ipl-logo

Contours Of Security In Cyberspace By Wing Commander Sanjay Poduval

1208 Words5 Pages

“Contours of Security in Cyberspace” by Wing Commander Sanjay Poduval attends to inform us about the different contours of cyber security and help us understand the vulnerabilities of the cyberspace. Cyberspace is already in every aspect of our life. We can see this in cell phones or television, and also banks, business and politics. However, cyberspace has become also an intangible world where the security is more challenging. The classification of cyber security can be carried in different ways. In this text, was defined in the following categories: Acts with mischievous intent, acts with Criminal intent, acts by vested interests and acts by nation-states. Acts of mischievous intent are irritating acts not aimed to damage or disrupt …show more content…

Therefore, outsider's users are capable of harm the military network. It also goes in the other way - viruses that might destroy a civilian network might as well destroy a military network. In order to avoid these risks, the military systems making affords to isolate themselves from the civilian systems. Although, they often use the same network, because many tasks become much easier by using the internet. The attack is done in three stages; the first stage is information gathering– the attackers collect information from different sources in order to create a profile of the target. The second stage is planting malware – the attackers send malicious files by mail to collect intelligence and find vulnerabilities and weak points in the networks, and also to put Trojans in the victim's computer. The third stage is utilizing the security breach that achieved. A bot, is a software application that runs automated tasks (scripts) over the Internet. Despite different useful features the bots has became known by their misuse like stealing information from people to launching pad for distributed attack. When the bot is installed, it can be controlled from a distance and can finish the controller’s …show more content…

Websites names that are similar to famous and trusted sites are an example of how to fool an individual. For instance, instead of "yahoo.com" it will be "yaho0.com", the last letter in yahoo is "zero". Cross-site Scripting is an attack technique that involves inserting a particular code into user's browser. The code can attach as a link to a website via email message. At once the user enters the link, the code has the ability to read, modify, and transfer information that exists in the user's browser such as; usernames and passwords. Such attack is called ‘‘Mass Mailing Worms’’, and in order to avoid entering such malicious sites, the user must enter only to verified and recognized sites.
The social network is a platform that allows people to be in touch with each other in real time, regardless of the distance between them. Along with the benefits of these platforms, these sites contain sensitive and personal information about the profile owner, and this information is usually accessible to anyone.
The user's personal security may be compromised. Answers to confidential questions that must be answered in performing banking operations or restoring a password to a particular site may be found in the information on the social network's

Open Document