Internet Security

Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web[citation needed], but also network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.

Many methods are used to protect the transfer of data, including encryption and from-the-ground-up engineering. The current focus is on prevention as much as on real time protection against well known and new threats.

Internet security is a catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.

Internet security relies on specific resources and standards for protecting data that gets sent through the Internet. This includes various kinds of encryption such as Pretty Good Privacy (PGP). Other aspects of a secure Web setup includes firewalls, which block unwanted traffic, and anti-malware, anti-spyware and anti-virus programs that work from specific networks or devices to monitor Internet traffic for dangerous attachments.

Internet security is generally becoming a top priority for both businesses and governments. Good Internet security protects financial details and much more of what is handled by a business or agency’s servers and network hardware. Insufficient Internet security can threaten to collapse an e-commerce business or any other operation where data gets routed over the Web.

Internet security refers to securing communication over the internet. It includes specific security protocols such as:

  • Internet Security Protocol (IPSec)
  • Secure Socket Layer (SSL)

Internet security is a branch of computer security that deals specifically with internet-based threats. These include hacking, where unauthorized users gain access to computer systems, email accounts or websites; viruses and other malicious software (malware), which can damage data or make systems vulnerable to other threats; and identity theft, where hackers steal personal details such as credit card numbers and bank account information.

You can protect yourself from these threats with strong internet security.

Malware and Anti-Malware

Malware, meaning malicious software, includes viruses, worms and Trojans. Although “virus” is used colloquially to refer to various malware types, its meaning is quite specific.

A virus is a program that replicates itself throughout a system. It can spread to other computers, but needs user involvement since it requires a host file to spread. An individual must download the virus from the internet or connect infected storage media, such as a USB drive, to his computer. A worm replicates itself and spreads more actively.

A Trojan (from Trojan horse) can appear useful, but is actually dangerous. Trojans can steal data such as passwords or financial details or allow “back-door” access into computers. Networks of compromised computer systems, called botnets, are used to send spam or disseminate further malware. Install and use anti-malware internet protection applications to protect your computer.

Internet Security: Firewalls

Think of a firewall as a filter consisting of a device or array of devices that allow or deny access to a network. Firewalls, which can be hardware or software devices, prevent sensitive information from being uncovered and stolen from networks and also prevent dangerous information — such as malicious code — from being planted on networks. Firewalls apply a specific set of rules to all information coming in or going out of networks to determine whether it’s dangerous or benign.

Browser Choice

Browsers can have security flaws, which allow hackers and cyber-criminals to attack computers and networks. You must choose a secure browser and keep it updated with new security patches the developer releases. One example of a dangerously insecure browser is Microsoft’s Internet Explorer 6 (IE6). Although it’s now largely out of use, IE6 has so many security flaws that even Microsoft wants to stop people from using it.

Email Security

Electronic mail (email) offers many potential vulnerabilities. It’s often used to send sensitive information, which then becomes vulnerable to theft, and is also used to distribute malware. A solid email security strategy includes both anti-malware applications and good practice by users, such as not sending sensitive information via unsecured email and not opening suspicious messages.

Denial-of-Service Attack

Denial of service (DoS) attacks are performed against computer resources such as websites. The aim of a DoS attack is to make a resource unavailable to users. One example is when a website is so overwhelmed by repeated communications requests that it cannot keep up with the demand. When multiple systems are involved, it becomes a distributed denial of service attack (DDoS). Methods for protecting against such attacks include firewalls and systems such as “clean pipes,” in which website traffic is routed through a proxy server that drops bad traffic, allowing only genuine requests.

Social Engineering

The strongest firewall and high security anti-virus suite won’t protect your system if you give away sensitive information such as passwords or security questions. Social engineering uses tricks to make you hand over information to criminals.

An example is phishing, in which an email appears to come from a reputable organization such as a bank, tricking the recipient into entering their personal details. The phisher can then collect and use them to log in to the victim’s account. If you want excellent internet security, it’s important to remain aware of social engineering.

Network and Website Security Risks

Most businesses view their website as one of their biggest assets, and while it certainly can be, it can also be the biggest vulnerability.

All the hard work your company does to generate traffic and promote itself online can go up in flames if you’re not protected from network security threats.

Network security risks are so troublesome because you may not be aware of an issue until the damage has been done.

If you haven’t already, you need to start protecting your company’s network now. Below, we’re discussing some of the most common network security risks and the problems they can cause.

The most common network and Website Security threats-

  1. Computer virus

We’ve all heard about them, and we all have our fears. For everyday Internet users, computer viruses are one of the most common threats to cybersecurity. Statistics show that approximately 33% of household computers are affected with some type of malware, more than half of which are viruses.

Computer viruses are pieces of software that are designed to be spread from one computer to another. They’re often sent as email attachments or downloaded from specific websites with the intent to infect your computer and other computers on your contact list by using systems on your network. Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer including personal information such as passwords, even going as far as to delete everything on your hard drive.

  1. Rogue security software

Leveraging the fear of computer viruses, scammers have a found a new way to commit Internet fraud.

Rogue security software is malicious software that mislead users to believe there is a computer virus installed on their computer or that their security measures are not up to date. Then they offer to install or update users’ security settings. They’ll either ask you to download their program to remove the alleged viruses, or to pay for a tool. Both cases lead to actual malware being installed on your computer.

  1. Trojan horse

Metaphorically, a “Trojan horse” refers to tricking someone into inviting an attacker into a securely protected area. In computing, it holds a very similar meaning — a Trojan horse, or “Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly, by hiding behind a legitimate program.

They spread often by email; it may appear as an email from someone you know, and when you click on the email and its included attachment, you’ve immediately downloaded malware to your computer. Trojans also spread when you click on a false advertisement.

Once inside your computer, a Trojan horse can record your passwords by logging keystrokes, hijacking your webcam, and stealing any sensitive data you may have on your computer.

  1. Adware and spyware

By “adware” we consider any software that is designed to track data of your browsing habits and, based on that, show you advertisements and pop-ups. Adware collects data with your consent and is even a legitimate source of income for companies that allow users to try their software for free, but with advertisements showing while using the software. The adware clause is often hidden in related User Agreement docs, but it can be checked by carefully reading anything you accept while installing software. The presence of adware on your computer is noticeable only in those pop-ups, and sometimes it can slow down your computer’s processor and internet connection speed.

When adware is downloaded without consent, it is considered malicious.

Spyware works similarly to adware, but is installed on your computer without your knowledge. It can contain keyloggers that record personal information including email addresses, passwords, even credit card numbers, making it dangerous because of the high risk of identity theft.

  1. Computer worm

Computer worms are pieces of malware programs that replicate quickly and spread from one computer to another. A worm spreads from an infected computer by sending itself to all of the computer’s contacts, then immediately to the contacts of the other computers.

A worm spreads from an infected computer by sending itself to all of the computer’s contacts,, then immediately to the contacts of the other computers

  1. DOS and DDOS attack

Have you ever found yourself waiting impatiently for the online release of a product, one that you’re eagerly waiting to purchase? You keep refreshing the page, waiting for that moment when the product will go live. Then, as you press F5 for the last time, the page shows an error: “Service Unavailable.” The server must be overloaded!

There are indeed cases like these where a website’s server gets overloaded with traffic and simply crashes, sometimes when a news story breaks. But more commonly, this is what happens to a website during a DoS attack, or denial-of-service, a malicious traffic overload that occurs when attackers overflood a website with traffic. When a website has too much traffic, it’s unable to serve its content to visitors.

A DoS attack is performed by one machine and its internet connection, by flooding a website with packets and making it impossible for legitimate users to access the content of flooded website. Fortunately, you can’t really overload a server with a single other server or a PC anymore. In the past years it hasn’t been that common if anything, then by flaws in the protocol.

A DDoS attack, or distributed denial-of-service attack, is similar to DoS, but is more forceful. It’s harder to overcome a DDoS attack. It’s launched from several computers, and the number of computers involved can range from just a couple of them to thousands or even more.

Since it’s likely that not all of those machines belong to the attacker, they are compromised and added to the attacker’s network by malware. These computers can be distributed around the entire globe, and that network of compromised computers is called botnet.

Since the attack comes from so many different IP addresses simultaneously, a DDoS attack is much more difficult for the victim to locate and defend against.

  1. Phishing

Phishing is a method of a social engineering with the goal of obtaining sensitive data such as passwords, usernames, credit card numbers.

The attacks often come in the form of instant messages or phishing emails designed to appear legitimate. The recipient of the email is then tricked into opening a malicious link, which leads to the installation of malware on the recipient’s computer. It can also obtain personal information by sending an email that appears to be sent from a bank, asking to verify your identity by giving away your private information.

  1. Rootkit

Rootkit is a collection of software tools that enables remote control and administration-level access over a computer or computer networks. Once remote access is obtained, the rootkit can perform a number of malicious actions; they come equipped with keyloggers, password stealers and antivirus disablers.

Rootkits are installed by hiding in legitimate software: when you give permission to that software to make changes to your OS, the rootkit installs itself in your computer and waits for the hacker to activate it. Other ways of rootkit distribution include phishing emails, malicious links, files, and downloading software from suspicious websites.

  1. SQL Injection attack

We know today that many servers storing data for websites use SQL. As technology has progressed, network security threats have advanced, leading us to the threat of SQL injection attacks.

SQL injection attacks are designed to target data-driven applications by exploiting security vulnerabilities in the application’s software. They use malicious code to obtain private data, change and even destroy that data, and can go as far as to void transactions on websites. It has quickly become one of the most dangerous privacy issues for data confidentiality. You can read more on the history of SQL injection attacks to better understand the threat it poses to cybersecurity.

  1. Man-in-the-middle attacks

Man-in-the-middle attacks are cybersecurity attacks that allow the attacker to eavesdrop on communication between two targets. It can listen to a communication which should, in normal settings, be private.

As an example, a man-in-the-middle attack happens when the attacker wants to intercept a communication between person A and person B. Person A sends their public key to person B, but the attacker intercepts it and sends a forged message to person B, representing themselves as A, but instead it has the attackers public key. B believes that the message comes from person A and encrypts the message with the attackers public key, sends it back to A, but attacker again intercepts this message, opens the message with private key, possibly alters it, and re-encrypts it using the public key that was firstly provided by person A. Again, when the message is transferred back to person A, they believe it comes from person B, and this way, we have an attacker in the middle that eavesdrops the communication between two targets.

Here are just some of the types of MITM attacks:

  • DNS spoofing
  • HTTPS spoofing
  • IP spoofing
  • ARP spoofing
  • SSL hijacking
  • Wi-Fi hacking

Summary

It can seem a difficult task to keep track of all the network security threats that are out there, and the new ones that just keep emerging. Whether the media is creating a culture of fear out of being online and placing trust in leaving our information out for all to see, or whether the threats that wait in the dark corners of the Internet are truly serious and can happen to anyone, the best thing we can all do is to be prepared. There is no way to be completely sure that a system is impenetrable by cybersecurity threat. We need to ensure that our systems are as secure as possible.

Prevention of future attacks has never been easier than now with our up-to-date cyber intelligence data. Contact us for custom data enrichment solutions so you can always be prepared.

Website Hacking and Issues Therein

Getting your website hacked is not a new thing. The websites are usually prone to get hacked, and there are various steps that you must take to get rid of such issues. The website is a property of a single person, company or multiple individuals. The famous websites are at a risk always that they might get hack by someone. It is a common issue that people and companies are discussing recently. The cyber-crime of hacking the websites is not increasing with the passage of time.

In 2014, the total number of websites on the internet reached 1 billion. Today it’s hovering somewhere in the neighborhood of 944 million due to websites going inactive, and it is expected to normalize again at 1 billion sometime in 2015. Let’s take a minute to absorb that number for a moment 1 billion.

Another surprising statistic is that Google, one of the most popular search engines in the world, quarantines approximately 10,000 websites a day via its Safe Browsing technology. From our own research, out of the millions of websites that push through our scanning technology, roughly 2 – 5% of them have some Indicator of Compromise (IoC) that signifies a website attack. Granted, this might be a bit high, as the websites being scanned are often suspected of having an issue, so to be conservative we would extrapolate that to suggest about 1% of the total websites online are hacked or infected. To put that into perspective, we are talking somewhere in the neighborhood of 9 million websites that are currently hacked or infected.

With this sort of impact, it’s only natural that people are curious how websites keep getting hacked. The challenge is that the answer has been the same for quite some time.

What to do if your Website has Been Hacked?

First Steps You Should Take

It is also necessary to analyze the hacking of your website to find out soft spots in the code and eliminate them as soon as possible. You should also remember that very often hackers after having got access to your website prefer to reserve ways for further hacking of your web resource. Only a specialist is able to uncover such ways.

So, here follows step-by-step guidelines what to do in case your website has been hacked:

  1. Check your home PC for viruses. It is not necessary to run to the shop and buy a commercial antivirus. We would recommend using Antivira and Comodo.
  2. Install FireWall to your local PC. Use of FireWall significantly reduces the risk of penetration of malware to your PC. We would recommend to use Comodo, free and one of the best FireWalls, or Zone Alarm, also a very good but commercial alternative.
  3. Contact your hosting provider. Not only your website may have been hacked, especially if you do not rent your own server but use usual hosting. Notify the administrators and ask them to analyze the hacking.
  4. Change all the passwords, from passwords to mail boxes to FTP passwords.
  5. Warn your users that your website has been hacked and recommend them to change their passwords to your website.
  6. Back up all the files at your server without delay.
  7. Check the code of the file .htaccess. A hacker can use this file to forward your visitors from your web resource to a website with a malicious code installed.
  8. Be prepared that it might be necessary to delete all the files from your server. The installed code may be hidden so well that it may be necessary to delete all the files and the data base from your server.
  9. Update your CMS to the newest version.

To sum up, it is easier to prevent hacking the website than to restore the website from scratch. Your website protection is a big responsibility only experts can deal with. One should not entrust a website to the first comer but it is not advisable to neglect security either.

Hacking

There are two types of the companies; one type of companies was subject to the hacking issue, but the other ones are safe. The safe companies must have some measures taken to secure themselves and get rid of the hacking issues. There are various people, viruses, and malware threats that can hack the websites and do some damage to the content and the users. Hacking is a common problem, but the webmasters must be skilled enough to get rid of such problems and prevent them from the damage or any harm.

Get to Know

Have you ever thought that how will you find out if your website is not yours now? How will you get to know that someone has hacked your website or blog? It is a common question that is raised when people become webmasters, and their website is prone to get hacked. There are different types of indications that tell the webmasters that a hacker has hacked you. The first indication is that when you see your website and your interface has been changed. Your website does not look like the one you created, and you have no control over it. Some of the hackers deface the website and give a message to the webmasters to know that a particular hacker is hacking them. These are the ways that the hacker enjoys and tells the world proudly I hacked it. Sometimes the webmasters do not get to know that they are being chased, and someone is using their website as well. They do not get any signal about the hacking when the hacker has hacked the site.

Indications

Here are some of the indications and signs that will help the owner of the website know that someone has hacked them, and he has got no control over his property.

  • You got to see a defaced website.
  • The redirection of the website will lead you to a porn site or some other unsavory website.
  • The search engine like Google and Bing will let you know about the hacking.
  • The search browsers and engines will give you the indications about website hacking.
  • You will find more traffic on your website from other countries that you have not focused yet.
  • You will feel strange activities on your website.

How the websites get hacked?

Without the use of some safety measures, hackers hack the websites usually. The webmasters are unaware of the reasons that how someone hacked their property when they have put safety measures as well. The hackers have many ways in which they can get the control of the website, and some of the ways are:

  • The hacker easily guesses the password of your website.
  • The malware will be introduced in your PC to get the login details.
  • Using outdated software other than siteguarding.com
  • Hacking some other website that has shared-server with you.

What to do?

When the hacker controls your website, you have the responsibility to take some serious steps. Your website is your property; you cannot lose control over it. The hacker can use your business and information for negative purposes creating problems for you. Follow some of the steps given here when your website is subject to hacking:

  1. Tell the World

When the hacker hacks your website, you must tell the world. Other platforms must spread the awareness about the incident. It will help the users to understand the conditions and situations you are facing. It will help the users from facing any problems in the meantime.

  1. Contacting the Host

The webmaster must eventually contact the host that can restore website. The server hosts the ability to regain the control over the website you have owned.

  • It will come back to normal.
  • Remove the redirection to some unsavory website.
  1. Damage must be Reverted

Asking for help to regain the website will undo the damage done by the hacker. The people who were aware of your problems can help you get your website back. This step is very important as getting help from someone is essential at particular times.

  1. Changing the Passwords

When you get to know that someone hacked the website, change the passwords. Sometimes changing the passwords let you regain the control. Do not ever set easy passwords. Setting the passwords is a technique. So the webmasters must keep changing the passwords or rotate them.

  1. Create a Backup

The webmaster must keep the backup of his website. Sometimes, the websites have chances to get hacked because of the popularity or some growing issues. So the backup must be there in case if something happens, you must have your data to upload it again.

  1. Website Security

The websites must always be secured. Some of the companies offer their services to set a safe and secure solution for the websites. The websites like siteguarding.com are helpful in such cases when the webmasters want to set security on their websites. The website will offer;

  • Antivirus
  • Monitoring the Change
  • Firewall
  1. Find Solutions

The webmasters must look for better solutions to secure their website. They must look for services that guarantee them the proper security. Siteguarding.com is the website that has solutions to your problems.

5 Easy Steps to Secure Your Website from Hackers

You may have worried when starting this post that it would be full of technical jargon that your average website owner would find baffling. Some of our tips further down do get technical, and you may want to bring in your developer for those.

But there are a few things you can do on your own first that don’t involve that much technical know-how.

Step #1: Install security plugins.

If you built your website with a content management system (CMS), you can enhance your website with security plugins that actively prevent website hacking attempts. Each of the main CMS options have security plugins available, many of them for free.

Security plugins for WordPress:

  • iThemes Security
  • Bulletproof Security
  • Sucuri
  • Wordfence
  • fail2Ban

Security options for Magento:

  • Amasty
  • Watchlog Pro
  • MageFence

Security extensions for Joomla:

  • JHackGuard
  • jomDefender
  • RSFirewall
  • Antivirus Website Protection

These options address the security vulnerabilities that are inherent in each platform, foiling additional types of hacking attempts that could threaten your website.

In addition, all websites – whether you’re running a CMS-managed site or HTML pages – can benefit from considering SiteLock.  SiteLock goes above and beyond simply closing site security loopholes by providing daily monitoring for everything from malware detection to vulnerability identification to active virus scanning and more. If your business relies on its website, SiteLock is definitely an investment worth considering.

Step #2: Use HTTPS

As a consumer, you may already know to always look for the green lock image and https in your browser bar any time you provide sensitive information to a website. Those five little letters are an important shorthand for hacker security: they signal that it’s safe to provide financial information on that particular webpage.

An SSL certificate is important because it secures the transfer of information – such as credit cards, personal data, and contact information – between your website and the server.

While an SSL certificate has always been essential for eCommerce websites, having one has recently become important for all websites. Google released a Chrome update in 2018. The security update happened in July and alerts website visitors if your website doesn’t have an SSL certificate installed. That makes visitors more likely to bounce, even if your website doesn’t collect sensitive information.

Search engines are taking website security more seriously than ever because they want users to have a positive and safe experience browsing the web. Taking the commitment to security further, a search engine may rank your website lower in search results if you don’t have an SSL certificate.

What does that mean for you? If you want people to trust your brand, you need to invest in an SSL certificate. The cost of an SSL certificate is minimal, but the extra level of encryption it offers to your customers goes a long way to making your website more secure and trustworthy.

At HostGator, we also take website security seriously, but most importantly, we want to make it easy for you to be secure. All HostGator web hosting packages come with a free SSL certificate. The SSL certificate will be automatically applied to your account, but you do need to take a few steps to install the free SSL certificate on your website.

Step #3: Keep your website platform and software up-to-date

Using a CMS with various useful plugins and extensions offers a lot of benefits, but it also brings risk. The leading cause of website infections is vulnerabilities in a content management system’s extensible components.

Because many of these tools are created as open-source software programs, their code is easily accessible – to both good-intentioned developers as well as malicious hackers. Hackers can pore over this code, looking for security vulnerabilities that allow them to take control of your website by exploiting any platform or script weaknesses.

To protect your website from being hacked, always make sure your content management system, plugins, apps, and any scripts you’ve installed are up-to-date.

If you’re running a website built on WordPress, you can check whether you’re up to date quickly when logging into your WordPress dashboard. Look for the update icon in the top left corner next to your site name. Click the number to access your WordPress Updates.

Step #4: Make sure your passwords are secure

This one seems simple, but it’s so important.

It’s tempting to go with a password you know will always be easy for you to remember. That’s why the #1 most common password is still 123456. You have to do better than that – a lot better than that to prevent login attempts from hackers and other outsiders.

Make the effort to figure out a truly secure password (or use HostGator’s password generator).  Make it long. Use a mix of special characters, numbers, and letters. And steer clear of potentially easy-to-guess keywords like your birthday or kid’s name. If a hacker somehow gains access to other information about you, they’ll know to guess those first.

Holding yourself to a high standard for password security is step one. You also need to make sure everyone who has access to your website has similarly strong passwords. One weak password within your team can make your website susceptible to a data leak, so set expectations with everyone who has access.

Institute requirements for all website users in terms of length and types of characters. If your employees want to use easy passwords for their less secure accounts, that’s their business. But when it comes to your website, it’s your business (literally) and you can hold them to a higher standard.

Step #5: Invest in automatic backups.

Even if you do everything else on this list, you still face some risk. The worst-case scenario of a website hack is to lose everything because you forgot to back your website up. The best way to protect yourself is to make sure you always have a recent backup.

While a data breach will be stressful no matter what, when you have a current backup, recovering is much easier. You can make a habit out of manually backing your website up daily or weekly. But if there’s even the slightest chance you’ll forget, invest in automatic backups. It’s a cheap way to buy peace of mind.

Security and Email

Email security describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss or compromise. Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to entice recipients to part with sensitive information, open attachments or click on hyperlinks that install malware on the victim’s device. Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.

Email encryption involves encrypting, or disguising, the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients. Email encryption often includes authentication.

How Secure Is Email?

Email was designed to be as open and accessible as possible. It allows people in organizations to communicate with each other and with people in other organizations. The problem is that email is not secure. This allows attackers to use email as a way to cause problems in attempt to profit. Whether through spam campaigns, malware and phishing attacks, sophisticated targeted attacks, or business email compromise (BEC), attackers try to take advantage of the lack of security of email to carry out their actions. Since most organizations rely on email to do business, attackers exploit email in an attempt to steal sensitive information.

Because email is an open format, it can be viewed by anyone who can intercept it. This became an issue as organizations began sending confidential or sensitive information through email. An attacker could easily read the contents of an email by intercepting it. Over the years, organizations have been increasing email security measures to make it harder for attackers to get their hands on sensitive or confidential information.

Email Security Policies

Because email is so critical in today’s business world, organizations have established polices around how to handle this information flow. One of the first policies most organizations establish is around viewing the contents of emails flowing through their email servers. It’s important to understand what is in the entire email in order to act appropriately. After these baseline policies are put into effect, an organization can enact various security policies on those emails.

These email security policies can be as simple as removing all executable content from emails to more in-depth actions, like sending suspicious content to a sandboxing tool for detailed analysis. If security incidents are detected by these policies, the organization needs to have actionable intelligence about the scope of the attack. This will help determine what damage the attack may have caused. Once an organization has visibility into all the emails being sent, they can enforce email encryption policies to prevent sensitive email information from falling into the wrong hands.

Email Security Best Practices

One of the first best practices that organizations should put into effect is implementing a secure email gateway. An email gateway scans and processes all incoming and outgoing email and makes sure that threats are not allowed in. Because attacks are increasingly sophisticated, standard security measures, such as blocking known bad file attachments, are no longer effective. A better solution is to deploy a secure email gateway that uses a multi-layered approach.

It’s also important to deploy an automated email encryption solution as a best practice. This solution should be able to analyze all outbound email traffic to determine whether the material is sensitive. If the content is sensitive, it needs to be encrypted before it is emailed to the intended recipient. This will prevent attackers from viewing emails, even if they were to intercept them.

Training employees on appropriate email usage and knowing what is a good and bad email is also an important best practice. Users may receive a malicious email that slips through the secure email gateway, so it’s critical that they understand what to look for. Most often they are exposed to phishing attacks, which have telltale signs. Training helps employees spot and report on these types of emails.

Email Security Tools

A secure email gateway, deployed either on-premises or in the cloud, should offer multi-layered protection from unwanted, malicious and BEC email; granular visibility; and business continuity for organizations of all sizes. These controls enable security teams to have confidence that they can secure users from email threats and maintain email communications in the event of an outage.

An email encryption solution reduces the risks associated with regulatory violations, data loss and corporate policy violations while enabling essential business communications. The solution should work for any organization that needs to protect sensitive data, while still making it readily available to affiliates, business partners and users—on both desktops and mobile devices. An email encryption solution is especially important for organizations required to follow compliance regulations, like GDPR, HIPAA or SOX, or abide by security standards like PCI-DSS.

e-Business Risk Management Issues

E-business is an electronic form of business conducted over the Internet. This business model has increased in popularity as technology has advanced with smaller and better forms of computer equipment. Many businesses started today conduct operations solely via the Internet, and may never open a traditional brick and mortar storefront. Although e-businesses may be easy to start and require little upfront cash, they are still subject to the normal risks of any businesses.

  1. Systematic Risk

Systematic risk is the risk a company faces from the entire market or market segment in which it operates. A classic example of systematic risk in the e-business market is the dotcom crash of 2000 and 2001. Several e-businesses started and went public, then were purchased by other e-businesses. Most of the e-businesses had little cash flow and were unable to make profits; these companies valued growth over financial stability, creating an unsustainable economic bubble that burst, destroying many dotcom companies. While this type of systematic risk may not occur again, most market segments may tend to operate in business cycles, growing, reaching a plateau and contracting. Owners and entrepreneurs of e-businesses must be able to assess their market segment and plan for each stage in the business cycle.

  1. Security Risk

E-businesses face many different types of risks related to the security of their business information and customer information. Computer viruses and hackers are constantly trying to tap into online companies and steal customer identities and financial information. These security risks force e-businesses to use software and encryption codes that limit an outsider’s ability to hack into their secure systems. Online security risks can also lead to legal issues for e-businesses, as they are obligated to protect consumer information by federal and state law. Breaches in an e-business’ system will also increase the company’s insurance risk, as insurers require higher premiums for companies with legal issues, if they decide to take on the e-business as a client.

  1. Business Risk

Business risk relates to the risk companies face from conducting business operations every day. These risks include inventory, labor, overhead or supply-chain problems. Because most e-businesses do not have large physical locations or warehouses, they must rely on a supply chain for getting goods to consumers. Anytime a business must rely on individuals or other businesses to help distribute goods, risk may increase. Business risk also occurs if the e-business is unable to purchase inventory and move it through the supply chain quickly and efficiently.

  1. Hidden Costs

One of the biggest selling points of e-business is the low start-up costs. Domain names and web hosting incur comparatively low costs when considered against renting or buying a physical space. While some business owners choose to build a website in house, many hire a third party to build the site. The costs of a custom site can run into the thousands of dollars. Maintaining and updating the website also requires time, which can mean either hiring someone to do that work or using your own time to do so.

  1. Data Security

Every business faces the problem of data security, and e-business maximizes these challenges. Customers enter a considerable amount of sensitive information, ranging from phone numbers to credit card numbers, on your site. As the site owner, you take responsibility for protecting that information with appropriate security measures, such as Secure Sockets Layer encryption or contracting with third parties to provide secure transaction processing. Failures in data security can lead both to fines and loss of faith on the part of your customers.

  1. Marketing Failures

Online and offline business both rely on effective marketing to drive growth and sales. Unfortunately, the techniques and strategies for online marketing diverge radically from offline techniques. Business owners can find themselves lost in talk of pay-per-click, viral techniques and social media. Businesses new to e-business may find it necessary to hire an individual or company that specializes in online marketing, in addition to any offline marketing services they already use. Without effective online marketing to drive traffic to the website, the entire project can turn into a waste of time and financial resources.

  1. Website Availability

Even if a business manages costs, employs top-flight data security and uses online marketing best practices, a bad web hosting service can destroy an e-business. No web host can guarantee a website will remain available 100 percent of the time. Anything from a crashed server to insufficient bandwidth causes websites to go down. Businesses with bad hosting services experience persistent website downtime. Customers who find your website unavailable on a regular basis will stop going to it. You can avoid this problem by sticking with well-known hosting providers and asking other business owners about their experiences with hosting providers.

Firewall, Components, Working, Types, Challenges

Firewall is a network security system that monitors, filters, and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted internal networks and untrusted external networks, such as the internet, to prevent unauthorized access and potential cyberattacks. Firewalls can be hardware-based, software-based, or a combination of both. They examine data packets, allowing only legitimate traffic while blocking malicious or suspicious activity. By enforcing access policies, firewalls protect systems from hackers, malware, and unauthorized users, ensuring data confidentiality, integrity, and availability within networks and computer systems.

Components of Firewall:

  • Packet Filtering

Packet filtering is a fundamental firewall component that examines data packets entering or leaving the network. It analyzes packet headers, such as IP addresses, port numbers, and protocols, to determine whether to allow or block the traffic based on predefined rules. This method is fast and efficient, but it cannot inspect the actual data content, making it vulnerable to advanced threats. Packet filtering works as the first line of defense, ensuring only traffic matching the organization’s security policies is permitted. While simple, it provides essential control over basic network traffic flow.

  • Proxy Service

A proxy service acts as an intermediary between users and the internet. Instead of direct communication, the firewall’s proxy server fetches requests on behalf of the user, providing an additional security layer. It hides the internal network structure, preventing attackers from identifying devices within the system. Proxies can also perform deep packet inspection, cache frequently accessed content, and filter requests based on content or user behavior. By breaking direct connections, proxies reduce exposure to threats, enhance privacy, and enforce security policies, making them essential for controlling application-level communication.

  • Stateful Inspection

Stateful inspection, also called dynamic packet filtering, monitors the state and context of active network connections. Unlike basic packet filtering, which checks packets in isolation, stateful inspection analyzes the entire traffic session, ensuring packets are part of a legitimate, established connection. It maintains a state table to track sessions and validates whether incoming packets match expected patterns. This prevents unauthorized attempts like spoofing or session hijacking. Stateful inspection provides a balance of strong security and performance, offering a more robust solution for modern networks compared to simple filtering techniques.

  • Network Address Translation (NAT)

NAT is a firewall component that conceals internal IP addresses by translating them into a single public IP address for external communication. This masking improves security by hiding the network’s internal structure from outsiders. NAT also helps conserve limited IPv4 addresses by allowing multiple devices to share one public IP. In addition to protecting devices from direct external exposure, NAT ensures efficient traffic management. Combined with firewall rules, NAT minimizes the risk of attacks on internal systems, making it a critical function in safeguarding organizational networks from potential cyber intrusions.

  • Virtual Private Network (VPN) Support

Many firewalls include VPN support to establish secure, encrypted tunnels for remote access. VPN-enabled firewalls allow employees or authorized users to connect to the organization’s internal network safely over the internet. By encrypting traffic, VPNs ensure confidentiality, integrity, and authentication, protecting sensitive data from interception. They also enforce access control by verifying user credentials before granting entry. VPN integration in firewalls is especially important for organizations with remote workers, branch offices, or cloud-based operations, as it ensures safe communication and resource sharing while maintaining the network’s security perimeter.

  • Intrusion Detection and Prevention (IDPS)

Intrusion Detection and Prevention Systems (IDPS) in firewalls monitor network traffic for suspicious activity or policy violations. They use signature-based, anomaly-based, or behavioral techniques to identify threats like malware, denial-of-service attacks, or unauthorized access attempts. An IDS alerts administrators about suspicious events, while an IPS actively blocks or mitigates malicious traffic in real-time. Integrating IDPS with firewalls provides layered defense against both known and emerging cyber threats. This proactive security feature ensures threats are detected early, reducing damage and maintaining network integrity.

  • Logging and Monitoring

Logging and monitoring are essential firewall components that record details of all traffic and activities passing through the firewall. Logs include information such as source and destination IPs, ports, protocols, and timestamps of network events. These records help administrators analyze traffic patterns, detect anomalies, and investigate security incidents. Real-time monitoring enables quick response to attacks, while historical logs support audits and compliance requirements. By offering visibility into network behavior, logging and monitoring strengthen overall security posture, enabling organizations to improve firewall policies and anticipate potential threats more effectively.

  • Content Filtering

Content filtering in firewalls controls access to inappropriate, harmful, or non-business-related websites and online resources. By inspecting web traffic, the firewall blocks access to sites containing malware, phishing, or offensive content, ensuring employee productivity and organizational safety. Content filtering can also restrict access based on categories like social media, streaming platforms, or gaming. It often integrates with URL filtering databases or keyword-based restrictions. Beyond security, content filtering helps organizations comply with regulations, maintain bandwidth efficiency, and protect users from harmful online material.

How does a Firewall Work?

  • Traffic Monitoring and Filtering

A firewall works by continuously monitoring all incoming and outgoing network traffic. It acts as a security guard, examining data packets that travel between a private network and external sources like the internet. Each packet is inspected based on pre-set rules such as IP addresses, port numbers, and protocols. If a packet meets the allowed criteria, it is permitted to pass; otherwise, it is blocked. This packet-filtering process ensures that only safe and authorized communication enters or leaves the network, providing a first line of defense against unauthorized access.

  • Access Control

Firewalls enforce access control by defining which users, devices, or applications can interact with the network. Administrators configure policies that specify permitted services, such as web browsing or email, while restricting unwanted ones. By applying these rules, the firewall creates barriers between trusted and untrusted zones, ensuring critical systems are shielded. Access control may be based on IP addresses, domain names, or authentication credentials. This mechanism helps prevent attackers, malware, or unauthorized users from exploiting the network. Essentially, firewalls limit exposure by ensuring that only approved communication is allowed, maintaining both privacy and system integrity.

  • Stateful Inspection

Modern firewalls use stateful inspection, a method that not only checks packet headers but also tracks the state of active connections. Instead of treating each packet independently, the firewall records session details in a state table. It verifies whether a packet belongs to an established, legitimate connection or is suspicious. For example, if a packet claims to be a response to a request but no such request was sent, the firewall will block it. This deeper inspection provides more accuracy and security than simple packet filtering, helping to detect and stop sophisticated cyberattacks effectively.

  • Protection Against Threats

A firewall acts as a defense mechanism by blocking malicious traffic, viruses, worms, and hacking attempts before they reach the network. Many firewalls integrate intrusion detection, intrusion prevention, and content filtering to strengthen security. They can identify unusual patterns, such as port scanning or denial-of-service (DoS) attempts, and take immediate action. By controlling both inbound and outbound traffic, firewalls prevent sensitive data from being leaked or stolen. This multi-layered protection reduces vulnerabilities and ensures the confidentiality, integrity, and availability of network resources, making firewalls a critical safeguard in cybersecurity.

Types of Firewalls:

  • Packet-Filtering Firewall

A packet-filtering firewall is the most basic type, which examines data packets moving across a network. It checks source and destination IP addresses, port numbers, and protocols against predefined rules. If the packet matches the rules, it is allowed; otherwise, it is blocked. This firewall works at the network layer and is efficient but limited because it does not inspect the content of packets. While it provides quick filtering, it is vulnerable to sophisticated attacks that disguise malicious data. It is best suited for small networks requiring simple, cost-effective protection without complex monitoring.

  • Stateful Inspection Firewall

A stateful inspection firewall, also known as a dynamic packet filter, goes beyond simple packet filtering. It monitors active connections and keeps track of the state of network sessions using a state table. Instead of only checking packet headers, it verifies whether the packet belongs to an existing, legitimate session. This makes it more secure than basic firewalls, as it prevents malicious or unsolicited traffic. Stateful firewalls are commonly used in modern networks because they balance performance and security. They are effective in protecting against unauthorized access and attacks while still maintaining efficient traffic flow.

  • Proxy Firewall (Application-Level Gateway)

A proxy firewall acts as an intermediary between users and the internet by filtering requests at the application layer. Instead of allowing direct communication, it processes requests and forwards them to the destination on behalf of the user. This hides the internal network, offering strong anonymity and protection. Proxy firewalls can inspect data deeply, block harmful content, and prevent direct exposure to threats. However, they may slow down network performance due to heavy traffic inspection. They are useful in organizations needing strict security and monitoring, especially for web browsing, email filtering, and application-level access control.

  • Next-Generation Firewall (NGFW)

Next-Generation Firewalls combine traditional firewall features with advanced capabilities like intrusion prevention systems (IPS), deep packet inspection, and application awareness. Unlike standard firewalls, NGFWs can identify and control applications regardless of port, protocol, or encryption. They also integrate features like malware protection, URL filtering, and threat intelligence. This makes them highly effective against sophisticated cyber threats. NGFWs provide greater visibility into network traffic, enabling organizations to enforce more granular security policies. Although costlier, they are widely adopted by enterprises that require robust, multi-layered security to protect against modern attacks and evolving cyber risks.

Challenges of Firewalls:

  • Limited Protection Scope

Firewalls are effective at blocking unauthorized access, but they cannot detect or prevent all types of cyber threats. They mainly monitor incoming and outgoing traffic, which means attacks like phishing, malware hidden in encrypted traffic, or insider threats may bypass them. Additionally, firewalls do not provide full protection against social engineering or sophisticated zero-day attacks. Relying solely on a firewall without other security measures creates vulnerabilities. To overcome this limitation, organizations must use firewalls in combination with intrusion detection systems, antivirus software, and strong user awareness programs to ensure a multi-layered defense strategy.

  • Performance and Latency Issues

Firewalls, especially advanced ones like next-generation firewalls (NGFWs), can introduce latency by analyzing packets, inspecting content, and filtering applications. High traffic volumes may slow down network performance, causing delays for users and critical business applications. In environments with heavy data flow, this can impact productivity. To address this, organizations need robust hardware, proper configuration, and network optimization strategies. However, upgrading infrastructure increases costs. Balancing strong security with optimal performance remains a challenge, as overloading the firewall or misconfiguring rules may lead to bottlenecks, service disruptions, or even security gaps if traffic inspection is reduced to improve speed.

  • Complex Configuration and Management

Setting up and maintaining a firewall requires skilled administrators to configure rules, policies, and filters correctly. Misconfigured firewalls may either block legitimate traffic, causing disruptions, or allow malicious traffic, creating security holes. Large organizations with complex networks face challenges in managing multiple firewalls across different locations. Regular updates and monitoring are necessary to keep policies aligned with evolving security threats. Inadequate documentation or improper rule prioritization may result in conflicts and vulnerabilities. To overcome this, organizations must invest in trained professionals, automation tools, and consistent auditing practices to ensure firewalls function effectively without compromising usability or security.

  • Cost and Resource Requirements

While basic firewalls are affordable, advanced solutions like next-generation firewalls (NGFWs) come with high costs for acquisition, deployment, and maintenance. Additionally, they require powerful hardware, constant updates, and skilled IT staff for monitoring. Smaller organizations often struggle with these expenses, making them more vulnerable to cyberattacks. Furthermore, as threats evolve, firewalls need regular upgrades, which add to long-term costs. Cloud-based firewalls may reduce infrastructure expenses but still involve subscription fees. Balancing cost-effectiveness and strong security remains a major challenge, especially for businesses with limited budgets that cannot afford enterprise-grade firewall solutions with advanced threat protection.

Advantage and Disadvantage of Firewall

Advantages of Firewall

  1. Monitor Traffic

A major responsibility of a firewall is to monitor the traffic passing through it. Whatever the information traveling through a network is in the form of packets. Firewall inspects each of these packets for any hazardous threats. If any chance the firewall happens to find them it will immediately block them.

  1. Protection against Trojans

Malwares especially the type Trojans are dangerous to a user. A Trojan silently sits on your computer spying over all the works you do with it. Whatever the information they gather will be sent to a web server. Obviously you will not know their presence until the strange behaviours of your computer. A firewall in this instance will immediately block Trojans before they cause any damages to your system.

  1. Prevent Hackers

Hackers on the internet constantly look for computers in order for carrying out their illegal activities. When the hackers happen to find such computers they will start to do even malicious activities such as spreading viruses. Apart from those hackers there can be unknown people such as the neighbours looking out for an open internet connection. Hence to prevent such intrusions it is a good idea to be with a firewall security.

  1. Access Control

Firewalls comes with an access policy that can be implemented for certain hosts and services. Some hosts can be exploited with the attackers. So the best in case is to block such hosts from accessing the system. If a user feels that they need protection from these types of unwanted access, this access policy can be enforced.

  1. Better Privacy

Privacy is one of the major concerns of a user. Hackers constantly look out for privacy informations for getting clues about the user. But by using a firewall many of the services offered by a site such as the domain name service and the finger can be blocked. Hence the hackers are with no chance of getting privacy details. Additionally firewalls can block the DNS informations of the site system. Due to this the names and the IP address will not be visible to the attackers.

Disadvantages of Firewall

  1. Cost

Firewalls does have an investment depending on the types of it. In general hardware firewalls are more expensive than the software firewalls. Besides that hardware firewalls require installations and maintenance which can be costly. These types of configurations cannot be done without an expert IT employee. Comparing this to a software firewall, there is no much investment and it is easy enough for an average user to deploy them.

  1. User Restriction

It is no doubt that firewalls prevent unauthorized access to your system from the network. While this can be advantageous for an average user, this can actually be a problem for large organizations. The policies used by the firewall cab be strict enough to prevent employees from doing certain operations. As a result of this, the overall productivity of the company an be affected severely. Sometimes this can also prompt employees from using backdoor exploits. However this can lead to security problems since the data travelled through these backdoor exploits are not examined properly.

  1. Performance

Firewalls especially the software based has the capability to limit your computer’s overall performance. The processing power and the RAM resources are some of the factors which decides the computer’s overall performance. When the software firewalls constantly run on the background they consume more the processing power and the RAM resources. This can lead to a diminished system performance. However hardware firewalls does not impact the system performance since they do not rely upon the computer resources.

  1. Malware Attacks

Even though firewalls has the capability to block the basic types of trojans, it is proved to be defenseless against other types of malwares. These types of malwares can enter your system in the form of trusted data. Therefore even if you have firewall, it is still recommended to have an anti-malware software installed on your PC. Because the only way to remove them is through an anti-malware scan.

  1. Complex Operations

Even though for small businesses the firewall maintenance is made easy, it is definitely not for large organizations. Firewalls for large organizations require separate set of staffs for operating them. These people make sure that the firewall is safe enough to protect the network from intruders.

Enterprise Wide Security Framework

Traditionally, organizations have relied on policies to communicate high-level directives from the management. These documents, once issued, provide top down influence for everyone in the company from business units to departments to individual employees. Furthermore, these policies typically were developed at one time in the organization’s evolution to capture the current environment. One of the major challenges for an organization in this area is the continued growth and adaptation of the policies to mirror the transformation within the organization. The fastest area of growth and change within an organization is Information Systems. With the rapid development and push toward new technologies, organizations find themselves striving to maintain current technical environments with outdated policies. Secondly, with the emergence of new technology strategies such as Intranets and Extranets, security and the protection of informational assets has become paramount.

The first step is an enterprise-wide Information Systems Security Policy that is consistently enforced even as business needs change. Unfortunately, most companies have only bits and pieces of security scattered throughout the organization. These may make some departments or individuals feel safe, but they do little to protect the enterprise as a whole.

To address these needs, PricewaterhouseCoopers has designed a Security Knowledge Management system the Enterprise Security Architecture System (ESAS). The idea is to assist an organization in providing a key security infrastructure tool. Primarily ESAS is built on PPT methodology (People, Policy & Technology). Over the period PwC also went ahead mapping ESAS with COBIT methodology from ISACA and the guidelines given in ISO 17799.

PPT Methodology

PPT stands for People, Policy, & Technology. The security process is a mixture of these three elements. Each element depends in some manner on the other elements. Also, issues receive greater coverage when the elements are combined. The controls environment is greatly enhanced when these three elements work in concert. A simple drawing will suffice to illustrate this (see Figure 1). This drawing shows the basic elements and also the coverage areas.

As you move toward the union of these elements, the controls environment increases there is greater coverage. Let’s understand these three elements individually.

People

This core element is the most important. The people element comprises the people and various roles and responsibilities within the organization. These are the people that are put in place to execute and support the process. A few key roles include senior management, security administrators, system and IT administrators, end users, and auditors.

Policy

This element comprises the security vision statement, security policy and standards, and the control documentation. This is basically the written security environment the bible that the security process will refer to for direction and guidance.

Technology

This element includes tools, methods, and mechanisms in place to support the process. These are core technologies the operating systems, the databases, the applications, the security tools embraced by the organization. The technology then is the enforcement, monitoring, and operational tool that will facilitate the process.

The concept is that each core element could be measured for effectiveness and coverage. Also, issues can be measured against the model to determine what controls coverage for that issue. The objective then is to move issues into the intersecting areas of the elements with the final objective of moving the issue into the middle area of greatest coverage. As risk issues are identified, each step to manage the risk will fall into one of the core elements of people, policy, or technology. If the issue is resolved with one of the elements, addressing one of the other elements can enhance this resolution. As the core elements are added to the controls environment and utilized in concert, the issue is then resolved on several fronts. The controls coverage is greater.

The PPT Model

The PPT Model can be illustrated with a few simple examples. Figure 2 shows the PPT Model with regards to Internet usage and misuse. Users are educated on the proper usage of the Internet. The controls environment relies solely on the user. An Internet usage policy is written to document proper use of the Internet and the consequences of misuse. The controls environment now is supported by two of the three core elements.

Filtering software is deployed on the firewall. Now the controls environment is covered by all three elements. Figure 3 demonstrates when an issue is covered only by two of the three elements. It also shows the consequence of a limited controls environment.

The Internet connection is protected by the deployment of a firewall. Core elements coverage = 1.

The firewall administrator receives specialized training and develops the skill set necessary to administer the firewall. Core elements coverage = 2.

The firewall administrator leaves the organization. The controls now rely back on just one element the technology.

How can the model be used to identify an alternative solution to Figure 3?

This is depicted in Figure 4.

The Internet connection is protected by the deployment of a firewall. Core elements coverage = 1.

The firewall administrator receives specialized training and develops the skill set necessary to administer the firewall. Core elements coverage = 2.

Firewall operating standards are written and controls are documented. Core elements coverage = 3.

The firewall administrator leaves the organization. The controls environment relies on two of the core elements. The controls, standards, and technology are documented so that the skill and knowledge does not completely leave the organization. Core elements coverage = 2.

From these examples, it is easy to see how the PPT model can simplify the analysis of a risk issue. If the issue is broken down into the three core elements, action items can be determined for each core element. In this manner, control coverage can be moved from one element to two, and ultimately to coverage by all of the elements.

The PPT model sounds like a very comfortable proposition but during actual implementation, CIO’s used to get lost in the framework. This is simplified by the ESAS tool.

The ESAS repository

ESAS is a Security Knowledge Management tool designed to bridge the gap between business and technology. It provides organizations with a centralized repository of security policies and technical control information. ESAS allows an organization to effectively communicate security policies and controls throughout the enterprise, and provide the key infrastructure for a successful Information Security program.

The major objectives of the ESAS are:

  • Ensure consistency of organizational security objectives throughout operating units
  • Allow business strategies and goals to drive Information Security
  • Allow an organization to deal with the changes in both business initiatives and technology and manage the risk associated with change
  • Provide a comprehensive set of security policies for the organization
  • Provide a method to look at information and technical systems from a Risk perspective
  • Provide the methods to implement security objectives effectively and efficiently at a technical level

ESAS is built on a unique security model/Framework (explained below) to provide flexibility in managing the information.

Understanding the Security Framework

PricewaterhouseCoopers’ Information Security Framework provides the overall model for developing comprehensive security programs. The framework illustrates an enterprise approach for security.

Key elements, also referred to as the “Four Pillars” to Information Security, include:

  • Solid Senior Management Commitment
  • An overall Security Vision and Strategy
  • A comprehensive Training and Awareness Program
  • A solid Information Security Management Structure including key skill sets and documented responsibilities

Within the four “pillars” of the program, several phases are included.

The first is the Decision Driver Phase, which contains factors determining the business drivers of security. These include Technology Strategy and Usage, Business Initiatives and Processes and Threats, Vulnerabi-lities and Risk. All these combine to form a unique “Security Profile” of the organization. The “profile” needs to be reflected in the Security Policies and Technical Controls.

The next facet of the Information Security Framework includes the design of the security environment also called the Design Phase. This is the stage where the organization documents its security policy, the control environment and deals with controls on the technology level. A key element in this process is not only the clear definition of security policy and technical control information, but also the “Security Model” of the enterprise. Information Classifications and Risk Assessment methods fall under this component. These processes allow the organization to manage risk appropriately and identify the risks and values of information assets.

The final facet of the Information Security Framework is the Implementation phase. This begins by documenting the Administrative and End-User guidelines and procedures. These guidelines must be succinct and flexible for the changing environment. Enforcement, Monitoring, and Recovery processes are then layered on for the operational support of the security program. These processes are “where the rubber hits the road”. All the benefits of the Security Program design and documentation is diminished if it is not put into effect on an operational day-to-day basis.

Information Security Environment in India

Information Technology Act, 2000

(i) The act regulates use of computers, computer systems, computer networks and also data and information in electronic format.

(ii) The act lists down among other things, following as offences:

  • Tampering with computer source documents.
  • Hacking with computer system
  • Act of cyber terrorism i.e. accessing a protected system with the intention of threatening the unity, integrity, sovereignty or security of country.
  • Cheating using computer resource etc.

Strategies under National Cyber Policy, 2013

  • Creating a secure cyber ecosystem.
  • Creating mechanisms for security threats and responses to the same through national systems and processes.
  • National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.
  • Securing e-governance by implementing global best practices, and wider use of Public Key Infrastructure.
  • Protection and resilience of critical information infrastructure with the National Critical Information Infrastructure Protection Centre (NCIIPC) operating as the nodal agency.
  • NCIIPC has been created under Information Technology Act, 2000 to secure India’s critical information infrastructure. It is based in New Delhi.
  • Promoting cutting edge research and development of cyber security technology.
  • Human Resource Development through education and training programs to build capacity.

Challenges

  • Increased use of mobile technology and internet by people.
  • Proliferation of Internet of Things (IoT) and lack of proper security infrastructure in some devices.
  • Cyberspace has inherent vulnerabilities that cannot be removed.
  • Internet technology makes it relatively easy to misdirect attribution to other parties.
  • It is generally seen that attack technology outpaces defence technology.
  • Lack of awareness on Cyber security.
  • Lack of Cyber security specialists.
  • Increased use of cyberspace by terrorists.

Recent Steps taken by Government

  1. Cyber Surakshit Bharat Initiative

It was launched in 2018 with an aim to spread awareness about cybercrime and building capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.

  1. National Cyber security Coordination Centre (NCCC)

In 2017, the NCCC was developed. Its mandate is to scan internet traffic and communication metadata (which are little snippets of information hidden inside each communication) coming into the country to detect real-time cyber threats.

  1. Cyber Swachhta Kendra

In 2017, this platform was introduced for internet users to clean their computers and devices by wiping out viruses and malware.

  1. Security Education and Awareness Project (ISEA)

Training of 1.14 Lakh persons through 52 institutions under the Information Security Education and Awareness Project (ISEA) – a project to raise awareness and to provide research, education and training in the field of Information Security.

  1. International cooperation

Looking forward to becoming a secure cyber ecosystem, India has joined hands with several developed countries like the United States, Singapore, Japan, etc. These agreements will help India to challenge even more sophisticated cyber threats.

Way Forward

  • Real-time intelligence is required for preventing and containing cyber attacks.
  • Periodical ‘Backup of Data’ is a solution to ransomware.
  • Using Artificial Intelligence (AI) for predicting and accurately identifying attacks.
  • Using the knowledge gained from actual attacks that have already taken place in building effective and pragmatic defence.
  • Increased awareness about cyber threats for which digital literacy is required first.
  • India needs to secure its computing environment and IoT with current tools, patches, updates and best known methods in a timely manner.
  • The need of the hour for Indian government is to develop core skills in cyber security, data integrity and data security fields while also setting stringent cyber security standards to protect banks and financial institutions.

Types of Real Time System

Real time

It is the time span taken by the system to complete all its tasks and provides an output for an input. This time span should be the same for computation of all its tasks.

Real time system

Real time systems are those which must produce the correct response within the specified or defined time limit. If it exceeds these time bonds it results in performance degradation and/or malfunction of system.

For example in aircraft engine control system, the real time control system should perform its task within a specified time as the operator/pilot intended and failure of this can cause the loss of control and possibly the loss of many lives.

Real time program

A program for which the correctness of operation depends upon the logical output of the computation and the time at which the results are produced. Every real time system must be having real time clock which specifies the time of the execution of the task or interruption of the task.

Types of real time system

As per the clock and execution procedure of task the real time systems are divided as follows

  • Clock based systems
  • Event based systems
  • Interactive systems
  1. Clock based real time system

In this system the computation of its task has to be completed in the specified time interval called real time clock. Most of plant control systems are in this category. The clock can be in hours for some chemical process or it may be in milli seconds for some control systems.  For example of feedback control of tank level, the real time system should read the level of the tank, process it with control algorithm and actuate the valve accordingly to maintain the level. These three tasks should perform in the specified time interval i.e sampling of input, processing and output response.

This clock can be continuous or discrete. In continuous the system will perform the task continuously within a specified time. This is same as above tank level controller where it is a continuous control process.  In some chemical industries, The chemicals should be added with some specified intervals these are called discrete control systems.

  1. Event based real time system:

In plants there are some systems where actions have to be performed in response of some events instead of some particular time intervals. For example the control system has to close the value if the liquid level in the tank reaches its high level. Here this action is not time based, its an event based and these are used extensively to indicate the alarm conditions and initiate alarm actions, for example indicating the liquid level in the tank high or temperature of the liquid high etc. The specification of event based systems usually indicates that the system must respond within specified maximum time to a particular event. These systems uses interrupts to indicate the real time system that the action is required. Some small system uses Polling i.e the system periodically asks the various sensors to see whether the action is required. These systems are basically aperiodic tasks and may have deadlines expressed in terms of start up time or finish time. For example after sensing of level of liquid the the valve closer should start after some interval.

  1. Interactive systems:

The combination of Clock based system and Event based system which gives the importance of average execution time of the task is called interactive systems. This covers the systems like Automatic teller machine, reservation system for hotels, Airlines booking etc. This systems receive the input from the plant or operator and initiate the task and executes within the average response time. For an example if you want draw cash from ATM when u put your card then it process the task of giving the money out. In this case the response time depends on the network traffic and internal processing time and it does not bother about other atmospheric changes.

error: Content is protected !!