...12/31/13 Cyber Terroism Cyber terrorism is a combination of two terms Cyber and terrorism. The word "Cyber" is derived from "cybernetic", a word from Greek "kybernetes", meaning "To steer" and the term "terrorism" comes from French terrorisme, from Latin word 'terror', "great fear", "dread", related to the Latin verb terrere, "to frighten". Cyber terrorism denotes unlawful attacks and threats of attack against computers, networks and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious agendas. These attacks result in violence against persons or property or cause public unrest. Few examples could be explosions, plane crashes and severe losses. Terrorists are known to use internet to prepare the schemes, raise funds and spread cyber terrorism. For instance, Razmi Yousef who was a key person behind World Trade Centre attack had details schemes to destroy United States airliners encrypted files in his laptop computer. We know that Cyber terrorism is the crime that has emerged in recent times, to use the medium of Internet to terrorize the minds of citizens. Admirably, the Laws through the implementation of the Information technology Act, 2000, is one of the efficient steps taken towards the creation of punishment of these kinds of crimes. There is need of innovative laws and global standards on preventive action. The Indian Information Technology Amendment Act 2008 lays down Section 66F...
Words: 4466 - Pages: 18
...Communications and Information Technology Government of India Electronics Niketan, Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘grai@mit.gov.in’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement...
Words: 7888 - Pages: 32
...Computer Worm: Harbinger of an Emerging Warfare Capability Summary In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide. From the perspective of many national security and technology observers, the emergence of the Stuxnet worm is the type of risk that threatens to cause harm to many activities deemed critical to the basic functioning of modern society. The Stuxnet worm covertly attempts to identify and exploit equipment that controls a nation’s critical infrastructure. A successful attack by a software application such as the Stuxnet worm could result in manipulation of control system code to the point of inoperability or long-term damage. Should such an incident occur, recovery from the damage to the computer systems programmed to monitor and manage a facility and the physical equipment producing goods or services could be significantly delayed. Depending on the...
Words: 5499 - Pages: 22
...RN KAO MEMORIAL LECTURE BY SHRI NARESH CHANDRA India’s Security Challenges in the next decade – Role of Intelligence I feel greatly honoured and privileged to have been asked to deliver the R. N. Kao Memorial Lecture this year. I believe, it is the sixth in the series started in 2007 by Shri Tharakan, the then Secretary, R&AW . It feels good to be following the five distinguished speakers who have delivered the lecture in previous years. Before this distinguished gathering, it is hardly necessary to enumerate the achievements of Shri Ramji Kao, one of the most celebrated civil servants of our time and the architect of our secret service. He was given charge of organizing the R&AW in September, 1968. Shri Kao had been associated with the creation of the Aviation Research Centre after 1962. He was able to set up and harness the capacities for both human and technical intelligence so successfully that within a period of less than three years, the Organisation was able to make a most valuable contribution to our triumph in the 1971 conflict. He is recognized as a father figure and role model for all officers, young and old, in the R&AW and the Directorate General of Security. As a person Shri Kao had an elegant and striking presence. He was measured and precise with his words yet had a keen sense of humour, an amazing human touch and a love for arts. A significant feature of Shri Kao’s vision for the R&AW was to lay strong emphasis on the quality of manpower...
Words: 5434 - Pages: 22
...Auditing Standards” By -- Ms.Puja S Mandol and Ms. Monika Verma Supreme Audit Institution of India Introduction The use of computers and computer based information systems have pervaded deep and wide in every modern day organization. An organization must exercise control over these computer based information systems because the cost of errors and irregularities that may arise in these systems can be high and can even challenge the very existence of the organization. An organizations ability to survive can be severely undermined through corruption or destruction of its database; decision making errors caused by poor-quality information systems; losses incurred through computer abuses; loss of computer assets and their control on how the computers are used within the organization. Therefore managements across the world have deployed specialized auditors to audit their information systems to find out gaps between declared policies and actual use and shortcomings in the information system design and usage. Information Systems Audit is the process of collecting and evaluating evidence to determine whether a computer system has been designed to maintain data integrity, safeguard assets, allows organizational goals to be achieved effectively and uses the resources efficiently. The IS Auditor should see that not only adequate internal controls exist in the system but they also wok effectively to ensure results and achieve objectives. Internal controls should...
Words: 6839 - Pages: 28
...Association Permission to reproduce any text from this publication for non-commercial purposes is granted, provided that the source is credited. First edition, autumn 2013 www.artemis-ia.eu & www.itea2.org ISBN: 978-90-817213-2-5 5 Preamble This updated document1 is the joint result of the industry represented in the ARTEMIS Industry Association and ITEA and expresses the common industry ambition. Its creation was initiated by the ARTEMIS ITEA Cooperation Committee (AICC). The main goal of this update of the ITEA-ARTEMIS high-level vision 2030, version 2012 is to add a quantitative description of the impact of software innovation on revenues and labour. There are also other aspects of the impact of software innovation, like eco-systems, community building and standardisation. However these are not the focus of this year’s update. Disclaimer The trends and predictions presented in this document are based on publicly available sources. We rely on these sources, without independent verification of the information presented. The nature of this document is for a large part rather a compilation of existing material, than a reinvention of insights. The statements made by Roland Berger Strategy Consultants are based on assumptions held to be accurate on the basis of the information available. However, Roland Berger Strategy Consultants assume no liability for the correctness of the assumptions made herein. 1 Compared to the ITEA-ARTEMIS high-level vision 2030, version...
Words: 19271 - Pages: 78
...http://en.wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a...
Words: 6044 - Pages: 25
...E-BANKING E-BANKING Group 14 Section3 Group 14 Section3 Table of Contents ABSTRACT 4 INTRODUCTION 4 BRIEF HISTORY OF E-BANKING IN INDIA 5 HOW DOES IT WORK? 5 LITERATURE REVIEW 6 Need for E-banking: 7 Advantages and Benefits of E-Banking: 7 Drawbacks: 8 E-banking in Rural India 9 Online Trading 10 Traditional Trading Vs Online Trading 10 Online Bill Payment 11 Frauds 12 Phishing 12 Trojan Horse 13 Preventive measures 13 OTP 13 Hardware Tokens 13 Smart Card and USB Tokens 13 RECOMMENDATION 14 Access Control 14 Firewalls 14 Isolation of Dial up Services 14 Security Log (audit Trail) 14 Back up & Recovery 14 Approval for I-banking 14 FUTURE SCENARIO 15 Cyber Crime 15 Real Time Gross Settlement System (RGTS) 15 Wireless Application Protocol (WAP) 16 Mobile Banking: 17 Direct Benefit Transfer 21 ABSTRACT With rapid advances in technology, changing according to modern times has become a prerequisite to survive in this highly competitive world. As people are becoming increasingly aware of the consequences of their financial decisions, their needs and expectations have rose to high levels. Banking institutions are facing competition not only from each other but also from non-bank financial intermediaries as well as from alternative sources of financing. Almost everything is available to the customer at his/her doorstep and is just a click away. All this cannot be done with the facility of online...
Words: 4291 - Pages: 18
...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...
Words: 8586 - Pages: 35
...Print Media Vs Electronic Media We are living in a rapidly developing and modernized era where technology is taking charge in every walks of our life. This technology may come with many advantages and disadvantages as well. Every development is due to rapid modernization, improvement of old administration methods and the use of new technology to make things even better. However with the growing modernization human demand for knowledge is also increasing. Media serves an important role in keeping people informed about the events and innovations around the globe. This information may reach us in two forms, either through print media which is the oldest method, or the other one can be electronic media. With the improvement of electronic media during past few years and daily reports on achievements, electronic media has dominated over print media during past few years. Print media is the oldest form of Mass Media, and still not outdated. Daily about 70% of people start their day by reading newspaper, which is the oldest media around the world. Newspaper gives us information about whole world within few minutes of reading session, with a choice to skip the topics that we are not really interested about. Print Media still forms an important part of Media Industry which has been given a competition by electronic media and a new technology called e-newspaper applications. But still newspaper holds its value even today and is competing strongly with technology backed media. Basically...
Words: 2974 - Pages: 12
...way to do it in the traditional system. However, instead of printing out the data on paper in tradition, the system has to build an electronic file or database to store those data. In the case of companies who already use computer to issue their documents like purchase orders, they may already have some sort of databases which store those information, then they fan start with the next step described below. 2. Outbound translation The next step is to translate the electronic file or database in to a standard format according to the specification of the corresponding document. The resulting data file should contain a series of structured transactions related to the purchase order for example. If more than one company is involved in the particular transaction, individual files should be produced for each of them. 3. Communication Then the computer should connect and transmit those data files to the pre arranged Value Added Network [VAN} automatically. The VAN should then process each file and route the appropriate electronic mailboxes according to the destination set in the file. 4. Inbound translation The designated company should be able to retrieve the file from their electronic mailboxes in a constant period, and then reverse the process by translating the file from the standard format into the specific format required by the company’s application software. 5. Processing the electronic documents The internal application system of the designated company can...
Words: 2269 - Pages: 10
...cost-effective products and services, provide faster, efficient and convenient customer service and thereby, contribute to the overall growth and development of the country. Technology enables increased penetration of the banking system, increases cost effectiveness and makes small value transactions viable. Besides making banking products and services affordable and accessible, its simultaneously ensures viability and profitability of providers. Technology allows transactions to take place faster and offers unparallel convenience through various delivery channels. Technology enhances choices, creates new markets, and improves productivity and efficiency. Effective use of technology has a multiplier effect on growth and development. In the area of payment systems, there have been significant advancements of technology on the customer transactions. India is one of the country that has effectively tackled huge volumes of paper instruments in cost effective manner. The Magnetic Ink Character Recognition (MICR) cheque clearing System, cheque transaction system(CTS) is another innovative solution that has been developed to enhance the efficiency of paper-based clearing system. CTS has eliminated the need for physical movements of cheques. The National Electronic Clearing System (NECS), with its centralized processing capability coupled with the implementation of CBS has brought down the clearing and settlement cycle. Electronic Fund...
Words: 3234 - Pages: 13
...V.Srikanth & Dr.R.Dhanapal A Business Review of E-Retailing in India V.Srikanth Assistant Professor / MCA Dept PES Institute of technology, Bangalore-560085, India vedanthamsri@yahoo.co.in Dr.R.Dhanapal Professor, Department of Computer Applications Easwari Engineering College, Ramapuram Chennai - 600089, Tamilnadu, India drdhanapal@gmail.com Abstract As a professor in computer science I am very much interested in training my students in e-Commerce and prepared myself for an in depth research in this area and to present a quick journal about e-Retailing concepts / framework, how an organization can start e-Retailing business quickly. Its Pro’s & Con’s, how to make the e-Retailing venture successful. How retailers should plan / experience to achieve varying success by leveraging the internet technology. How to incorporate traditional retails practices with Internet technology. And strive for success in India. How internet is used by users and its use for online shopping. It serves as a best article for all the readers across the globe. Keywords: E-Retailing,E-tailing, E-Commerce, Online Store, Retail, E-Business. 1. INTRODUCTION E-Commerce is a huge domain on conducting business over internet and e-retailing is part of it. When we discuss on digitally / Internet enabled commercial transactions between organizations and individuals using latest web technologies as per the policies of the Organization it takes the form of e-business. Nowadays, 'e' is gaining...
Words: 4303 - Pages: 18
...Case Studies Case I THE STRATEGIC ASPIRATIONS OF THE RESERVE BANK OF INDIA The Reserve Bank of India (RBI) is India's central bank or 'the bank of the bankers'. It was established on April 1, 1935 in accordance with the provisions of the Reserve Bank of India Act, 1934. The Central Office of the RBI, initially set up at Kolkata, is at Mumbai. The RBI is fully owned by the Government of India. The history of the RBI is closely aligned with the economic and financial history of India. Most central banks around the world were established around the beginning of the twentieth century. The Bank was established on the basis of the Hilton Young Commission. It began its operations by taking over from the Government the functions so far being performed by the Controller of Currency and from the Imperial Bank of India, the management of Government accounts and public debt. After independence, RBI gradually strengthened its institution-building capabilities and evolved in terms of functions from central banking to that of development. There have been several attempts at reorganisation, restructuring and creation of specialised institutions to cater to emerging needs. The Preamble of the RBI describes its basic functions like this: '...to regulate the issue of Bank Notes and keeping of reserves with a view to securing monetary stability in India and generally to operate the currency and credit system of the country to its advantage.' The vision states that the RBI '...aims...
Words: 6979 - Pages: 28
...Chapter 1 INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become...
Words: 14728 - Pages: 59