| |NOVEMBER 20198he dawn of this age is a testament to the digital revolution that we are all witnessing. Digitization in almost every field has led the world to be-come a much smaller place. Almost everything is available at the click of our fingers, and every informa-tion is accessible through the help of internet. How did we reach this time? Thanks to the path-break-ing discoveries and peoples' will to accept changes as and when they come. But with every step forward there is always a backlash that fol-lows. Let's take the evolution of technology over time: · 1980's ­ Saw the birth of private internet· 1990's ­ Saw the rapid growth of internet, AOLs and email use· 2000's ­ Saw the birth of Black-berrys, Iphones, Wifi, Porta-ble Devices, faster internet and social media· 2010s ­ Saw the emergence of cloud apps, data centers, smart phones etcWith all these developments tak-ing place rapidly, a lot of challeng-es are posed to this sector. ChallengesWe are well aware that how internet has become a critical infrastructure for both individual users as well as businesses, hence security needs to be taken care of very seriously. Our data is vulnerable, and it takes no time for cybercrime to ruin the standing of anyone in the market. With emerging new technologies like Internet of things, Cloud, etc., it becomes extremely important to provide security to run an un-interrupted business. An end user, usually has two demands, one is privacy and the other is protec-tion and this is a major challenge that concerned bodies are trying to curb. The possible solutions will certainly include, a reliable and secure network infrastructure, but they will also depend on trust on the part of users ­ both individuals and businesses ­ that confidential-ity, secure identification, privacy and other issues are properly ad-dressed. Security standardization also plays a key role in protecting the Internet, the communications and business it carries, and both the private and corporate users who rely on it. But in particular, the timing of standardization is equally important, or ICT needs to be secured from the start as well as for the long run. Let's take a look at the timeline of Cyber-attacks for a better understanding:The early attacks in the 80s utilized malware, self-replicating worms and hacking mostly for the purpose of disruption. Early at-tacks were limited because the in-ternet was proprietary (ARPANET) and small and used attacks like the Morris Worm.· In the 90s, with the advent of the real internet, email threats began, leveraging malicious links and later malicious document attach-ments to download malware to PCs.· In the 2010s, many new attacks were launched leveraging the broad internet and large corporate networks. Examples of the new wave of 2010 attacks include:· Advanced Persistent Attacks (APTs)­ These were complex, mul-tistage attacks that collect social data (social engineering), make initial infections, download more malicious code, move laterally in your network, and ultimate-ly extract data and quietly exit your networksCYBER SECURITY: ONE OF THE MOST IMPORTANT INFRASTRUCTURES IN A COMPANYHarish Kohli, MD & Presidentexpert opinionBy Harish Kohli, MD and President, Acer IndiaTHarish Kohli is a veteran in the technology industry who has been orchestrating sustainable growth of organizations with an expertise in handling technology business. Harish carries a 34 years long experience that commenced with Management Trainee to Fedders Lloyd. He now beholds the position of MD and President to Acer India since 2016.
< Page 7 | Page 9 >