send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
Cyber warfare involves units which are organized along nation-state boundaries, in offensive and defensiveoperations, using computers to attack other computers or networks through electronic means.Hackers and other individuals trained in software programming and exploiting the intricacies ofcomputer networks are the primary executors of these attacks.
These individuals often operateunder the auspices and possibly the support of nation-state actors. Thus Cyber warfare simply involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks.
Cyber-warfare involves the following attack methods:
• Sabotage: Military and financial computer systems are at risk for the disruption of normal operations and equipment, such as communications, fuel, power and transportation infrastructures.
• Espionage and/or security breaches: These illegal exploitation methods are used to disable networks, software, computers or the Internet to steal or acquire classified information from rival institutions or individuals for military, political or financial gain.
As per a report by Indian Computer Emergency Response Team (CERT-In), cyber-attacks on India increased from about 13,000 in 2011 to 62,000 till mid-2014, with most originating from cyber space of a number of countries including the US, Europe, Brazil, Turkey, China, Pakistan, Bangladesh, Algeria and the UAE.
The cyber-attacks have increased because:
• It is being considered as a legitimate mode of attrition between nations.
• With cyberspace all set to become the fifth dimension of warfare, countries around the world are busy preparing to face the threat of cyber war where attackers remain incognito.
• Anonymity is perhaps the biggest advantage associated with cyber-attack.
• A cyber weapon is an intellectual property (IP) which can be used in peace time and during war time. These weapons largely depend upon Zero Day exploits and vulnerabilities, and have limited shelf life.
Factors contributing/aggravating rise of cyber attack
The rapid evolution of threats, from non-state actors and at the behest or in some cases directly by state actors, has resulted in a global cyber pandemonium.
The scenario has been further aggravated by the global incoherence of domestic and international cyber laws in relation to law enforcement model and most importantly non-availability of a global treaty, especially for issues relating to law of war model.
At present, there are no formal rules of engagement in cyber warfare at either international or multi-lateral levels.
Thus bBy all means, the stunning and crippling effect of cyber invasion could be a nightmare for security agencies and military establishments as cyberspace remains a “borderless and impersonal entity”. Clearly and apparently, cyber spies have no physical boundaries to negotiate while giving a practical shape to their “evil designs”.
Satellites designed for communications, navigation, earth observation and many other end-uses could be paralysed and put out of commission through manipulation and degradation of their software. Hence a strong security system is needed to save the strategic infrastructure from cyber-attack. Case study of China
The Chinese feel that getting information dominance is a key component for attaining victory in a war. As part of its offensive approach, China is busy building the capability to combine computer network attacks, electronic warfare and kinetic warfare strategy with a view to paralyse communications systems and information systems of the targeted adversary and create vulnerable blind spots that can be exploited to stay at the winning edge of the battlefield.
Recent initiatives for tackling cyber warfare
• DRDOhas been developing capabilities to produce robust high grade cryptographic devices based on indigenously developed cryptographic algorithms and indigenously architected high assurance platforms; and capabilities to develop advanced architectures for LAN and WAN security to safeguard information systems to counter external and internal threats has been developed. For the near term risk mitigation, DRDO works on the approach of development of software-based security systems running on COTS computing platforms.
• Government has signed Memorandum of Understandings between Indian Computer Emergency Response Team withMalaysia,Singapore and Japan. The MoUs related to Cyber Security will
a) Promote closer cooperation for exchange of knowledge and experience in detection, resolution and prevention of security related incidents between India and respective country.
b) Each signatory country will share knowledge and experience in resolution, detection and prevention of security related incidents between India and the respective country.
• CERT-In is nodal department under the aegis of Union Ministry of Communications and Information Technology that deals with cyber security threats like hacking and phishing in India.
Way ahead
In recent years, software and hardware producers have begun to make their products more secure. Stronger operating system kernels, faster anti-virus software and virus detection, tougher firewalls and Internet browsers—are just some of the steps taken to help cut down on the vulnerabilities present in today’s network architecture.
But the partnership of Government and Private Sector continue to be necessary step needed because the majority of the country’s cyber resources are controlled by entities outside of government.
The private sector’s profit incentive and the government’s lack of technical expertise stands in the way of either one of these organizations “going-it-alone” on the issue of cyber security.
Thus a long-lasting and functional partnership between government and the information technology industry, facilitated by the Government of India, will help make cyber space more secure.
There is also a need to increase the number of cyber security experts and IT security auditors, in which the country is facing a crisis at present.
Also, India’s legal system needs to be upgraded towards enhanced cyber laws as its present form is still dwelling on the IT Act 2000, IT Amendment Bill 2006 and IT Amendment Bill 2008 which are unable to cover all forms of the problem in a field which is racing ahead every single day.
India is fortunate to have pool of talent in the private IT sector which can be fruitful if used in the proper way. The experts of cyber security in the private sector can be invited to train the government cyber security professionals and can help in conducting security drills from time to time in the government and other cyber networks of the country.
By: Priyank Kishore ProfileResourcesReport error
Access to prime resources
New Courses