News

[News][twocolumns]

Daily Current Affairs

[Daily Current Affairs][bigposts]

General Knowledge

[General Knowledge][twocolumns]

National

[National][twocolumns]

international

[International][twocolumns]

Technology

[Technology][twocolumns]

Cyber Security and Cyberwar threat



cyber crime


Cyberwar threat
From time to time there is a discussion in the media that such a website has been hacked or the website has been taken over by hackers of China or Pakistan and it has been disabled for some time. Recently, there was news of the ruling party BJP's website being hacked in the country ... And there was no time when the UPSC website was also hacked. Such cyber-attacks are continuously increasing in India.

• After the recent Pulwama terror attack, an Indian hacker group made a big cyber attack on Pakistan. Indian hackers hacked over 200 Pakistani websites. On opening these websites hacked by Team I-Crew, there were visible messages paying tribute to the martyrs and a candle burning. Earlier, immediately after the Pulwama attack, it was reported that Pakistani hackers hacked at least 90 websites related to the Indian government. Among these, websites related to financial operations and power grids were particularly targeted by hackers.

What is a cyber attack?

• The phrase 'cyber attack' is used in terrorist activities to refer to attacks done through the Internet. These include intentional large-scale disruption of computer networks through means such as computer viruses, particularly in a personal computer connected to the Internet. A cyber attack can be defined as a computer crime in a more general way ... targeting and damaging a computer network without harming real-world infrastructure, property, and lives. It is also called hacking.

what is hacking

What is hacking?

• Hacking is a process in which hacking steals the information of another person without their permission. To do this, he dodges personal information of that person and hacks them. Hacking has been considered illegal, but sometimes hacking is done for good work. Through this, many types of crimes are committed by cybercriminals.

Who is a hacker?

hacker

• Most people have no idea who the hacker is and what he does… how he does it. Actually ... most hackers do it as an amateur when they start hacking, there is no money motive behind it all the time. The desire to create an identity among other hackers or to race themselves better than others remains here due to the greed of hacking. Hacking also starts due to the power of technology on its bus. Although the hacker knows everything that is right and what is wrong, despite this they are engaged in this work. Not being socially acceptable or due to poor looks, youngsters step into the field of hacking.

Three types of hackers

White Hat Hacker

Hackers who fall into this category do good work i.e. they are appointed for the protection of the people. They are kept by the government or by any organization. They are also known as ethical hackers.

Black Hat Hacker

These hackers are also known as crackers. They use their skills incorrectly and do illegal work. Like - stealing someone's personal information, hacking someone's account and using that information online to earn money.

Gray Hat Hacker

 This category of hackers is a combination of black and white, which do good work for some time and sometimes even illegal.

What is Phishing?

• It has been termed as an online forgery in Hindi. Under this, criminals send fake e-mails or messages through phishing, which are similar to a reputed company, your bank, credit card, online shopping. If vigilance is not exercised, then it is certain that they are trapped in the trap. The purpose of these fake e-mails or messages is to steal personal identity information of people. Under this, personal information of a person comes, including name, e-mail. User ID, password, mobile number, address, bank account number, ATM/debit or credit card number and their PIN and date of birth are included.

What is ransomware?

Ransomware is a type of ransom-seeking software. It is created in such a way that it encrypts all the files of any computer system. It starts demanding ransom as soon as the software encrypts these files and threatens that it will corrupt all the files on that computer if it is not paid. After this, the computer user is not able to access these files until he pays the ransom. Such viruses can be accessed by downloading a file from a suspicious location.

Hacking of important government websites-

cyber security

• About 6 years ago a figure was provided by Edward Snowden. It was told that burglars sitting outside had accessed 6.3 billion intelligence information of Indians. Today, the condition is that cyber attacks have been done on computers from our Prime Minister's Office to the Ministry of Defense and External Affairs, Indian Embassies, Missile Systems, NIC, CBI. Government institutions in India are not protected from cyber attacks. • In fact, the government and the corporate world have no specific knowledge about the dangerous methods adopted by hackers. After loading anti-virus and firewall software, most departments and corporate companies in India assumes that they have protected their systems and networks from cyber-attacks.

National Cyber Security Policy-

Sensing cyber threats, the Government of India issued the National Cyber Security Policy six years ago in 2013, which called for adopting key strategies to protect the country's cybersecurity infrastructure. These policies include the establishment of a 24-hour National Critical InformationProtection Center (NCEIPC) in the country, which can function as a nodal agency for the security of critical information systems in the country. At present, there is no joint working group on cybersecurity in the country and no autonomous body has been formed on cybersecurity.

cyber security and privacy


Key Features-

• Creating a secure environment for electronic transactions, building trust and confidence and guiding the actions of stakeholders to protect the cyber world.

• A framework for comprehensive, collaborative and collective action has been prepared to deal with cybersecurity issues at all levels in the country.

• This policy recognizes the need for objectives and strategies that need to be adopted at the national and international level.

• The vision and mission of this policy are to make the cyber world safe and resilient for citizens, businesses and government.

• Setting a goal to secure the nation from cyber-attacks and remove flaws.

• To increase cooperation and coordination among all stakeholders within the country.

• Setting objectives and strategies in support of the National Cyber Security Vision and Mission.

• Such a framework and initiatives have been developed which can be taken forward at the Government level, field level and through a public-private partnership.

• This will allow trends such as cybersecurity compliance, cyberattacks, cybercrime and cyberinfrastructure to be monitored nationally.


Steps were taken by the government

step for protection to hacking

• Sections 43, 43A, 66, 66B, 66C, 66D, 66E, 66F, 67, 67A, 67B, 70, 72, 72A and 74 of Information Technology Act 2000 are related to hacking and cyber crimes.

• Government has approved the framework related to cybersecurity. For this, the National Security Council Secretariat has been made the nodal agency.

• National Technology Research Organization has been made the the nodal agency for cybersecurity in national specific infrastructure and specific areas.

• Bharat Computer Computer Emergency Response Team (CERT-IN) has been made the nodal agency for analyzing, estimating and warning of cybersecurity threats.

• Ministry of Home Affairs has issued guidelines for states /UTs on cybercrimes.

• Ministry of Home Affairs is running 'Prevention of Cybercrimes against Women and Children' program for women and children.

• The Ministry of Home Affairs has set up an inter-ministerial committee to deal with phone frauds. Apart from this, guidelines have also been issued for the States / UTs.

• Cybercrime is an illegal act where the computer is used as a means or target or both. It can be said that this is a broad concept in which a computer or computer network is used as a means, target or place of criminal activity.
Today, the threat of cyberspace is no longer imaginary. Incidents like virtual terrorism, burglary and leaking of information of military and economic importance have proved that many countries in the world may have to bear the brunt of not making proper arrangements for the prevention of infiltration of electronic networks of information.
• Cyber say or virtual war, now its danger is real. There is no doubt that the biggest challenge of the future will be a cyberwar. Cyberwar means the criminal and terrorist activities conducted by the Internet through which an individual or organization tries to harm the country, the world and society.
• Today all the information and information is being handled through the Internet. In such a situation, the winner will be the one who will be able to break into the enemy's computer network and deal with the attacks by hackers on the Internet.


No comments:

Post a comment

Pleasse do not enter any spam link in the comment box.