Cyber and Information Security Assignment
Cyber and Information Security Assignment
Dr. Jeyalatha
AMITY UNIVERSITY UNIVERSITY DUBAI
Cybersecurity: An In-Depth
Exploration
Table of Contents
1. Introduction to Cybersecurity
2. Cyber Law
4. Evolution of Ransomware
5. AI Expansion in Cybersecurity
9. Conclusion
1
1. Introduction to Cybersecurity
2. Cyber Law
Cyber law, also known as internet law, deals with the legal issues related to the use of
the internet and digital technologies. This area of law covers a wide array of topics
including intellectual property, privacy, freedom of expression, and security.
2
Key Areas of Cyber Law
Overview
3
Key Provisions
The IT Act has undergone amendments to address emerging cyber threats and to enhance
data protection mechanisms. Its impact has been profound in promoting digital
transactions and securing online activities in India.
4. Evolution of Ransomware
Early Ransomware
4
Ransomware first appeared in the late 1980s with the “AIDS Trojan.” It encrypted
filenames and demanded payment for the decryption key.
Modern Ransomware
5
3. Employee Training: Educating employees about phishing attacks and safe
practices.
5. AI Expansion in Cybersecurity
Role of AI
Applications
Challenges
6
1. Adversarial AI: Attackers can use AI to develop more sophisticated
attacks, creating a continuous arms race.
Proliferation of IoT
The Internet of Things (IoT) has led to a massive increase in connected devices, from
smart home gadgets to industrial sensors.
Security Concerns
3. Privacy Issues: IoT devices often collect sensitive data, raising concerns
about data privacy and unauthorized access.
Mitigation Strategies
7
1. Security by Design: Incorporating strong security measures during the
design phase of IoT devices.
Understanding Blockchain
Applications in Cybersecurity
8
3. Secure Transactions: Blockchain can enhance the security of financial
transactions, making them more resistant to fraud.
Serverless computing allows developers to build and run applications without managing
server infrastructure. Services like AWS Lambda and Azure Functions exemplify this
model.
Security Risks
Mitigation Strategies
1. Secure Code Practices: Ensuring that code is written securely and tested
for vulnerabilities.
9. Conclusion
Cybersecurity is a dynamic and evolving field, constantly adapting to new challenges and
threats. The topics covered in this document highlight the complexity and breadth of
cybersecurity, from legal frameworks like the IT Act in India to emerging technologies
such as AI and blockchain. As we continue to advance technologically, the importance of
robust cybersecurity measures cannot be overstated. It is crucial for individuals,
businesses, and governments to stay informed and proactive in safeguarding their digital
assets.
10