Skip to main content

Notes on Cyber Security for Airforce Group Discussion

Cyber Security: (Important Notes for Airforce Group Discussion Phase2)

--Cyber Security is protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
-- Science and Technology has changed the face of everything and reduced the level of efforts.The era has arrived when even warfare also got a technical face.
--As everything on paper is now on servers.Cyber threat has emerged as a new mode of stealing.

Sources of cyber threat -
-cyber groups
-hackers
-spyware and malware
-terrorists

Need for Cyber Security:

--For Individuals: Photos, videos and other personal information shared by an individual on social networking sites can be inappropriately used by others, leading to serious and even life-threatening incidents.

--For Business Organizations: Companies have a lot of data and information on their systems. A cyber attack may lead to loss of competitive information (such as patents or original work), loss of employees/customers private data resulting into complete loss of public trust on the integrity of the organization.

--For Government: A local, state or central government maintains huge amount of confidential data related to country (geographical, military strategic assets etc.) and citizens. Unauthorized access to the data can lead to serious threats on a country.

Laws related to Cyber Security in India:

Information Technology Act, 2000

-The act regulates use of computers, computer systems, computer networks and also data and information in electronic format.
--National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.

Challenges:

•Increased use of mobile technology and internet by people.
•Proliferation of Internet of Things (IoT) and lack of proper security infrastructure in some devices.
•Cyberspace has inherent vulnerabilities that cannot be removed.
•Internet technology makes it relatively easy to misdirect attribution to other parties.
•It is generally seen that attack technology outpaces defence technology.
•Lack of awareness on Cyber security.
•Lack of Cyber security specialists.
•Increased use of cyberspace by terrorists.

Way Forward :

•Real-time intelligence is required for preventing and containing cyber attacks.
•Periodical ‘Backup of Data’ is a solution to ransomware.
•Using Artificial Intelligence (AI) for predicting and accurately identifying attacks.
•Using the knowledge gained from actual attacks that have already taken place in building effective and pragmatic defence.
•Increased awareness about cyber threats for which digital literacy is required first.

For more https://t.me/airforcestudy

Comments

Popular posts from this blog

Army GD Model Paper 1 with Solutions by Garhwal Sir

1. पास्कल किसकी इकाई है दाब की  2. चलती हुई बस जब अचानक ब्रेक लgती है तो उसमें बैठे हुए यात्री आगे की दिशा में गिरते हैं किसको किसके द्वारा समझाया जा सकता है  न्यूटन का पहला नियम  3. दूध से क्रीम निकालने में कौन सा बल लगता है  उत्तर अपकेंद्रीय बल  4. ध्वनि की चाल अधिकतम किसमें होती है  उत्तर निर्वात में  5. दाढ़ी बनाने के लिए काम में लेते हैं  अवतल दर्पण  6. इलेक्ट्रॉन की खोज किसने की थी  उत्तर जे जे थॉमसन ने  7.भविष्य का ईंधन किसे कहा जाता है  उत्तर  हाइड्रोजन को  8.धोने का सोडा किस का प्रचलित नाम है  उत्तर सोडियम कार्बोनेट  9.सोडियम बाई कार्बोनेट का सामान्य नाम क्या है  उत्तर beकिंग सोडा  10. पोटेशियम नाइट्रेट का प्रयोग किसके उत्पादन में होता है  उत्तर Uravark के उत्पादन में  11.विश्व पर्यावरण दिवस किस दिन मनाया जाता है  उत्तर है 6 जून को  12. विटामिन ए को किस नाम से जाना जाता है  रेटिनोल  13.yeast ek क्या है  कवक है

Cyber Security Need of the hour: Group Discussion Topic for Airforce Phase2

Cyber security : Need of the Hour It is the time when whole world is suffering from covid crisis.  Currently government websites are being hacked, Banks also reported breach of confidential data from their servers,  the energy and nuclear power plants control systems are infected with virus Trojan and social media accounts of  celebrities being hacked. People are receiving text messages asking amount or money has been deducted from their bank accounts. The whole Nation is in a state of confusion.  It is clear that our country has become a victim of cyber attack and there has been 260% increase in cyber attacks since lockdown induced due to covid-19 pandemic. Due to increasing network and interconnectivity cyber attacks have become more common.   Cyber attackers uses different methods for attacks.  First , There are many financially motivated organised crime groups uses cyberspace as Warfare to hack business, Networks and demand mo...

Mahavir Chakra and Gallantry Award GD topic

Mahavir Chakra The Mahavir Chakra (MVC) is the  second-highest military decoration  in India and is awarded for acts of conspicuous gallantry in the presence of the enemy, whether on land, at sea or in the air. The Mahavir Chakra was instituted on 26 Jan 1950 to recognise the act of gallantry in the presence of the enemy. The most MVCs awarded in a single conflict were in the Indo-Pakistan War of 1971 when eleven awards are given to the Indian Air Force alone. Till 2017, there are around 218 personnel have been awarded from this medal. Gallantry Awards Gallantry Awards have been instituted by the Government of India to honour the acts of bravery and sacrifice of the officers/personnel of the Armed Forces, other lawfully constituted Forces and civilians. These gallantry awards are  announced twice in a year  – first on the occasion of the Republic Day and then on the occasion of the Independence Day. Types of Gallantry awards Gallantry Awards are classified into two C...