0% found this document useful (0 votes)
67 views9 pages

Digital Empowerment Notes Unit 3 (DuExam - In)

Digital empowerment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views9 pages

Digital Empowerment Notes Unit 3 (DuExam - In)

Digital empowerment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Towards Safe and Secure

Cyberspace
Unit 3
UNIT-III Towards Safe and Secure Cyberspace (4 Weeks)
Online security and privacy
Threats in the digital world: Data breach and Cyber Attacks
Blockchain Technology
Security Initiatives by the Govt of India
Online Security And Privacy
Online security and privacy refer to the measures and practices individuals
and organizations take to protect their data, information, and activities while
using the internet.

● Protection from Cyber Threats


● Authentication
● Firewalls and Antivirus: Using firewalls and antivirus software to prevent
unauthorized access and to detect and remove malicious software
● Regular Updates
● Data Protection
● Encryption
● Privacy Settings
Threats in the Digital World
The digital world presents various threats, and these can range from cyberattacks
that compromise personal information to more extensive attacks that target
critical infrastructure.

Common threats in the digital world:

● Malware: Malicious software includes viruses, worms, Trojans, and


ransomware. These can infect your devices, steal data, or disrupt their normal
functioning.

● Phishing: Phishing attacks use deceptive emails or websites to trick


individuals into revealing personal information, such as login credentials or
financial data.
Data Breaches: These occur when unauthorized parties gain
access to sensitive information, often through hacking. Data
breaches can result in the exposure of personal or financial data.
Identity Theft: Attackers can use stolen personal information to
impersonate individuals, commit fraud, or gain unauthorized
access to accounts and services.
Insider Threats: These come from individuals within an
organization who misuse their access to cause harm, such as
leaking sensitive data.
Blockchain Technology

Blockchain technology is a decentralized and distributed ledger system that


underlies cryptocurrencies like Bitcoin but has a wide range of other applications
beyond digital currencies.

● Decentralization: Blockchain operates on a decentralized network of


computers (nodes), which means there is no central authority or
intermediary. This enhances security and reduces the risk of a single point of
failure.
● Immutability: Once data is recorded on the blockchain, it is nearly impossible
to alter. This immutability is achieved through cryptographic hashing.
● Transparency: All transactions and data on the blockchain are visible to all
participants in the network. This transparency can enhance trust and
accountability.
Security: Blockchain uses cryptographic techniques to secure data and
transactions. Transactions are grouped into blocks and linked together in a chain,
making it very difficult for unauthorized parties to alter the data.

Energy Consumption: Some blockchain networks, like Bitcoin, are criticized for
their high energy consumption due to the Proof of Work consensus mechanism.
Security Initiatives by Government of India
The Government of India has implemented various security initiatives to
address the growing concerns related to cybersecurity and national
security. Some notable initiatives include:
● National Cyber Security Policy (NCSP): The Indian government
introduced the NCSP in 2013 to protect information infrastructure
and create a secure cyberspace environment. It outlines strategies for
cybersecurity, including the protection of critical infrastructure.
● National Critical Information Infrastructure Protection Centre
(NCIIPC): NCIIPC was established to protect critical information
infrastructure in India. It works to safeguard systems and networks
that are vital for the functioning of the nation.
Indian Computer Emergency Response Team (CERT-In): CERT-In is the national
agency for responding to cybersecurity incidents. It plays a crucial role in incident
management, threat analysis, and the dissemination of cybersecurity-related
information.

Data Protection and Privacy Laws: India has been working on data protection
legislation, such as the Personal Data Protection Bill, which aims to safeguard the
personal data of Indian citizens and regulate its use.

Cyber Swachhta Kendra: This initiative focuses on promoting cybersecurity


awareness among citizens and providing tools and information to protect against
malware and other cyber threats.

National Technical Research Organization (NTRO): NTRO is responsible for


technical intelligence and cybersecurity. It plays a significant role in monitoring and
safeguarding India's critical information infrastructure.

You might also like