Cyber Security India

Topics: Security, National security, Information security Pages: 19 (5999 words) Published: September 18, 2013
Cyber Threats: An Evolving and Pernicious Global Menace
Facts and figures
After China and the U.S., India has the highest number of Internet users. There are also an estimated over 381 million mobile phone subscriptions with Internet connectivity. In the list of online infection risk India ranks 9th and in personal computer across the globe, India ranks 7th. •A recent survey by McAfee named India next to Brazil, Romania and Mexico the least able to defend against cyber attacks. •Cyber security threats and hacking attempts in India rose to 22,060 in 2012 from 23 in 2004 What it means

Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Cyber Threats

Cyber threats can be disaggregated, based on the perpetrators and their motives, into four baskets: cyber espionage, cyberwarfare, cyberterrorism, and cyber crime. Cyber Warfare - attacking the information systems of other countries for espionage and for disrupting their critical infrastructure.

Why Cyber Security is needed
Third most populous country after China and India is not any geographical entity but a ‘virtual state’ called facebook! •The same computing DNA that produced the communications revolution has also created acute vulnerabilities - and attractive terror targets - for societies that depend on cyberspace for national security and economic survival. •The growing dependency on the information technology (IT) makes cybersecurity a vital component of the India’s national security infrastructure. Lately, data collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are increasing in huge numbers and make cyber attacks easily to occur. •Considered the newest domain in modern warfare, cyberspace has now joined the ranks of traditional areas assessed by militaries all over the world. And this is exactly how cyberspace should be assessed, since an effective terrorist attack against a nation’s power grid, for example, could result in massive loss of life, crippling damage to infrastructure and a blow to the economy that could take years to repair. Stuxnet has carried out what in the past could only be accomplished by directly bombing a country’s infrastructure or sending in human agents to plant explosives. •It can affect Infrastructures like banking system, air traffic control, power infrastructure and gas pipelines. •Destruction now can bypass the military force and attack via “cyber-brute-force” suppressing a country’s military control systems, navigation, communication system, shutting down or paralysing critical infrastructure and affecting the country’s economy, cyber-weapons linking nuclear weapons •Most common usage of Internet is by designing and uploading websites on which false propaganda can be pasted. This comes under the category of using technology for psychological warfare. •The web can promote and support acts of terrorism by means of propaganda, promotion, instructional dissemination and execution, financing, training, recruiting and can also facilitate specific attacks. •Non-state actors have the technology to create cyber attacks or endanger the cyber environment of the global socio-political system. The 2011, Arab Spring revolution in Tunisia, Egypt, and Libya was successful to use cyberspace to pass its message. •Threats abound: cyber crime, cyber espionage, cyber war and cyber terrorism, all represent genuine risks to nations, firms and individuals around the world. Experts reckoned it is a matter of time before cyberspace becomes an “independent theatre of war”. •With the rapid march of technology, such attacks will only become more widespread as the use of Internet for manipulating things increases. “We have now entered into a...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cyber Security Essay
  • cyber security Research Paper
  • Essay on Cyber Crime and National Security
  • Cyber Security Essay
  • Cyber Crime and Security Essay
  • cyber crime Essay
  • cyber security Essay
  • cyber security vulnerabilities Essay

Become a StudyMode Member

Sign Up - It's Free