Page 27 - info_oct_2021_draft13
P. 27

prevent threats from entering organization’s   include:                things happen. First, threats that are detected
          network. The system monitors organization’s   Email Filtering:  Organisations  communicate   early are eliminated so that they won’t pose a
          network continuously and scans the traffic for   heavily through email, and cyber attackers make   threat  or  be able  to  block authentic attempts
          possible risk to gather more information and   continuous efforts to exploit this dependency.   to enter the system. The next thing to happen is
          administer the proper preventative actions. This   Often,  end point/ end  user  protection  is not   that if a suspected data packet or email enters
          system can be used to identify violations against   enough to prevent someone from opening   the system and is picked up as a threat, but
          access rules and policies It is also capable of   infected emails and attachments. Filtering emails   clarification is needed, it is sent to an area where
          defending against Zero-day attacks.  at the gateway can reduce the risk of infections   it can be easily verified. This rapid capture and
                                             and data breaches.
                                                                                 validation process means less downtime and
             De-Militarized Zones: The purpose of DMZ is   Email Encryption: Once an email leaves server,
          to enable access to resources from the untrusted   it can be intercepted by attackers. If there is any   allows organisation to continue to be productive.
                                                                                 It also eliminates the need for a security
          network while keeping the system or host on an   sensitive information within the email, there can   administrator  to  have  to  go  into  the  system  to
          organization’s  internal  private  network  secure.   be a potential for a breach of data. With email   sanitize an item. The right defence at the right
          Resources that are commonly placed within the   encryption, the email and its data are altered into   time within a layered Cyber security program
          DMZ are Mail servers, FTP servers, Web servers,   a non-readable and incomprehensible format.  offers an organization a chance to continue to
          DNS servers and VoIP servers.         Data Encryption:  Like  email  encryption,   work at full speed while defence mechanisms are
                                             data encryption protects information from   in place and taking care of security.
                                                unauthorized access even in the event of any   Layered defence approach also reduces
                 Network Perimeter Defence         type of breach. Using an effective data   false positives that may prevent an organisation
                                                     encryption platform may not prevent   from maintaining interaction with legitimate
                                                       the  occurrence  of  a  data  breach,   contacts, while at the same time helping improve
                 Host Defence
                                                        but it virtually renders the data   organisational visibility. By establishing a
                                                         unreadable  (and  therefore  verified pathway that goes from the network to
                                                          useless) to anyone trying to   the server following a defined set of points that
                 Application Defence
                                                           access it.            lie in between, any type of threat is detected
                                                              In current times, one   much easier and eliminated without slowing
                                                             more  layer  of  Mobile   down operations. The layered security concept
                 Data Defence                                security has been added   creates an interwoven network of protection that
                                                             to the strategy. Mobile   prevents unwanted intruders from exploiting the
                                                             workplaces  and virtual   existing vulnerabilities (or even lingering for long
                                                             offices  are  becoming  periods of time) within the system.
          Host Defence                       the norm, especially due to the growing work-  Layered approach provides multi-levels of
            Host  defence  comprises  of  End  Points  and   from-home  culture  in  the wake  of the  COVID   defence that both identifies and eliminates
          Anti-malware/ Anti-virus solutions for End User   pandemic. Mobile devices can increase the risk of   threats on many different levels. With each added
          Protection.  Whether  users  use  desktop  PC’s,   security breaches which can lead to disruption of   layer, it compounds level of protection until a wall
          laptops, iPads, tablets, or any other devices, it is   operations, data leaks, compromised information,   of security is created that is almost impenetrable.
          critical to mitigate the risk of attacks which can   financial losses, unavailability of services etc.   The increased risk of loss associated with cyber-
          find their way into an organisation’s network   Thus,  Mobile Device  Management  becomes  a   attacks cannot be denied, so it’s vital that a
          by means of the end point/ end user vector.   necessity to ensure the safety and security of the   security approach is followed which takes many
          Endpoint security controls protect the connection   equipment as well as the data and proprietary   different types of threats into consideration and
          between devices and the internal network of the   information for employees working from home   deals with each one quickly and efficiently.
          organisation. It also protects the user data and   and off-site locations. Organisations must make
          resources along with the protecting other hosts   sure that they can encrypt, secure, and remotely   Conclusion
          from the compromised ones by blocking lateral   remove sensitive data and information that could   Strengthening  the  cyber-security
          spread of malware within the organisation’s   fall into the wrong hands.  infrastructure of the country has become
          secured network.                                                       imperative with Government of India launching
                                             Benefits of Layered Security
          Application Defence                   The key benefit of layered security strategy   several initiatives for efficient delivery of services
            Application defence is the process of   is that it provides measures corresponding to   to citizens. The country is consistently improving
          developing,  adding,  and  testing  security  Protection, Detection, and Response. Layers are   the ranking in Global Cyber Security Index
          features  within  applications  to  prevent  beneficial for many reasons. Each layer provides   released by International Telecommunication
          security  vulnerabilities  against  threats such as   an additional level of defence so that with   Union (ITU). Continuous efforts are needed to
          unauthorized access and modification. It involves   each extra layer of security that can be added,   further improve this posture. In a scenario where
          security  measures at the application level  that   it becomes more challenging to find ways to   Governments and corporates are facing frequent
          aim to prevent data or code within the app from   infiltrate the system. While each layer in and of   data breaches, layered security has become the
          being stolen, altered or hijacked. It encompasses   itself is not an adequate defence mechanism,   norm of the day to minimize the conventional as
          the security considerations that happen during   layering them together improves each one’s   well as the emerging threats.
          application development and design, but it also   efficiency until the last layer nearly completely
          involves systems and approaches to protect   blocks out the hacker’s ability to gain access.
          apps after they get deployed like Authentication,   Instead of trying to rely on just one or two
          Authorization, Encryption, Application security   levels of defence, like access cards and two-step   For further information, please contact:
                                                                                 Abhishek Sisodia
          testing etc.                                                           Scientist - B
                                             identification, multiple layers of security will   National Informatics Centre, A-Block
          Data Defence                       lower the risk of a breach and make it easier to   CGO Complex, Lodhi Road
            Data defence include measures to protect the   respond to legitimate inquiries and requests.  New Delhi - 110003
          storage and transfer of data. Different methods   With  a  layered  defence  approach,  several   Email: abhishek.sisodia @nic.in, Phone: 011-24305865



                                                                                        October 2021  informatics.nic.in 27
   22   23   24   25   26   27   28   29   30   31   32