New and future technologies in cybersecurity
By Akshay Govind Hande, Intern , Seth Associates
Keywords: Cybersecurity, blockchain, cyberlaw, IT Act,2000, Artificial intelligence, quantum computing
This article deals explicitly with current and emerging new technologies that can help in enhancing cybersecurity to avoid the risk of cyberattacks from cybercriminals.
Cybersecurity:
Cybersecurity is the protection electronic devices such as computers, laptops, smartphones etc. and their networks, programs and services related to it, or any communication device that uses information technology. Following are new technologies that are used to enhance cybersecurity.
Blockchain: A decentralized and distributed digital ledger technology that records transactions in multiple computers in such a way that ensures the security, transparency, and longevity of the data. Each block consists of lists of transactions in which when a block is completed it is added to the chain in a chronological order, such structure makes it extremely difficult for any alteration of any single record without changing all chronological subsequent blocks, providing high level security.
Working of blockchain:
Data entry of information like video fingerprint that are submitted to the network, then blocks are created wherein the data is grouped into blocks with a unique identifier and a reference is attached to the previous block which creates a subsequent chain. Such network is verified wherein the Computers on the network called miners validate the data and add the block to their copy of the ledger. Once a block is added, it cannot be changed without changing all chained blocks making tampering extremely difficult and nearly impossible.
Pseudonymization: A data management and de-identification process wherein the identifying fields inside data record are replaced by one or more artificial identifiers, or pseudonyms. Such pseudonyms represent the original data without revealing the actual identifiable information.
Working of Pseudonymization:
Personal Data such as the original data containing personal identifiers (e.g., names, addresses, social security numbers) is collected, transformation is conducted wherein Identifiers are replaced with pseudonyms, these pseudonyms are random or algorithm generated strings. The pseudonymized data is stored and used for analysis, processing, or sharing without revealing the original identifiers. Re-identification of the pseudonymized data is done if necessary, but only through secure mechanisms which map pseudonyms back to the original identifiers.
Artificial Intelligence and Machine Learning: Artificial Intelligence (AI) means adaptation of the human intelligence in machines, programmed to think and learn. AI systems perform tasks that require human intelligence such as visual perception, speech recognition, decision-making, and language translation. Machine Learning (ML) is a section of AI that involves development of algorithms and statistical models helping computers to perform specific tasks without explicit and comprehensive instructions, ML systems learn and make predictions or decisions based on the data
Working of AI and ML:
The learning process involves large amount of data thus Data is collected which comes from multiple sources such as logs, network traffic, user behaviour etc. The ML models are trained on historical data to identify patterns and make predictions. Such training process involves feeding the model input data and adjusting its parameters to minimize errors. The ML model makes predictions and decisions based on new data this is known as inference once these models are trained inference is checked. These Advanced AI and ML systems are continuously made to learn and adapt to new data in order to improve accuracy and effectiveness over time.
Zero Trust Architecture (ZTA): ZTA is a cybersecurity model that works on the principle of “never trust, always verify.” the traditional security models is based on “castle and moat” in which no one outside the network can access to data inside but everyone inside the network can. It relies on the assumption that everything inside an organization’s network should be trusted whereas Zero Trust assumes that threats will exist from both outside and inside the network. Therefore, the model mandates strict verification for every person and device trying to access resources on the network.
Working/principles:
The Users and devices are granted only the minimum access level adequate to perform their tasks maintain least privilege access, such activity reduces future damages if an attacker gains access. This model relies on policies such as limit user access with just in time and just enough access and other risk based adaptive policies. It focuses on data protection to protect data and productivity. All data points are continuously authenticated and authorized including user identity, location, device health, service or workload, data classification, and anomalies. Verifications are conducted at login and throughout a session so as to maintain a continued authorized access also the Networks are divided into smaller and isolated segments which limits the attacker’s ability to move laterally within the network.
Quantum Computing: A type of computing based on the principles of quantum mechanics to perform computations i.e. calculations. The classical computers use bits (0s and 1s) to process information, quantum computers use quantum bits or qubits. These exist in multiple states simultaneously as known as superposition and they can be entangled i.e. caught with each other thus allowing quantum computers to solve problems much faster than classical computers.
Working of quantum computing:
Qubits represent both 0 and 1 at the same time enabling quantum computers to process vast number of possibilities simultaneously at the same time. Qubits are entangled meaning the state of one qubit is directly related to the state of another even if they are far distanced. This is used to enhance and improve computational power and speed. Quantum computers can break many of the cryptographic algorithms currently in use, such as RSA and ECC. Quantum Key Distribution (QKD) based on the principles of quantum mechanics creates secure communication channels allowing two parties to create random secret key sharing with each other which is used to encrypt and decrypt messages. Such security of QKD is based on the laws of quantum mechanics which theoretically is impossible to break. Quantum computers generate random numbers thus creating secure cryptographic keys and improving the overall security of encryption algorithms. For instance, imagine trying to decode or guess the combination lock in which the combination changes every time you guess it wrong. The Traditional methods will crack it but a quantum lock uses completely random combinations every time making it nearly impossible to guess.
Behavioural Biometrics: This involves the identification and verification of individuals based on their unique patterns of behaviour while interacting with devices and systems. The physical biometrics like fingerprints or facial recognition does not analyse and recognize patterns such as typing rhythm, mouse movements, touchscreen interactions and even how one holds their device which are done by behavioural biometrics. It builds a profile of usual habits thus the behavioural biometrics detects suspicious activities. For instance, the behavioural biometrics can identify if someone logs into your account from a new location and types with a different rhythm.
Working of Behavioural Biometrics:
Users data is collected which includes interactions with devices and systems like keystroke dynamics, mouse movements, touch gestures and other information unique to user. From such features specific are extracted for each user. For example, the speed and pressure of typing, the angle and velocity of mouse movements, or the rhythm of touchscreen interactions etc. this way the procedure creates a behavioural profile, this profile represents the typical behaviour patterns of the user. Continuous monitoring is conducted of user interactions which is compared with the stored behavioural profiles in order to detect deviations which helps to authenticate and verify users. If the observed behaviour matches the profile, access is granted. If there are significant deviations, additional verification steps are triggered, and access is denied. Behavioural biometrics monitors activities in real time helping to detect attackers or cybercriminals if they have access to login credentials. Cybercriminals behave differently from regular users, behavioural biometrics detects such inconsistencies and prevents fraudulent transactions.
“Bibliography”
ORGANIZATIONAL ARTICLES /DOCUMENTS
- National Cyber Security Centre, “What is cyber security?” https://www.ncsc.gov.uk/section/about-ncsc/what-is-cyber-security#:~:text=Cyber%20security%20is%20how%20individuals,work%20%2D%20from%20theft%20or%20damage.
- Struck Capital, “DEEPFAKES AND BLOCKCHAIN” https://struckcapital.com/deepfakes-and-blockchain/
3.Google Cloud, “Pseudonymization” https://cloud.google.com/sensitive-data-protection/docs/pseudonymization#:~:text=Pseudonymization%20is%20sometimes%20referred%20to,way%20token%20can%20be%20reversed.
WEB ARTICLES:
- information security, “what are the difference between perimeter-based and zero-trust security models?” published on LinkedIn https://www.linkedin.com/advice/1/what-differences-between-perimeter-based-zero-trust-5s8oc
- The Investopedia Team, “Quantum Computing: Definition, How it’s used, and Example” updated on 5th April 2024 https://www.investopedia.com/terms/q/quantum-computing.asp#:~:text=Investopedia%20%2F%20Joules%20Garcia-,What%20Is%20Quantum%20Computing%3F,such%20as%20electrons%20or%20photons.
- lexis Nexis risk solutions, “What is Behavioural Biometrics” https://risk.lexisnexis.com/global/en/insights-resources/article/what-is-behavioral-biometrics#:~:text=Behavioral%20biometrics%20invisibly%20helps%20verify,strong%20foundation%20for%20establishing%20trust.