Cognitive, motor and emotional abilities make humans the smartest organisms in the world. Otherwise, we would not have witnessed the series of industrial revolutions in our history of technological advancements. But ever since robotics changed the game, humans have increasingly grown dependent on the artificially intelligent machines and used them for innumerable applications. The riveting question is – are these bots fully dependable? If not, what makes them vulnerable, and is there a way to strengthen them?
It is safe to say that automation is the way for modern-day enterprises to move forward, as it makes processes both effective and efficient. Today, robots are counted in millions as far as industrial use is concerned. Hence, it is crucial to understand the most common security vulnerabilities associated with them, some of which have been mentioned below:
The reasons for a robotic system to have vulnerabilities can be many, ranging from faults during production to poor maintenance. However, there are both simple and complex ways by which these risks can be averted. The least that developers should follow is to implement Secure SDLC and properly checked encryption systems while producing the bots. There are some components of building security around a piece of robotic equipment or process. They are:
The best practices of cybersecurity must be observed before, during and after the robot is deployed. This shall create the four key elements attached to building trust within the robotics platform:
As part of maintenance, the software upgrades and patch maintenance procedures must be carefully supervised. Lastly, users should have a response plan ready at all instances to ensure that the recovery time and damages caused in the event of an attack are minimized.
Gone are the days when users of software applications would always rely on text commands or graphical user interfaces (GUIs) to get their jobs done. Instead, we seem to have gone back to older times when errand boys would listen to our instructions and accomplish the tasks on our behalf. That’s right, this is the age of conversational user interfaces and enterprises have rapidly adopted chatbots that continue to benefit the businesses and users alike.Read More
Date: Saturday, January 25, 2019 Venue: VIL, Information Technology Centre, 2nd Floor, S.No.19,20. Panchshil Tech Park, Next to Courtyard Marriot Hotel, Opp. HP. Petrol Pump, Hinjewadi, Pune – 411 057, Maharashtra, India.
10:00 AM - CF Updates by Anis Pankhania 10:15 AM - Data Protection in the Digital World - Gaurav Khera , Director - Deloitte India 11:00 AM - SOC & Data Privacy - Umang Chokshi - Director within EY Advisory Services and specializes in Securit 11:45 AM - Networking Break 12:00 PM - GDPR Overview in Auditing - Khalil Ahmad Pathan - Wipro 12:45 PM - Quiz On Data Privacy 01:00 PM - Lunch
Gaurav is a Director with Deloitte India and comes with 12+ years of experience of working with India’s largest telecom operator. He comes with a rich experience of Cyber Risk, Telecom Strategy and Planning, IT Governance, Process Improvement, IT Service Management, Project/Program Management Technology Due Diligence, Digital Strategy, and Budgeting. Worked with a leading telecom operator of India for the formulation of the technology roadmap, setting up its IT Outsourcing Contract, IT Governance Framework, Centralized Service Desk, SLA Management Framework and CSAT for measuring IT satisfaction and alignment with business objectives. Gaurav also works very closely with clients advising them on Digital Risks as well as other areas of Cyber Security. He has also led multiple engagements for doing IT Due Diligence as part of M&A activities.
Khalil is BE from Pune University and PGDIM from NITIE, Mumbai with over 11 years of workex primarily in IT Risk Compliance and Governance in various industries.
The last fortnight saw a series of events that rattled the world of cybersecurity. Individuals and enterprises have been exposed to several attacks from cybercriminals and have pulled up their socks to upgrade their security and risk management mechanisms. Parallelly, there have been significant developments in this field which further show that there is a huge potential when it comes to making advancements in cybersecurity. This edition of CF Bytes brings to you some of the biggest such instances in this edition which occurred in the aforementioned timeframe.
Stay tuned to CF Bytes for more periodical updates on cyberattacks and developments in the ever-evolving world of cybersecurity.
Have you ever been bothered by someone on the web? Do you think your company might be at risk due to hideous information robbers? Do you know what Cyberstalking is? Let’s see if we can help you out!
The current situation
Technology has been one of the main reasons for mankind’s progress for many years now. It has brought us humans closer to one another and made the world a small place, thanks to social networking websites and other platforms for communication. However, troublemakers such as Cyberstalkers never leave an opportunity to act and such activities have gained prominence in recent years. Here, we shall have a look at what is Cyberstalking and how individuals and organizations can avoid being trapped.
What does Cyberstalking mean?
For those who feel it is no different from social media stalking or trolling, it is time to bust the myth and understand the real Cyberstalking meaning. When any individual or organization is harassed online by someone who frequently follows the victim’s online activity and goes a step ahead by gaining access to confidential data and unpleasantly contacting the victim, it is recognized as an act of Cyberstalking. If someone simply follows the social media activity of a specific person frequently, it becomes stalking. Trolling too involves mild harassment of the target but with a humorous touch. The answer to why is Cyberstalking a problem is simple: it is done with malicious intent and has several legal implications too, making it a serious crime, unlike the other two terms.
Legal aspects of Cyberstalking
Cyberstalkers are professional attackers and have many ways to get away from the act by forming fake appearances, thereby staying anonymous. As a result, it becomes difficult to trace them and taking appropriate action. Laws to regulate this act have not been adopted in many countries either. This answers why cyberstalking is dangerous. However, some countries such as the United States have deployed legal measures to register cases of cyberstalking and impose punishments such as fines or imprisonment. In India, cyberstalking is legally recognized by Section 354 D of the Indian Penal Code as an act of spying on someone and creating a sense of fear or alarm. There are other provisions too which protect the victims of online harassment and punish the offenders with rigorous imprisonment.
Identifying Catfishers in the web
A catfisher is someone who creates a fake identity and gains the confidence of the victim to have financial gains or damage the reputation of the victim. Catfishing usually involves copying the profile of an already existing user and thereafter fooling innocent people. This can be identified by performing a Google image search and seeing whether multiple sources exist or not. The social media profile of catfishers often involves a small number of connections. Also, such offenders rarely post pictures with friends or family members and always decline making video calls.
Tips to avoid being trapped
Like many other things in life, cyberstalking is inevitable. The fact that tracing such offenders is difficult makes it all the more unstoppable. However, there are some easy ways by which you can keep yourself or your business relatively safer from the hiding predators. Some of these subtle ways to avoid cyberstalking are:
Life is never easy when a lot of information is likely to be shared online. However, the main idea behind keeping yourself safe from any cyberstalking activity is to refrain from performing any activity that might attract negative attention. In other words, maintaining good digital hygiene is the way forward to keep predators at bay and prevent you or your organization from falling into a trap.