastructure Security
compromised employees, contractors, and partners who are Securing physical devices and databases is vital in a
already inside the secure perimeter and have legitimate access network. Database and infrastructure security provides
to its sensitive data and IT networks. security for these cyber-physical systems.
Advanced Persistent Threats: These are long, directed cyber- Mobile Security
attacks that are often state-sponsored. An organization or Also known as wireless security, it is the protection that
individual accesses another organization's LAN or internal is in place for laptops, smartphones, tablets, other devices, and
internet through a gateway or a vulnerability and extracts the networks they are connected to from the risks and threats
information or implements other malicious measures. in wireless computing.
IJISRT21SEP682 www.ijisrt.com 643
Volume 6, Issue 9, September – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Identity Management cyber-attacks take place. Through a phishing mail sent to an
Identity management and access control can be employee, the hackers were able to access his credentials.
components crucial to security architecture. It involves the Funds worth 171 million dollars were swindled and
management of access to enterprise resources. It can ensure transferred. However, the prompt action of the bank helped it
the security of systems and data. It helps in the identity recover most of its money.
verification of users before granting them access to the
systems or sharing information. In 2017, the Wannacry ransomware affected India and
several thousands of computers were locked down by ransom-
Cloud Security seeking hackers. The systems belonging to the Andhra
It refers to the services, technologies, controls, and Pradesh Police and the state utilities of West Bengal were also
policies to protect cloud data, applications, and infrastructure affected in the process.
from cyber-attacks. It helps to manage risks associated with
on-premises attacks by constantly monitoring and protecting These statistics highlight how the challenges are
the data in the cloud. mounting and stress the need for a robust cybersecurity
solution for the future.
End-user Education
It is the process of training and educating users about the IV. THE KOLKATA MITM ATTACK AND HOW
security practices and safety measures (e.g., not to click FOLLOWING BASIC CYBERSECURITY RULES
unknown links, not to download suspicious attachments, etc.) COULD HAVE AVERTED IT
to avoid entry of malware or other malicious software. A good
end-user security training program can enhance the security of In June 2021 Kolkata’s ATMs were attacked by MITM
an organization. It should be in a language and at a technical (Man in the middle) based attacks.[4] These focused on the
level that can be followed by everyone. communication between the host and the ATM PC. The
attacks faked the host response for the transactions without
Disaster Recovery or Business Continuity Planning debiting the money from the account.
It is the process of resuming business after a disruptive
event. Business continuity planning ensures that enterprises The hackers used a BlackBox device. The device was
can keep running the business not only after small disruptions connected between the ATM’s PC and the dispenser. This
but also in case of bigger disasters. The two terms are allowed the attacker to send cash dispensing commands
mentioned under the acronym BC/DR. These are mapped out directly to the ATM without any validation from the bank
to help employees communicate and go about doing their jobs side.
in the unlikely event of an attack. The details may vary
depending on the size, scope, and workings of the company. Now, this could have been prevented as most of the
ATMs under attack were not upgraded software which is a
III. THE CURRENT BOOM IN CYBER ATTACKS clear breach of cybersecurity norms. Secondly, there was a
need to employ a virtual private network (VPN) before
After explaining the various cyber threats and then sending the data. This would have ensured that the data got
emphasizing the different kinds of cybersecurity, it is pertinent encrypted and could not be read by the hacker.
to produce a picture of cyber threats presently plaguing the
world. In this case, we use the example of India although the V. THE ESSENTIAL FEATURES OF FUTURE
situation and severity of cyber-threats remain a cause for CYBERSECURITY
concern all over the world.
While the need for cybersecurity is of utmost urgency,
The cyber situation of India is important as India ranks one must clearly outline what qualities the future
3rd in the total number of internet users all over the world. cybersecurity should have. Besides the extant features, future
According to a report published by NITI Aayog, India’s cybersecurity must have:
internet use has a CAGR growth rate of 44%.[3] It also ranks 1. Prediction – Predict the most likely targets, attacks, and
in the top 10 when it comes to spam-sending. Of the countries methods. Take proactive measures to identify attackers, their
affected by cyber-crime, India ranks among the top 5. methods, and objectives before the materialization of attacks.
2. Prevention – Deter or prevent attacks so that no loss is
Most of these cyber-attacks belong to the categories of experienced. Secure the computing environment with current
Denial of Services, Web Attacks, and Payment cards patches, tools, updates, and best-known methods in an
skimming. Also, the majority of the attacks included the use of efficient and timely manner. Reinforcing and educating good
malware and stolen passwords. About 75% of Indian CXOs user behaviors is critical too.
are said to lack confidence in their company’s cybersecurity 3. Detection – Identify attacks that are not prevented by the
infrastructure. Some reports suggest that cybercrime damages system to allow for a thorough and rapid response. Efficient
will cost the world six trillion dollars in damages annually by management of efforts to repair, contain and recover, as
2021. needed returning the environment to normal operations.
4. Response – Rapidly address incidents for minimal losses
The case of hackers hacking into the system of the and quick return to a normal state. Monitor key areas and
Union Bank of India in 2016 is a glaring example of how
IJISRT21SEP682 www.ijisrt.com 644
Volume 6, Issue 9, September – 2021 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
activities for the attack which evade prevention. Identify
breaches, issues, and attacks.
5. Driven by AI & ML: As artificial intelligence and machine
learning gather speed, and start to impact more and more
industries, it is poised to play a greater role in cybersecurity.
Machine learning models that can accurately identify and
predict attacks could be a real boon. These models need to be
honed and trained. However, there is a risk that AI and
machine learning may be exploited by attackers.
6. Layered security: A layered cybersecurity approach is a
gradual process. [5] One needs to take stock of inventory to
ascertain the number of devices used. Then, security can be
added wherever necessary in the different layers. Yes, the
world of work has changed. The opportunity for attackers to
get their hands on data has increased manifold. To protect
business regular tests are required to ensure that security
controls are effective and that they work properly.
VI. CONCLUSION
Here I have tried to analyze and define the different
kinds of cyber-threats and how cybersecurity might find use
as a formidable defense against them. Cybersecurity has to
meet future standards. So, after making a case for
cybersecurity, I have mentioned the features that
cybersecurity needs to develop to become future-ready.
REFERENCES
[1]. “17 Types Of Cyber Attacks To Secure Your Company
From”, Bojana Dobran, February 21, 2019,
Unpublished.
[2]. University Of North Dakota, Blog Article On
Cybersecurity, Unpublished.
[3]. Paper on Cyber Security by Dr. V. K. Saraswat,
Member, NITI Aayog, India at Cyber Security
Conclave, Vigyan Bhawan, New Delhi, India,2017.
[4]. Times of India, online portal, 31st May 2021.
[5]. 7 Types Of Layering Techniques – Microage(Online),
Unpublished.
IJISRT21SEP682 www.ijisrt.com 645