send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
Context: The 21st century is going to be an era of data revolution wherein almost all the activities would be carried on in cyberspace. This calls for creating some global rules to protect cyberspace as their absence has failed to prevent cyberattacks even on powerful countries like the U.S. Background
Reasons behind Cyberattacks
Economic Benefits: A cyberattack gives a hacker access to critical economic data that can be sold for millions in the grey market.
Ideological Conflict: The free and decentralised structure of cyberspace goes against the ideology of authoritarian countries like Russia and China. This induces them to launch attacks on democratic countries like U.S and India. They have also built firewalls to protect their societies from freedom.
Geopolitical Interest: One country attacks another country’s data to serve its geopolitical interest in the region. The attack is aimed to cripple the governance structure in another country and induce it to act in a favourable way.
Factors fueling Cyberattacks
Synergy between State and Non-State Actors: Rogue states and well-organised digital terrorist groups use footloose hackers to invade diplomatic and strategic plans.
Traceability: The advancement in technology has made the traceability of hackers very difficult.
Road Ahead
By: Shubham Tiwari ProfileResourcesReport error
Access to prime resources
New Courses