Advertisment

Emerging security implications in the era of technology convergence

Network slicing, a key feature of 5G, can complicate security management as each slice can potentially be a new point of attack.

author-image
VoicenData Bureau
New Update
Get ready for more cyberattacks

Convergence can amplify the attack surface through a troika of increased digital access, rapid digitisation, and amalgamation of technologies

Advertisment

As we navigate the labyrinth of the digital age, we encounter a phenomenon where once distinct and disparate technologies are progressively knitting themselves together into a cohesive whole. This phenomenon, known as technology convergence, is an amalgamation of technologies, systems, and services, gradually adapting and merging to perform harmonising functions. With an estimated 759 million internet users as of May 2023 and a rapidly expanding digital ecosystem, India is experiencing technology convergence across a variety of sectors such as finance, healthcare, communications, and entertainment. While this process brings significant opportunities, it also poses unique challenges to India’s security and privacy landscape, due to the blurring boundaries of technologies and their emerging security implications.

EXPANDED ATTACK SURFACE

Technology convergence in the Indian landscape has drastically amplified the attack surface through a combination of increased digital access, rapid digitisation of services, and the amalgamation of technologies, such as the Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), 5G networks, and Cloud Computing.

Advertisment

With its burgeoning digital population and widespread adoption of IoT devices, India is a prime example of how this expansion can occur. According to Statista, an estimated two billion IoT devices existed in India as of 2021, and this number is set to exponentially rise to a staggering 25 billion by 2030. These IoT devices range from personal gadgets like smartphones and wearable tech to home automation systems and healthcare devices. However, many of these devices lack adequate security measures, thereby posing a significant security risk. For instance, the absence of robust authentication methods, outdated software, and the use of default credentials can make these devices easy targets for cybercriminals, providing them a foothold in larger networks.

Cloud services offer significant benefits in terms of scalability, but multi-tenancy in cloud services can lead to data leakage if data isolation measures are not in place.

Parallelly, as AI and ML technologies increasingly become integral to businesses in India, new attack vectors emerge. Adversarial attacks, a specific type of attack on ML models, can manipulate these models in subtle ways that cause them to malfunction or produce incorrect results. Given the growing reliance on these models for crucial decision-making processes, such attacks could have wide-ranging implications.

Advertisment

The rise of 5G networks, touted to revolutionize India’s digital landscape, brings its own set of security issues. With a much larger bandwidth and lower latency, 5G is expected to connect to countless more devices and enable new applications and services. However, the increase in connected devices also implies a proportional increase in the attack surface, requiring 5G networks to have robust security protocols in place to mitigate potential threats. The introduction of network slicing, a key feature of 5G, can further complicate security management as each slice can potentially be a new point of attack for malicious entities.

Network slicing, a key feature of 5G, can complicate security management as each slice can potentially be a new point of attack for malicious entities.

The role of Cloud Computing in expanding the attack surface cannot be understated. The market for cloud services in India is projected to reach USD13 billion by 2026. While cloud services offer significant benefits in terms of scalability, efficiency, and cost reduction, they also extend the organisation’s network boundaries beyond their direct control, introducing a shared security model. This model suggests that both the provider and consumer of the cloud service are responsible for security. However, if either party does not fulfil its security obligations, it can result in vulnerabilities. Furthermore, multi-tenancy in cloud services can also lead to data leakage if proper data isolation measures are not implemented.

Advertisment

COMPLEX THREAT LANDSCAPE

The convergence of technology in India has not only expanded the attack surface but also led to a considerable increase in the complexity of the threat landscape. This landscape is evolving with the advent of interconnected devices, systems, and networks, leading to an increasing risk of single points of failure and cascading effects.

Firstly, the sheer number of interconnected and interoperable devices that technology convergence brings forth has significantly amplified the potential for large-scale, coordinated attacks. This issue is particularly notable with IoT devices, where a security breach in a single device can compromise the entire network. An example of this was seen in the Mirai botnet attack in 2016, where numerous IoT devices were compromised and used to launch a distributed denial of service attack. With the IoT market in India expected to grow to USD27.31 billion by 2023 as per Statista, the potential for such attacks is a substantial concern.

Advertisment

Advanced Persistent Threats (APTs) in India have also evolved in step with the changing technological landscape. APTs are targeted, stealthy threats designed to maintain a long-term presence in the target’s systems, siphoning off data or causing damage without detection. These threats have begun to exploit the interconnected nature of converged technologies, making detection and mitigation even more challenging. For instance, the ‘Side Copy’ APT targeted the Indian government and military personnel in 2021, demonstrating the increasing sophistication of such attacks.

The advent of AI and ML in the cyber threat landscape has given rise to intelligent malware and ransomware. Such malware uses advanced techniques to evade detection, adapt to the environment, and target specific system vulnerabilities. This development has been increasingly troublesome for Indian businesses, which were among the top targets of ransomware attacks in 2020. The increasing use of AI and ML in cyber threats poses a daunting challenge, as they can outpace traditional security defences and require new mitigation strategies.

"Threat landscape in India is evolving with the advent of interconnected devices, systems, and networks, leading to an increasing risk of single points of failure."

Advertisment

Adding to the complexity is the increasing prevalence of cyber-physical attacks, which target the intersection of digital and physical infrastructure, such as power grids or transport systems. For example, the 2020 cyber-attack on Mumbai’s power grid displayed how vulnerable such systems could be. With more physical systems becoming networked and automated, the potential for such attacks is expected to continue to rise.

GOVERNANCE, RISK, AND COMPLIANCE

Technology convergence has intensified the issues related to governance, risk, and compliance in India. The Ministry of Electronics and Information Technology (MeitY) has recognised these challenges and has taken several significant steps. While the Indian government has initiated regulation with the Personal Data Protection Bill (PDPB) and the National Cyber Security Strategy, MeitY also understands that these legal frameworks, currently under development, may not fully cover the fast-paced evolution of technology.

Advertisment

Emerging technologies such as blockchain and quantum computing, which India, through initiatives under MeitY, is actively exploring, bring added layers of complexity. Data protection, privacy, and cyber-physical security are pivotal areas. To tackle these, MeitY has initiated dynamic and adaptive risk management approaches, such as the establishment of the Indian Computer Emergency Response Team (CERT-In) and the Cyber Swachhta Kendra.

Furthermore, the Information Security Education and Awareness (ISEA) project has been instrumental in raising cybersecurity awareness. These proactive steps have become even more crucial considering the country’s push for its Digital India and Make in India objectives.

To summarize, technology convergence presents a unique set of opportunities and challenges for India. While it offers the potential for innovation, productivity, and economic growth, it also introduces new security implications. It is critical that as technology continues to evolve and converge, so must the strategies for securing it. By understanding and addressing these emerging security implications, India can ensure a safe, secure, and prosperous digital future in the era of technology convergence.

Author- Lt Gen Dr S P Kochhar, General of the Cellular Operators Association of India (COAI)

feedbackvnd@cybermedia.co.in

Advertisment