Accept the updated privacy & cookie policy

The Indiatimes.com Privacy Policy has been updated to align with the new data regulations in European Union. Please review and accept these changes below to continue using the website. We use cookies to ensure the best experience for you on our website.

A Cybersecurity Researcher Tells Us Why Companies & Users Need To Do More To Safeguard Data

Today¡¯s world experiences massively interconnected devices to share information across variety of platforms between traditional computers (machines), Smart IoT devices used across smart homes, smart interconnected vehicles etc. and of course th
Dr. Priyadarsi Nanda Updated on Feb 10, 2019, 11:40 IST

Today¡¯s world experiences massively interconnected devices to share information across variety of platforms between traditional computers (machines), Smart IoT devices used across smart homes, smart interconnected vehicles etc. and of course the social networks apps such as Facebook, LinkedIn, twitter etc.

We have experienced this trend with a skyrocketing growth and foresee it to continue exponentially in the future. At one end, we find life becoming easier with such developments and at the other end, we experience more and more cyber threats on our privacy, security and trustworthiness with organizations holding our data.

This article presents my view on cybersecurity trends for 2019 based on my recent experiences dealing with smart device technologies and data privacy.

reuters/representational image

ALSO READ:?What Does Your Data Mean In 2019, And How Do You Make Sure You Protect It Like Crazy?

Data is the future currency of businesses and protection of data is the utmost priority for individuals, business organizations and countries. As the tremendous growth in smart devices is certainly going to impact the way we share our information, it will open up a new front in creating additional attack surface.

Core devices such as the routers and home assistants are the kinds of equipment that interact most with other smart devices as well as the Internet. Hence, they are likely to be primary targets for attackers.

Data breach is either a situation when personal information is lost or compromised intentionally or accidentally resulting in harm to individuals, agencies or business organizations. The breach of sensitive data not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss.?

General Data Protection Regulation (GDPR) was introduced and legislated by the European Union (EU) on 25th May 2018 and is certainly an important step to preserve data privacy of consumers and organisations. Such efforts are encouraged by other countries and a trend that will influence the cybersecurity landscape in 2019 as well as in future. California Consumer Privacy Act (CCPA) in United States signed law similar to GDPR less than 40 days after GDPR came into effect.

reuters/representational image

ALSO READ:?How This Secret Cyber Security Centre In Chennai Protects All Of Us In India From Cyber Attacks

In India, similar laws have been proposed under the ¡®Personal Data Protection Bill¡¯, which is expected to be tabled in the Parliament this summer, after the Lok Sabha elections 2019.?

Data breach can be classified into two categories based on how they are preserved. Physical breach where protection of physical sensitive files and its storage must be kept and maintained confidentially.

It is the responsibility of officials and authorities who are in charge of maintaining and preserving the integrity of data at all times. In the world of digital economy, organizations now rely more on maintaining their data in digital form.

Though finding, accessing and operating on these data is quicker and cost effective using digitally stored information, such data is also exposed more frequently to adversaries.?

Data breaches could happen at different points during the life cycle of data such as, data-at rest, data-in-use and data-in-motion (i.e. data in transmission). A breach may result in exposing (leaking) sensitive transmitted data either intentionally or accidentally, from a victim organisation to external unauthorized destinations.

The leak of sensitive data, such as high level security classified government and military information, patients¡¯ medical records, commercial information, intellectual property and customer information, can be caused by insiders, outsiders or trusted third-parties.

reuters/representational image

ALSO READ:?Indian Govt Can Now Track & Monitor Data On Your Computer, And Police Can Seize Your Devices

However, regardless of how leak of sensitive data is caused and regardless of whether the leak is due to a malicious intention or an inadvertent mistake, the incident could pose serious threats to an organisation and leads to direct and indirect losses.

There has been significant progress made through researchers, academics and organizations as well as government policy bodies in the last few years developing solution to avoid data breach. In spite of all these efforts, there have been increased data breach happening around the world in recent years.

We envisaged the fact such breaches are increasing due to several reasons. 1. The proposed solutions are not fully implemented, 2. Users of various social networks expose too much information either intentionally or unintentionally and have very limited understandings on consequences of exposing such information and 3.

Development and use of non-standardized Internet of Things (IoT) smart devices. Recent data breach incident involving how fitness tracker was used to locate military bases of countries expose serious data breach and security.

There have been numerous such incidents happening around the globe, which are of severe concerns to private, public and government organizations. Data breach may do more than damaging the trust that people place in an organization.?

reuters/representational image

ALSO READ:?How To Keep You And Others Safe Online: Here Are 9 Tips To Protect Your Data Anywhere

Based on the data protection law either adopted or in final stages of legislation by different countries (Australia, Brazil, Japan, China, India etc.), it is expected that in 2019, companies will be busy preparing to comply with such legislation around the world.

Recent cases with Facebook and Google+ exposed the account information of 90 million users suggest tight control on data privacy is what organisations must consider to win the confidence of their users in order to stay safe in the business.

Business organizations must take extra precautions as well as follow strict regulations on how to protect their consumer data in every form. Hence, consumers should not leave it up to businesses to do the right thing, there are things consumers must do to protect themselves.

There is a steady increase in Ransomware cases until now and recently many ransomware victims have found themselves having to follow a criminal¡¯s instructions on how to sign up for a Bitcoin wallet or other means of making a ransom payment.

With increased use of block-chain technology, new problems surrounding crypto currency would most likely going to be surfaced in 2019. An exhaustive description of how blockchain, cryptocurrency and coin mining work is well out of scope for this article. Simplistically, all these terms and their associated mechanisms could require huge processing power into the future.

More and more Cyber criminals have been using Monero (private digital currency) which certainly has obvious advantages for criminals. With new technologies around crypto currency being used, cyber criminals will be more interested intercepting devices (Cryptojacking) used to process crypto currency. In 2019, we predict cryptocurrency-mining malware to target Mac OS or Android OS due to third-party add-ons used with Linux and Windows distributions.

With constant progress in cyber defence schemes, we are also experiencing changing strategies adopted by cyber criminals such as, use of more automation techniques involving Artificial Intelligence (AI) and Machine Learning (ML) techniques to make their attack approach even more efficient.

Hence, in 2019 we expect such criminal activities will become more effective, cost-efficient and easier for social engineering attacks.

reuters/representational image

ALSO READ:?77.3 Crore Emails & Passwords Have Been Leaked Online, In One Of The Biggest Data Breach Ever

Connected vehicles is an area where more and more vehicle manufacturers are investing their resources to manage transport data in most effective and efficient manner.

New data protection schemes surrounding transport data is an important area of research recently in the space of Vehicular Network as more threats may be posed by cyber attackers causing significant damage to the privacy and security of future connected autonomous vehicles.

Hence, in 2019 and to the future years we expect more research activities in some of the important areas of concern involving vehicular network such as; a. How to prevent illegitimate users from accessing or forging transport data, b.

Developing flexible key management algorithms preventing forged data, c. How to develop a vehicle traceability mechanism in case of cyber-attacks on such network, d. Establishing an infrastructure reputation model and e. Building a data responsibility system.

Finally, we would like to emphasize that, in 2019 and beyond more and more cyber threats related to data breach, ransomware, infrastructure related attacks are going to happen due to new automated schemes recently adopted by cyber criminals. Alongside these threats, users will still be hit by traditional attacks involving phishing, DDoS, Identity theft and so on.

Hence, individuals, companies and governments around the world must take a proactive approach, training individuals adopting to new secure technologies and preparing a holistic approach to combat future threats.?

About the author:?Dr. Priyadarsi Nanda is a Senior Lecturer at the University of Technology Sydney (UTS) with more than 27 years of experience specializing in research and development of Cybersecurity, IoT security, Internet Traffic Engineering, wireless sensor network security and many more related areas. In Cybersecurity research, he has published over 80 high quality refereed research papers as well as conference articles. In 2017, his work in cyber security research has earned him and his team the prestigious Oman research council¡¯s national award for best research.

ad
seductrice.net
universo-virtual.com
buytrendz.net
thisforall.net
benchpressgains.com
qthzb.com
mindhunter9.com
dwjqp1.com
secure-signup.net
ahaayy.com
tressesindia.com
puresybian.com
krpano-chs.com
cre8workshop.com
hdkino.org
peixun021.com
qz786.com
utahperformingartscenter.org
worldqrmconference.com
shangyuwh.com
eejssdfsdfdfjsd.com
playminecraftfreeonline.com
trekvietnamtour.com
your-business-articles.com
essaywritingservice10.com
hindusamaaj.com
joggingvideo.com
wandercoups.com
wormblaster.net
tongchengchuyange0004.com
internetknowing.com
breachurch.com
peachesnginburlesque.com
dataarchitectoo.com
clientfunnelformula.com
30pps.com
cherylroll.com
ks2252.com
prowp.net
webmanicura.com
sofietsshotel.com
facetorch.com
nylawyerreview.com
apapromotions.com
shareparelli.com
goeaglepointe.com
thegreenmanpubphuket.com
karotorossian.com
publicsensor.com
taiwandefence.com
epcsur.com
mfhoudan.com
southstills.com
tvtv98.com
thewellington-hotel.com
bccaipiao.com
colectoresindustrialesgs.com
shenanddcg.com
capriartfilmfestival.com
replicabreitlingsale.com
thaiamarinnewtoncorner.com
gkmcww.com
mbnkbj.com
andrewbrennandesign.com
cod54.com
luobinzhang.com
faithfirst.net
zjyc28.com
tongchengjinyeyouyue0004.com
nhuan6.com
kftz5k.com
oldgardensflowers.com
lightupthefloor.com
bahamamamas-stjohns.com
ly2818.com
905onthebay.com
fonemenu.com
notanothermovie.com
ukrainehighclassescort.com
meincmagazine.com
av-5858.com
yallerdawg.com
donkeythemovie.com
corporatehospitalitygroup.com
boboyy88.com
miteinander-lernen.com
dannayconsulting.com
officialtomsshoesoutletstore.com
forsale-amoxil-amoxicillin.net
generictadalafil-canada.net
guitarlessonseastlondon.com
lesliesrestaurants.com
mattyno9.com
nri-homeloans.com
rtgvisas-qatar.com
salbutamolventolinonline.net
sportsinjuries.info
wedsna.com
rgkntk.com
bkkmarketplace.com
zxqcwx.com
breakupprogram.com
boxcardc.com
unblockyoutubeindonesia.com
fabulousbookmark.com
beat-the.com
guatemala-sailfishing-vacations-charters.com
magie-marketing.com
kingstonliteracy.com
guitaraffinity.com
eurelookinggoodapparel.com
howtolosecheekfat.net
marioncma.org
oliviadavismusic.com
shantelcampbellrealestate.com
shopleborn13.com
topindiafree.com
v-visitors.net
djjky.com
053hh.com
originbluei.com
baucishotel.com
33kkn.com
intrinsiqresearch.com
mariaescort-kiev.com
mymaguk.com
sponsored4u.com
crimsonclass.com
bataillenavale.com
searchtile.com
ze-stribrnych-struh.com
zenithalhype.com
modalpkv.com
bouisset-lafforgue.com
useupload.com
37r.net
autoankauf-muenster.com
bantinbongda.net
bilgius.com
brabustermagazine.com
indigrow.org
miicrosofts.net
mysmiletravel.com
selinasims.com
spellcubesapp.com
usa-faction.com
hypoallergenicdogsnames.com
dailyupdatez.com
foodphotographyreviews.com
cricutcom-setup.com
chprowebdesign.com
katyrealty-kanepa.com
tasramar.com
bilgipinari.org
four-am.com
indiarepublicday.com
inquick-enbooks.com
iracmpi.com
kakaschoenen.com
lsm99flash.com
nana1255.com
ngen-niagara.com
technwzs.com
virtualonlinecasino1345.com
wallpapertop.net
casino-natali.com
iprofit-internet.com
denochemexicana.com
eventhalfkg.com
medcon-taiwan.com
life-himawari.com
myriamshomes.com
nightmarevue.com
healthandfitnesslives.com
androidnews-jp.com
allstarsru.com
bestofthebuckeyestate.com
bestofthefirststate.com
bestwireless7.com
britsmile.com
declarationintermittent.com
findhereall.com
jingyou888.com
lsm99deal.com
lsm99galaxy.com
moozatech.com
nuagh.com
patliyo.com
philomenamagikz.net
rckouba.net
saturnunipessoallda.com
tallahasseefrolics.com
thematurehardcore.net
totalenvironment-inthatquietearth.com
velislavakaymakanova.com
vermontenergetic.com
kakakpintar.com
jerusalemdispatch.com
begorgeouslady.com
1800birks4u.com
2wheelstogo.com
6strip4you.com
bigdata-world.net
emailandco.net
gacapal.com
jharpost.com
krishnaastro.com
lsm99credit.com
mascalzonicampani.com
sitemapxml.org
thecityslums.net
topagh.com
flairnetwebdesign.com
rajasthancarservices.com
bangkaeair.com
beneventocoupon.com
noternet.org
oqtive.com
smilebrightrx.com
decollage-etiquette.com
1millionbestdownloads.com
7658.info
bidbass.com
devlopworldtech.com
digitalmarketingrajkot.com
fluginfo.net
naqlafshk.com
passion-decouverte.com
playsirius.com
spacceleratorintl.com
stikyballs.com
top10way.com
yokidsyogurt.com
zszyhl.com
16firthcrescent.com
abogadolaboralistamd.com
apk2wap.com
aromacremeria.com
banparacard.com
bosmanraws.com
businessproviderblog.com
caltonosa.com
calvaryrevivalchurch.org
chastenedsoulwithabrokenheart.com
cheminotsgardcevennes.com
cooksspot.com
cqxzpt.com
deesywig.com
deltacartoonmaps.com
despixelsetdeshommes.com
duocoracaobrasileiro.com
fareshopbd.com
goodpainspills.com
hemendekor.com
kobisitecdn.com
makaigoods.com
mgs1454.com
piccadillyresidences.com
radiolaondafresca.com
rubendorf.com
searchengineimprov.com
sellmyhrvahome.com
shugahouseessentials.com
sonihullquad.com
subtractkilos.com
valeriekelmansky.com
vipasdigitalmarketing.com
voolivrerj.com
worldhealthstory.com
zeelonggroup.com
1015southrockhill.com
10x10b.com
111-online-casinos.com
191cb.com
3665arpentunitd.com
aitesonics.com
bag-shokunin.com
brightotech.com
communication-digitale-services.com
covoakland.org
dariaprimapack.com
freefortniteaccountss.com
gatebizglobal.com
global1entertainmentnews.com
greatytene.com
hiroshiwakita.com
iktodaypk.com
jahatsakong.com
meadowbrookgolfgroup.com
newsbharati.net
platinumstudiosdesign.com
slotxogamesplay.com
strikestaruk.com
techguroh.com
trucosdefortnite.com
ufabetrune.com
weddedtowhitmore.com
12940brycecanyonunitb.com
1311dietrichoaks.com
2monarchtraceunit303.com
601legendhill.com
850elaine.com
adieusolasomade.com
andora-ke.com
bestslotxogames.com
cannagomcallen.com
endlesslyhot.com
iestpjva.com
ouqprint.com
pwmaplefest.com
qtylmr.com
rb88betting.com
buscadogues.com
1007macfm.com
born-wild.com
growthinvests.com
promocode-casino.com
proyectogalgoargentina.com
wbthompson-art.com
whitemountainwheels.com
7thavehvl.com
developmethis.com
funkydogbowties.com
travelodgegrandjunction.com
gao-town.com
globalmarketsuite.com
blogshippo.com
hdbka.com
proboards67.com
outletonline-michaelkors.com
kalkis-research.com
thuthuatit.net
buckcash.com
hollistercanada.com
docterror.com
asadart.com
vmayke.org
erwincomputers.com
dirimart.org
okkii.com
loteriasdecehegin.com
mountanalog.com
healingtaobritain.com
ttxmonitor.com
nwordpress.com
11bolabonanza.com