Cyber security is in discussions and news these days. Two important events related to this happened last week - China's military hackers attacked the computer system of the Western governments and the American Air Force formed the organization named Cyber s Space Command.
It will be said coincidentally that both incidents took place at the same time, but they can be estimated in the twenty-first century by the reality and horrors of the hazards associated with the cyber system. Today, the scope of cyberspace is increasing in everyday practice. Governments are increasingly using it in expanding the administration, administration, education, communications and information. On the other hand, the militant groups are using cyber technology for their propaganda, coordination with various groups and meaning management
Looking at this kind of cyber tech misuse, experts are still worried. Everybody using a computer today knows about the attack of computer viruses. When this threat is large, it can be easily understood about its horrors and adverse effects.
Today all the services related to general life, apart from railways, airlines, banks, stock markets, hospitals, are connected with computer networks, many of them are completely dependent on the internet, if their networks are tampered with So what can be the result, not to make this statement, but to understand it is a matter of understanding.
Now the work and administration of the military establishment has also been connected with the computer network. Obviously this area is not left untouched by cyber terror. Therefore, experts of information technology are very concerned about cyber security.
Cyber space is an area where government of any country can be disturbed without any bloodshed. Terrorists can remove important information from the computer through cyber and use it to threaten and inhibit the services.
Generally, the small crimes of cyber crime that are commonly found are often meant to have fun or mislead by the youth or students, but if these methods are used extensively by militant groups Heavy problems will arise.
It is true that no major terrorist incidents related to cyber has yet come to light, but this does not mean that one can apply from a simple case of the coming days. In 1998, a twelve year old boy hacked the computer system of Theodore Roosevelt Dam in Arizona, USA, and established control over it.
Through this system flood control and gate of the dam were operated. Now if he wanted the hacker he could never open the dam's gate and it was not necessary to tell how large a population could be destroyed.
Today, there are strong intelligence reports that many dangerous terrorist organizations such as al-Qaeda are in the midst of spreading panic across the world through cyberspace. The dangers of on-line terrorism were identified by then U.S. President Bill Clinton in 1996, and he then formed the Critical Infrastructure Protective Commission to deal with this challenge.
An important aspect of the infiltration of terrorism in cyberspace is that in future wars and conflicts it can emerge as a frightening reality. Cyber terrorists can exploit the network using the tools and modes of new communication technology, with hacking, computers can be infected with massive viruses, interfere with online network services.
Not only this, they can also interfere with important e-mails of governments and establishments. Any computer hacker can interfere with terrorists and execute any dangerous incident related to cyber. As the true world exposed read-written subject matter experts in that terrorism bloody game, IT and medical promising youth have also joined, then used his talents in civilian and military cyber networks Can be easily done in piercing.
Well now all military organizations around the world connect with the Internet any way they use your information to use a simple way to avoid cyber attacks, but the system is not impervious. Armies are increasingly dependent on the Internet in peace and in the war, to execute their campaigns.
Taking serious note of cyber terrorism and related crimes today, the United States has set up a cyber space command and has tightened its grip on the new century's challenge. Nation like India also needs such arrangements to chalk out its security system. Fortunately, there are many IT experts in India, whose services can be taken to deal with the challenge of cyber terrorism.
Government should see to the safety of the civilian and military sector, to prepare a policy and action plan, so while it could be dealt with prospects of IT crimes and terror of cyber.
An important aspect of the infiltration of terrorism in cyberspace is that in future wars and conflicts it can emerge as a frightening reality. Cyber terrorists can exploit the network using the tools and modes of new communication technology, with hacking, computers can be infected with massive viruses, interfere with online network service
By- ABHISEK ROY
Comments
Post a Comment