Skip to main content

Notes on Cyber Security for Airforce Group Discussion

Cyber Security: (Important Notes for Airforce Group Discussion Phase2)

--Cyber Security is protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
-- Science and Technology has changed the face of everything and reduced the level of efforts.The era has arrived when even warfare also got a technical face.
--As everything on paper is now on servers.Cyber threat has emerged as a new mode of stealing.

Sources of cyber threat -
-cyber groups
-hackers
-spyware and malware
-terrorists

Need for Cyber Security:

--For Individuals: Photos, videos and other personal information shared by an individual on social networking sites can be inappropriately used by others, leading to serious and even life-threatening incidents.

--For Business Organizations: Companies have a lot of data and information on their systems. A cyber attack may lead to loss of competitive information (such as patents or original work), loss of employees/customers private data resulting into complete loss of public trust on the integrity of the organization.

--For Government: A local, state or central government maintains huge amount of confidential data related to country (geographical, military strategic assets etc.) and citizens. Unauthorized access to the data can lead to serious threats on a country.

Laws related to Cyber Security in India:

Information Technology Act, 2000

-The act regulates use of computers, computer systems, computer networks and also data and information in electronic format.
--National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.

Challenges:

•Increased use of mobile technology and internet by people.
•Proliferation of Internet of Things (IoT) and lack of proper security infrastructure in some devices.
•Cyberspace has inherent vulnerabilities that cannot be removed.
•Internet technology makes it relatively easy to misdirect attribution to other parties.
•It is generally seen that attack technology outpaces defence technology.
•Lack of awareness on Cyber security.
•Lack of Cyber security specialists.
•Increased use of cyberspace by terrorists.

Way Forward :

•Real-time intelligence is required for preventing and containing cyber attacks.
•Periodical ‘Backup of Data’ is a solution to ransomware.
•Using Artificial Intelligence (AI) for predicting and accurately identifying attacks.
•Using the knowledge gained from actual attacks that have already taken place in building effective and pragmatic defence.
•Increased awareness about cyber threats for which digital literacy is required first.

For more https://t.me/airforcestudy

Comments

Popular posts from this blog

Army GD Model Paper 1 with Solutions by Garhwal Sir

1. पास्कल किसकी इकाई है दाब की  2. चलती हुई बस जब अचानक ब्रेक लgती है तो उसमें बैठे हुए यात्री आगे की दिशा में गिरते हैं किसको किसके द्वारा समझाया जा सकता है  न्यूटन का पहला नियम  3. दूध से क्रीम निकालने में कौन सा बल लगता है  उत्तर अपकेंद्रीय बल  4. ध्वनि की चाल अधिकतम किसमें होती है  उत्तर निर्वात में  5. दाढ़ी बनाने के लिए काम में लेते हैं  अवतल दर्पण  6. इलेक्ट्रॉन की खोज किसने की थी  उत्तर जे जे थॉमसन ने  7.भविष्य का ईंधन किसे कहा जाता है  उत्तर  हाइड्रोजन को  8.धोने का सोडा किस का प्रचलित नाम है  उत्तर सोडियम कार्बोनेट  9.सोडियम बाई कार्बोनेट का सामान्य नाम क्या है  उत्तर beकिंग सोडा  10. पोटेशियम नाइट्रेट का प्रयोग किसके उत्पादन में होता है  उत्तर Uravark के उत्पादन में  11.विश्व पर्यावरण दिवस किस दिन मनाया जाता है  उत्तर है 6 जून को  12. विटामिन ए को किस नाम से जाना जाता है  रेटिनोल  13.yeast ek क्या है  कवक है

Situation Reaction Test Practice Set 1 by - GarhwalSir on Telegram airforcestudy.

Situation Reaction Test (Set-1) 1. You found a bag filled with medicines by the roadside. You: A) Try to find out bill in the bag and try to inquiring about the owner of the bag . B) You go to the police station and give it to the police officer. C) Carry the medicines at your home and use them. D) Sale the medicine to local pharmacist and earn money. 2. You are visiting abroad and on the arrival at airport counter, someone abuse Your nation in front of you. You: A) You will complain to airport officials. B) You will complaint to the embassy. C) You will debate with them and try to change their view to the positive side. D) You will beat the individual who is abusing Your nation. 3: You are having no contacts in foreign countries but one foreigner girl send you friend request on Facebook. You A. Accept the request and start chit chat with her. B. Accept the friend request and enquire about her. C. Reject the request and block her permanently. D. Check out and read her profile on Facebo