Cyber Security and Cyberwar threat


Threat of Cyber ​​War


Reference

Cyber Security and Cyberwar threat
Cyber Security and Cyberwar threat 



From time to time, there is a discussion in the media that a certain website has been hacked or that a certain website has been taken over by hackers from China or Pakistan and made inactive for some time. Recently, there was news of the website of the ruling party BJP being hacked in the country...and not much time has passed since the UPSC website was also hacked. Such cyber-attacks are increasing continuously in India.

Recently, after the Pulwama terrorist attack, an Indian hacker group launched a major cyber attack on Pakistan. Indian hackers had hacked more than 200 Pakistani websites. On opening these websites hacked by Team I-Crew, messages paying tribute to the martyrs and a burning candle were visible there. Earlier, immediately after the Pulwama attack, there was news that Pakistani hackers had hacked at least 90 websites related to the Indian government. Among these, websites related to financial operations and power grids were particularly targeted by hackers.


What is a cyber attack?


The phrase 'cyber attack' is used to describe attacks carried out through the Internet in terrorist activities. These include deliberate large-scale disruption of a computer network, especially a personal computer connected to the Internet, through means such as computer viruses. Cyber ​​attack can be defined more generally as a computer crime... Targeting and damaging a computer network without harming real-world infrastructure, property, and anyone's life. This is also called hacking.


What is hacking?


Hacking is a process in which the hacker steals another person's information without his permission. To do this, he hacks that person's personal information by breaking into it. Hacking is considered illegal, but sometimes hacking is also done for good work. Through this many types of crimes are committed by cyber criminals.


Who is a hacker?

Most people do not know who a hacker is and what he does...how he does it. Actually...when most hackers start hacking, they do it as a hobby, money is not the main motive behind it. Due to the desire to make a mark among other hackers or the competition to prove themselves better than others, they get involved in hacking. Hacking also starts due to taking control of the power of technology. Although the hacker knows everything about what is right and what is wrong, despite this they are engaged in this work. Due to a lack of social acceptance or to look weak for some reason, youth also step into the field of hacking.


Three types of hackers


White hat hacker: Hackers falling in this category do good work, that is, they are appointed for the safety of people. They are kept by the government or any organization. They are also known as ethical hackers.


Black hat hackers: These hackers are also called crackers. They do illegal work by misusing their skills. Such as stealing someone's personal information, hacking someone's account, and using that information to earn money online.


Grey hat hackers: Hackers of this category are a mixture of black and white, who do good work for some time and sometimes do illegal work.

What is phishing?


It is called online fraud in Hindi. Under this, criminals send fake emails or messages through phishing, which is similar to any reputed company, bank, credit card, or online shopping. If caution is not taken, then getting caught in their trap is certain. The purpose of these fake emails or messages is to steal people's personally identifiable information. This includes the personal information of a person, which includes name, email, user ID, password, mobile number, address, bank account number, ATM/debit or credit card number PIN number date of birth, etc.

What is Ransomware?

Ransomware is a type of ransom software. It is made in such a way that it encrypts all the files of any computer system. As soon as this software encrypts these files, it starts demanding ransom and threatens that if a certain amount is not paid, it will corrupt all the files of that computer. After this, the computer user cannot access these files until he pays the amount demanded in ransom. This type of virus can be delivered by downloading a file from a suspicious place.

Hacking of important government websites


About 6 years ago, Edward Snowden provided a statistic. It was told that hackers sitting outside had accessed 6.3 billion intelligence information of Indians. Today the situation is such that cyber attacks have been made on computers of our Prime Minister's Office, Ministry of Defense and Foreign Affairs, Indian Embassies, Missile Systems, NIC, and CBI. Government institutions of India are not safe from cyber attacks. Actually, the government and the corporate world do not have any special information about the dangerous methods being adopted by hackers. After loading anti-virus and firewall software, most departments and corporate companies in India do not know anything about this.

Post a Comment

Previous Post Next Post