Professional Documents
Culture Documents
Cyber terrorism is the convergence of terrorism and cyber space. Any attack which hampers
the normal functioning of the infrastructure.
Generally critical infrastructure is targeted. Situation creates panic, denial of service, loss of
financial and personal data.
Some tactics used:
1. Hacking: most popular method used.
Any kind of unauthorized access to a computer (sniffing, packet analyser)
2. Trojan
3. Computer Viruses. (A computer virus attaches itself to a program or file enabling it to
spread from one computer to another, leaving infections as it travels)
4. Computer Worms (Worms spread from computer to computer, but unlike a virus, it has the
capability to travel without any human action. Capacity to replicate in system)
5. Cryptology. Terrorists have started using encryption, high frequency encrypted voice/data
links etc. It is tough to intercept and identify.
Problem is: There would be no responsibility. These attacks will appear to have come from all
over the globe as also servers within the country. There would be nobody who could be
definitely identified.
FOR more: http://www.idsa.in/system/files/book_indiacybersecurity.pdf
Cert-In is the most important constituent: aimed at security incident prevention and
response and security assurance.
14000 Indian sites and 250 around gov sites were hacked (cert in reported)
LACK OF AWARENESS
AGE OLD CYBER LAWS
NO TRAINED MANPOWER DESPITE OF IT HUB
DEARTH OF CYBER SECURITY EXPERTS
POLICY RELATED TO THE EMAIL ACCOUNTS OF SERVING PERSONNELS
Department of Electronics and IT will be the nodal ministry, other stakeholders like
Ministry of Defence, National Technical Research Organisation (NTRO) Defence
Research and Development Organisation (DRDO) will also play major roles in
implementing this policy.
A national cyber coordination centre will be coming up soon.
KEY words:
CERT-IN
CYBER SPACE
ICT
NCIIPC
IUSCF
NIST
NISAP
ISAC
SCADA
From:
MAHARSHI RAVAL
SUGGESTED
READINGS:
Phishing
Pharming
Spoofing
PRISMUS gov program and
outrage
Cyber security and
mobile banking