Loading...

Articles on Cyber Security

Achievements

Achievements:

  • Developed “SEDULITY OPERATING SYSTEM” on LINUX Platform along with different flavors.

Let’s consider the following scenario. A very large public utility with several nuclear power plants experiences a minor glitch with no real consequences. One evening, a hacker in the employ of an anti-nuclear activist group, using information provided by a disgruntled employee, gains access to the utility’s network, searches file servers until he finds one at the nuclear plant, and, after compromising it, locates copies of several of the lessons-learned memos. The Hacker delivers the memos to his employers who doctor them up a bit and deliver them with a strongly worded press release to a local reporter who has made a life-long career out of bashing the nuclear industry. Imagine the potential public relations consequences.

Social Engineering is the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action. Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. The hacker’s goal is to obtain information that will allow him/ her to gain unauthorized access to a valued system and the information that resides on that system.

Dear Readers, in this edition I am trying to tell you something about ‘Information Security & its challenges’ which is very important to know in this Computer Era and I am sure that it will help you all in your relative fields. Over the past 10 years the Internet has become very important source in the India. People of all ages use it on a regular basis, and it has become one of the driving forces of the economy. From banking to shopping to communication, it has radically changed the way many people go about their daily lives. The increased availability of broadband connections allows more people to experience all that the Internet has to offer.

Internet plays a very important role of Electronic communication which is done through electronic media like cell phones, computers, I-pods etc. However, to secure from the Cyber threats is a Challenging part. We hear almost daily that someone lost money or was cheated due to misuse of personal information on internet or hacking in the email account or stealing credit cards, etc. These unfortunate events can be easily and certainly avoided if we follow simple rules of internet, while transacting or interacting through electronic media.