Preview

Cyber Security India

Powerful Essays
Open Document
Open Document
5999 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security India
Cyber Threats: An Evolving and Pernicious Global Menace
Facts and figures
• After China and the U.S., India has the highest number of Internet users. There are also an estimated over 381 million mobile phone subscriptions with Internet connectivity. In the list of online infection risk India ranks 9th and in personal computer across the globe, India ranks 7th.
• A recent survey by McAfee named India next to Brazil, Romania and Mexico the least able to defend against cyber attacks.
• Cyber security threats and hacking attempts in India rose to 22,060 in 2012 from 23 in 2004
What it means
• Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
Cyber Threats
Cyber threats can be disaggregated, based on the perpetrators and their motives, into four baskets: cyber espionage, cyberwarfare, cyberterrorism, and cyber crime.
Cyber Warfare - attacking the information systems of other countries for espionage and for disrupting their critical infrastructure.

Why Cyber Security is needed
• Third most populous country after China and India is not any geographical entity but a ‘virtual state’ called facebook!
• The same computing DNA that produced the communications revolution has also created acute vulnerabilities - and attractive terror targets - for societies that depend on cyberspace for national security and economic survival.
• The growing dependency on the information technology (IT) makes cybersecurity a vital component of the India’s national security infrastructure. Lately, data collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are increasing in huge numbers and make cyber attacks easily to occur.
• Considered the newest domain in modern warfare,

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    4. CYBERSECURITY. Cyber threats have amplified with the globalization of digital communications, increased reliance on computer networks, and convergence of technology. Cyber threats have also evolved. The risk is no longer from sophisticated nation states, but also from hackers, criminals, and terrorists.…

    • 798 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Best Essays

    1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    References: Vugrin, E. D., & Turgeon, J. D. (January 01, 2013). Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments. International Journal of Secure Software Engineering (ijsse), 4, 1, 75-96.…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    According to Cassim, “Cyber Terrorism is defined as a premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in the furtherance of such objectives” (p384). Cyber space is considered the best place for criminals and their peers to gather and discuss their next move (Cassim2012). With technology on the rise, the web has become the prime place for fights to break out, but not all cyber threats are necessarily terrorism…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Good Essays

    The global cyber security market is dominated by North America, with the US being the largest defense spender in the world; overall, North America is set to spend US$93.6 billion on cyber security during the forecast period. Despite the scheduled budget cuts, Europe represents the second-largest market, with the total cyber security market valued at around US$24.7 billion, offering a potentially attractive investment opportunity for suppliers. Asia-Pacific is projected to spend an estimated US$23.2 billion on cyber security during the forecast period, followed by the Middle East and Latin America with US$22.8 billion and US$1.6 billion respectively.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Recently the terms "governance" and "good governance" are being increasingly used in development literature. Bad governance is being increasingly regarded as one of the root causes of all evil within our societies. Simply put "governance" means: the process of decision-making and the process by which decisions are implemented (or not implemented).…

    • 6489 Words
    • 21 Pages
    Powerful Essays

Related Topics