Skip to main content

Cyber Security Need of the hour: Group Discussion Topic for Airforce Phase2

Cyber security : Need of the Hour
It is the time when whole world is suffering from covid crisis. 

Currently government websites are being hacked, Banks also reported breach of confidential data from their servers,  the energy and nuclear power plants control systems are infected with virus Trojan and social media accounts of  celebrities being hacked. People are receiving text messages asking amount or money has been deducted from their bank accounts. The whole Nation is in a state of confusion.  It is clear that our country has become a victim of cyber attack and there has been 260% increase in cyber attacks since lockdown induced due to covid-19 pandemic. Due to increasing network and interconnectivity cyber attacks have become more common.  


Cyber attackers uses different methods for attacks. 
First, There are many financially motivated organised crime groups uses cyberspace as Warfare to hack business, Networks and demand money from users to fund their terrorist activities. 
Secondly there are some nation where people work directly or indirectly to the government to steal sensitive information from enemy countries like China, Pakistan and North Korea.  
Thirdly, there are activist groups whose intention is not to steal money but to promote their religions, politics and to impact the reputation of opposition. 
Forth, there are groups of people defined as 'insiders'  these people are not engaged in activities intentionally but they are blackmailed to do so, for example person being blackmailed by hackers to give access to his company details 

Commonly used method in Cyber attack
First  These attackers send email and ask the user to click on link and enter their personal data.  
Second, ransomware is a method where attackers uses purpose-built Malware to lock business Network and demand money from users to unlock their files. 
 Third method where attackers send huge volume of data or traffic through the network until it becomes overloaded and stops functioning. 

Consequences
First Data theft or access to secret information of Defence and other top agencies of our technicians to create mass destruction was one of the great consequence of Cyber attack. 
Secondly countries digital infrastructure will be college with huge traffic on server 
 Thirdly spread of fake news used by many activates with a view to cause communal tension and defend their opposition. sometime terrorist groups take this chance 

Measures taken by government to control these attacks 

1. Central government created an agency under IT Act 2000 namely Indian computer emergency response team (CERT-IN) to secure the digital infrastructure of countries from cyber attack.
 2. National Investigation Agency (NIA) Amendment Bill which adopt zero tolerance against terrorism passed by Loksabha.
3.  Government also issued various guidelines and precautions to be taken by general public to protect themselves from cyber warfare such as cyber awareness program among public and  insisting public to change password from time to time or not to share private information.

Comments

Popular posts from this blog

Mahavir Chakra and Gallantry Award GD topic

Mahavir Chakra The Mahavir Chakra (MVC) is the  second-highest military decoration  in India and is awarded for acts of conspicuous gallantry in the presence of the enemy, whether on land, at sea or in the air. The Mahavir Chakra was instituted on 26 Jan 1950 to recognise the act of gallantry in the presence of the enemy. The most MVCs awarded in a single conflict were in the Indo-Pakistan War of 1971 when eleven awards are given to the Indian Air Force alone. Till 2017, there are around 218 personnel have been awarded from this medal. Gallantry Awards Gallantry Awards have been instituted by the Government of India to honour the acts of bravery and sacrifice of the officers/personnel of the Armed Forces, other lawfully constituted Forces and civilians. These gallantry awards are  announced twice in a year  – first on the occasion of the Republic Day and then on the occasion of the Independence Day. Types of Gallantry awards Gallantry Awards are classified into two C...

Guide to draft a RTI

Drafting a good RTI application can be as easy as writing a simple leave letter. As long as the applicant knows the basics of the RTI Act 2005, drafting an application, requesting for information from any public authority, is little more than child’s play. 1. Pre-requisites: Your full name and address have to mentioned in the application. If you so wish, you can also mention your telephone number and email id, although this is optional. Have ready information about the Public Information Officer (PIO), his designation, address etc. In case you have problems locating your PIO/APIO you can address your RTI application to the PIO C/o Head of Department and send it to the concerned Public Authority with the requisite application fee. The Head of Department will have to forward your application to the concerned PIO. Do not address your RTI application to the PIO by his name, just in case he gets transferred or a new PIO is designated in his place. 2. Preparing to draft a RTI appli...