Skip to main content

Internal Security = Cyber Security

Extra:
 G-8 24/7 Network....a network by G7+EU  countries to get data @cyber crime....click here

Cyber  Security

Introduction:
--Cyber security or Information Security is securing ones informationsystems such as= computer, newtorks, programs and data in cyber space.
--Type:
    >Physical attack = bombing data centre.
    >Syntatic attack= using Virus/Trojan to attack functioning of information system.
    >Semantic attack=Decieve by some fake website, or phishing= that is you unknowingly become victim.
--some new dimension:
     > spreading rumors leading to violence ex- killing of N.E indian in Banglore.
     >Pshycological warfare = spreading ideology of ISIS etc.

Tools of Cyber Terrorism/Crime:
1) Hacking= unauthorised access to you computer.
2)Trojan= illegitimate programm=can not replicate itself=user thinks that they are running intended program while they are not.
3)computer viruses=keeps on multiplying and infect computer= through mail or pendrive.
4)Computer worms=keep multiply= unlike virus they are not attached to any executive file= so without running program it can har if worm is present in system.
5)Email-related crime=spreading rumors + fake  job+ defametory messages etc.
6)Denial of Service= traffick is icreased to the extant that a targetted person wont be able to avail service like email, netbanking , website etc.
7)Cryptology=Terrorist, fundamentalist etc use encrypted message for attacks.
8)Social engineerig attack= tricks to get password or classified info= honeytrap in millitary base.
9)IP spoofing=
10)Phishing=
11)Ransomware=denying service through some program then asking ransom to get access again.
12)Skimming=duplicate atm machine ...when you insert card it makes duplicate one.

Types of Warfare:
1)Espionage = one country to another= spy.
2)Sabotage= attacking on critical infrastructure—hacking powerplant, airport etc.

Examples:
>Stuxnet =USA +Israel made it....Computer worm...moinitors industrial facility under target......was used to  sabotage Iran’s nuclear program.

>GhostNet =believed to be operated by China....its a melicious program called “Remote Access Tool (RAT).....controll the target system whernever online.
>Pakistani cyber army + Team_H4tr!ck are threat to india ohter then China.
Ex- 2012 Exodus of North East from Banglore= Rumors spread by Pak cyber criminals.
>China = mainly deals in espionage= a part of their PLA(Peoples Liberation Army)
              Ex- 2010 China hacked Network of NSA + Airforce + Navy = got classified doc.

Existing Cyber security provisions:
Information Technology Act 2000:
>It provided= Legal recognition to digital transaction/signature + storage of info and filing doc of Gov office digitally.
>No aspect of cyber crime.
>Cyber Appellate Tribunal= to deal with dispute....
>consequently booming of BPO and digital media= leakage of info ↑
>Ammendment = IT Act 2008:
---a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected..
---Publishing sexual contant, or child porno = punishable.
---Provision for establishment of CERT(Computer Emergancy Response Team).
CERT:
>Forcast+Collect +Analyse + distribute into on Cyber crime.
>Emergancy  measures to deal with cyber attack.
>Provide expert advise in Info security.

Other agency
National Information Board(NIB)  + National Crisis Management Committee(NCMC)  + National Information Infrastructure Protection Centre(NIIPC).

Challanges  and Concerns of Cyber Security:
1)Lack of awareness + profssionals (50k while 5lakh is required)
2)inadequate traaining  + lack of qualified trainers.
3)Redundant IT act.
4)Lack of Private investment in Cyber security + lack of specialisation in academics.
5)Fast changing nature of Tech.

National Cyber security 2013:



Standing  Committee Report(Cyber crime/ Cyber security/ Privacy):



Comments

Popular posts from this blog

evaporation

what causes water to evaporate every fluid (pure) has a definite vapor pressure at a fixed temperature , now if any how the partial presuure of the fluiid is less then the the vapor pressure of the fluid then the fluid starts evaporating to attain the partial pressure equal to the  vapor pressure of the fluid, and then the equllibrium is reached and evaporation stops.                              basically at the top of the fluid there is a random motion of the fluid molecule due to the difference between the adhasive and cohesive forces, some molecule say 'n' goes into the vapur phase and some strikes back say m such that n>m then after the above explained condition is achived then the constraint m=n. conclusion whenever there is the fluid in liquid state is  present then in that system partial pressure is exactly to the va...

NITI Aayog::: M LAXMIKANTH

Chap 52 NITI AAYOG -- Created by “Executive Resolution” ….resolution of Cabinet . --Therefore its neither a constitutional body nor Statutory body (not by Parliament) --Replaced “Top to Bottom” approach of Planning commission. -- NEED= after liberalization>>>diff states achieved diff economic stage>>>diff requirement>>> “ one size filts all ” formulae of top to bottom   = now redundant. Compostion: ( follows structure of Council of minister): --Chairman = PM --Vice Chairman= Appointed by PM (rank of Cabinet minister) --Members =(of Minister rank)    >Full time(Permanent)=Expert in the field …..appointed by PM    >Part time(temp)= Max 2…from leading University+Reserch institute……Appointed by PM    >Ex-officio= like ministers at centre….Ex- Amit shah, Home minister…..Appointed by PM.    >CEO=(rank of union council of minister) Appointed by PM --Other members:   >Form...

Fundamental Right

 Article 22 22(1): ->Arrested person should be provided with "REASON FOR ARREST" ->LAWYER of his choice 22(2): ->arrested person should be brought before MAGISTRATE within 24 hour (minus travel time to magistrate) 22(3): -> 3 means TRISHUL 🔱 --> 22(1) and 22(2)  not applied : ==for enemy alien  ==If arrested for preventive detention law 22(4): ->NO PREVENTIVE DETENTION law shall authorise MORE then 3 MONTH detention unless: == advisory body having HC judge equivalent has reported for extention before expiry of said duration 22(5): ->Detained PERSON should be briefed about GROUND OF DETENTION 22(6): -> 22(5) cant force authority to disclose facts related to order which such authority considers to be against public interest to disclose. 22(7): Parliament may by law extend 3 month detention without obtaining opinion from advisory body{22(4)}