Extra:
G-8 24/7 Network....a network by G7+EU countries to get data @cyber crime....click here
Types of Warfare:
1)Espionage = one country to another= spy.
2)Sabotage= attacking on critical infrastructure—hacking powerplant, airport etc.
Examples:
>Stuxnet =USA +Israel made it....Computer worm...moinitors industrial facility under target......was used to sabotage Iran’s nuclear program.
>GhostNet =believed to be operated by China....its a melicious program called “Remote Access Tool (RAT).....controll the target system whernever online.
Existing Cyber security provisions:
Information Technology Act 2000:
>It provided= Legal recognition to digital transaction/signature + storage of info and filing doc of Gov office digitally.
>No aspect of cyber crime.
>Cyber Appellate Tribunal= to deal with dispute....
>consequently booming of BPO and digital media= leakage of info ↑
>Ammendment = IT Act 2008:
---a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected..
---Publishing sexual contant, or child porno = punishable.
---Provision for establishment of CERT(Computer Emergancy Response Team).
CERT:
>Forcast+Collect +Analyse + distribute into on Cyber crime.
>Emergancy measures to deal with cyber attack.
>Provide expert advise in Info security.
Other agency
National Information Board(NIB) + National Crisis Management Committee(NCMC) + National Information Infrastructure Protection Centre(NIIPC).
G-8 24/7 Network....a network by G7+EU countries to get data @cyber crime....click here
Cyber Security
Introduction:
--Cyber security or Information Security is securing ones informationsystems such as= computer, newtorks, programs and data in cyber space.
--Type:
>Physical attack = bombing data centre.
>Syntatic attack= using Virus/Trojan to attack functioning of information system.
>Semantic attack=Decieve by some fake website, or phishing= that is you unknowingly become victim.
--some new dimension:
> spreading rumors leading to violence ex- killing of N.E indian in Banglore.
>Pshycological warfare = spreading ideology of ISIS etc.
Tools of Cyber Terrorism/Crime:
1) Hacking= unauthorised access to you computer.
2)Trojan= illegitimate programm=can not replicate itself=user thinks that they are running intended program while they are not.
3)computer viruses=keeps on multiplying and infect computer= through mail or pendrive.
4)Computer worms=keep multiply= unlike virus they are not attached to any executive file= so without running program it can har if worm is present in system.
5)Email-related crime=spreading rumors + fake job+ defametory messages etc.
6)Denial of Service= traffick is icreased to the extant that a targetted person wont be able to avail service like email, netbanking , website etc.
7)Cryptology=Terrorist, fundamentalist etc use encrypted message for attacks.
8)Social engineerig attack= tricks to get password or classified info= honeytrap in millitary base.
9)IP spoofing=
10)Phishing=
11)Ransomware=denying service through some program then asking ransom to get access again.
12)Skimming=duplicate atm machine ...when you insert card it makes duplicate one.
Introduction:
--Cyber security or Information Security is securing ones informationsystems such as= computer, newtorks, programs and data in cyber space.
--Type:
>Physical attack = bombing data centre.
>Syntatic attack= using Virus/Trojan to attack functioning of information system.
>Semantic attack=Decieve by some fake website, or phishing= that is you unknowingly become victim.
--some new dimension:
> spreading rumors leading to violence ex- killing of N.E indian in Banglore.
>Pshycological warfare = spreading ideology of ISIS etc.
Tools of Cyber Terrorism/Crime:
1) Hacking= unauthorised access to you computer.
2)Trojan= illegitimate programm=can not replicate itself=user thinks that they are running intended program while they are not.
3)computer viruses=keeps on multiplying and infect computer= through mail or pendrive.
4)Computer worms=keep multiply= unlike virus they are not attached to any executive file= so without running program it can har if worm is present in system.
5)Email-related crime=spreading rumors + fake job+ defametory messages etc.
6)Denial of Service= traffick is icreased to the extant that a targetted person wont be able to avail service like email, netbanking , website etc.
7)Cryptology=Terrorist, fundamentalist etc use encrypted message for attacks.
8)Social engineerig attack= tricks to get password or classified info= honeytrap in millitary base.
9)IP spoofing=
10)Phishing=
11)Ransomware=denying service through some program then asking ransom to get access again.
12)Skimming=duplicate atm machine ...when you insert card it makes duplicate one.
Types of Warfare:
1)Espionage = one country to another= spy.
2)Sabotage= attacking on critical infrastructure—hacking powerplant, airport etc.
Examples:
>Stuxnet =USA +Israel made it....Computer worm...moinitors industrial facility under target......was used to sabotage Iran’s nuclear program.
>GhostNet =believed to be operated by China....its a melicious program called “Remote Access Tool (RAT).....controll the target system whernever online.
>Pakistani cyber army + Team_H4tr!ck are threat to
india ohter then China.
Ex- 2012 Exodus of North East from Banglore= Rumors spread by Pak cyber criminals.
Ex- 2012 Exodus of North East from Banglore= Rumors spread by Pak cyber criminals.
>China = mainly deals in espionage= a part of their PLA(Peoples Liberation Army)
Ex- 2010 China hacked Network of NSA + Airforce + Navy = got classified doc.
Ex- 2010 China hacked Network of NSA + Airforce + Navy = got classified doc.
Existing Cyber security provisions:
Information Technology Act 2000:
>It provided= Legal recognition to digital transaction/signature + storage of info and filing doc of Gov office digitally.
>No aspect of cyber crime.
>Cyber Appellate Tribunal= to deal with dispute....
>consequently booming of BPO and digital media= leakage of info ↑
>Ammendment = IT Act 2008:
---a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected..
---Publishing sexual contant, or child porno = punishable.
---Provision for establishment of CERT(Computer Emergancy Response Team).
CERT:
>Forcast+Collect +Analyse + distribute into on Cyber crime.
>Emergancy measures to deal with cyber attack.
>Provide expert advise in Info security.
Other agency
National Information Board(NIB) + National Crisis Management Committee(NCMC) + National Information Infrastructure Protection Centre(NIIPC).
Challanges and Concerns of Cyber Security:
1)Lack of awareness + profssionals (50k while 5lakh is required)
2)inadequate traaining + lack of qualified trainers.
3)Redundant IT act.
4)Lack of Private investment in Cyber security + lack of specialisation in academics.
5)Fast changing nature of Tech.
1)Lack of awareness + profssionals (50k while 5lakh is required)
2)inadequate traaining + lack of qualified trainers.
3)Redundant IT act.
4)Lack of Private investment in Cyber security + lack of specialisation in academics.
5)Fast changing nature of Tech.
National Cyber security 2013:
Standing Committee Report(Cyber crime/ Cyber security/ Privacy):
Standing Committee Report(Cyber crime/ Cyber security/ Privacy):
Comments
Post a Comment