Skip to main content

CYBER CRIME IS AN INTERNATIONAL TERRORISM

tellmethetruth298.blogspot.in


Cyber ​​security is in discussions and news these days. Two important events related to this happened last week - China's military hackers attacked the computer system of the Western governments and the American Air Force formed the organization named Cyber s Space Command.

tellmethetruth298.blogspot.in
It will be said coincidentally that both incidents took place at the same time, but they can be estimated in the twenty-first century by the reality and horrors of the hazards associated with the cyber system. Today, the scope of cyberspace is increasing in everyday practice. Governments are increasingly using it in expanding the administration, administration, education, communications and information. On the other hand, the militant groups are using cyber technology for their propaganda, coordination with various groups and meaning management

tellmethetruth298.blogspot.in
Looking at this kind of cyber tech misuse, experts are still worried. Everybody using a computer today knows about the attack of computer viruses. When this threat is large, it can be easily understood about its horrors and adverse effects.

tellmethetruth298.blogspot.in
Today all the services related to general life, apart from railways, airlines, banks, stock markets, hospitals, are connected with computer networks, many of them are completely dependent on the internet, if their networks are tampered with So what can be the result, not to make this statement, but to understand it is a matter of understanding.

tellmethetruth298.blogspot.in
Now the work and administration of the military establishment has also been connected with the computer network. Obviously this area is not left untouched by cyber terror. Therefore, experts of information technology are very concerned about cyber security.

tellmethetruth298.blogspot.in
Cyber ​​space is an area where government of any country can be disturbed without any bloodshed. Terrorists can remove important information from the computer through cyber and use it to threaten and inhibit the services.

tellmethetruth298.blogspot.in
Generally, the small crimes of cyber crime that are commonly found are often meant to have fun or mislead by the youth or students, but if these methods are used extensively by militant groups Heavy problems will arise.

tellmethetruth298.blogspot.in
It is true that no major terrorist incidents related to cyber has yet come to light, but this does not mean that one can apply from a simple case of the coming days. In 1998, a twelve year old boy hacked the computer system of Theodore Roosevelt Dam in Arizona, USA, and established control over it.

tellmethetruth298.blogspot.in
Through this system flood control and gate of the dam were operated. Now if he wanted the hacker he could never open the dam's gate and it was not necessary to tell how large a population could be destroyed.

tellmethetruth298.blogspot.in
Today, there are strong intelligence reports that many dangerous terrorist organizations such as al-Qaeda are in the midst of spreading panic across the world through cyberspace. The dangers of on-line terrorism were identified by then U.S. President Bill Clinton in 1996, and he then formed the Critical Infrastructure Protective Commission to deal with this challenge.

tellmethetruth298.blogspot.in
An important aspect of the infiltration of terrorism in cyberspace is that in future wars and conflicts it can emerge as a frightening reality. Cyber terrorists can exploit the network using the tools and modes of new communication technology, with hacking, computers can be infected with massive viruses, interfere with online network services.

tellmethetruth298.blogspot.in
Not only this, they can also interfere with important e-mails of governments and establishments. Any computer hacker can interfere with terrorists and execute any dangerous incident related to cyber. As the true world exposed read-written subject matter experts in that terrorism bloody game, IT and medical promising youth have also joined, then used his talents in civilian and military cyber networks Can be easily done in piercing.


tellmethetruth298.blogspot.in
Well now all military organizations around the world connect with the Internet any way they use your information to use a simple way to avoid cyber attacks, but the system is not impervious. Armies are increasingly dependent on the Internet in peace and in the war, to execute their campaigns.

tellmethetruth298.blogspot.in
Taking serious note of cyber terrorism and related crimes today, the United States has set up a cyber space command and has tightened its grip on the new century's challenge. Nation like India also needs such arrangements to chalk out its security system. Fortunately, there are many IT experts in India, whose services can be taken to deal with the challenge of cyber terrorism.

tellmethetruth298.blogspot.in
Government should see to the safety of the civilian and military sector, to prepare a policy and action plan, so while it could be dealt with prospects of IT crimes and terror of cyber.
An important aspect of the infiltration of terrorism in cyberspace is that in future wars and conflicts it can emerge as a frightening reality. Cyber terrorists can exploit the network using the tools and modes of new communication technology, with hacking, computers can be infected with massive viruses, interfere with online network service
   By- ABHISEK ROY

Comments

Popular posts from this blog

what is ransomeware attack

Ransomware Attack is a cyber attack in which a malicious software (virus software with a virus file) enters someone's computer via web / internet and locks its entire system. This computer virus is so dangerous that you can not retrieve your data in any way if you do not pay money to unlock your system. This Ransomware Virus Attack lets you drive every single drive on the computer, which you can not use until you pay the ransom money. The computer that comes under the ransomware is always in front of the computer where the message of payment to unlock continues. Ransomware Attacks are the most viewed in Russia, but now it is slowly spreading around the world. This is a big problem, which, when small mistakes, takes the computers from big corporations to government offices in its grip. This has made it very difficult for big banks too. Ransomware Virus Attack in Mobiles Ransomware was used earlier in the Pcs / computers but now as the era of smartphones is going on

how to find spy camera or hidden camera

The incident of making the mms by spy cameras at the bedroom in the present time is coming very fast. If you visit any porn site, you can see more than 50 percent of videos are mms. Whether it is hidden in a hotel room or in a bedroom or bathroom, or in a cloth changing room in a shopping mall .Especially if I talk about India, then India is moving towards the same level with other countries to build this mms .In recent times, an incident has come up in front of a CC camera from the Cloth Changing Room in Goa's shopping mall. Which was fitted in the changing room of the women.CC camera or spy cameras were made to improve mankind.Cameras have become portable, battery-operated, and tiny and almost all smartphones, with at least two of them. Micro cameras are also available, a grain of rice becomes smaller and can help in your medical progress to enter your blood vessels and inside. However, the small camera can easily reveal one's privacy.It is kept hidden in the room so tha

what is malware? do you know?

Some of the viruses that come in the memory card and pen drive in the computer, some viruses are normal and there are some viruses that can cause major damage to our computer.One such virus is Malware. It is like saying FATHER OF THE COMPUTER VIRUSES. This virus is so strong that  can steal all your stuff from your computer, run your computer on your own, and remove all the important things at any time from your computer. There are many types of MALWARE .Let's say the first of these 1. CRITRONI  - This is the most dangerous virus by which, hackers can steal all the information of your computer,they can shut down your entire system at any time ,Make your system mortgage and ask for money from you for restart your system. 2. CRYPTOWALL - It can also shut down your system like CRITRONI .He can steal all your information and share it with others. Once again your information is on your computer but without the permission of the hacker you can not open or use it or hacker