Page 5 - Lesson 15.xps
P. 5

Module -V
                Cyber Warfare
                                                                                                    Warfare and
                     activities, raise  funds, spread  propaganda, shut down critical national       Its Types
                     infrastructures (such as energy, transportation or government operations) for the
                     purpose of forcing or intimidating a government or civil population.
               (e)   Foreign Intelligence Services: Foreign intelligence surveillance who use cyber
                     tools as part of their espionage tradecraft for acquiring sensitive information
                     about their adversary.
                                                                                                Note
               15.3.4 Cyber Weapons

               So far, you have understood what is cybercrime. But just as in all other crimes, there
               are certain weapons used to commit these crimes. Let us find out what they are.

               (a)   Viruses and Worms: It is very commonly heard or noticed term in our day to
                     day computer life. These are the codes that execute within host program.
                     Whenever anything goes wrong we don't hesitate to blame viruses for the matter.
                     But something more complex like Worms (programs executed independently)
                     are also used.

               (b)   Trojan Horses: These are programs that work in disguise. Trojan Horses are
                     unauthenticated program contained in a legitimate program which performs
                     functions unknown to the user. Likely places for Trojan Horses to attack are:-
                     (i)  OS.

                     (ii)  Software downloaded from internet.
               (c)   Logic /Knowledge Bombs: These are hidden functions that becomes active
                     when triggered.

               (d)   Knobots: Also known as Knowledge Robots, they keep the processed data
                     and keep storing the knowledge.
               (e)   Adware: Adware is a programme that can be embedded within useful
                     programmes. These popup while using the computer they are embedded in and
                     have a lot of nuisance value.

               (f)   Spyware: Spyware is also a programme that is embedded with a useful
                     programme. However, they are generally programmed to collect information
                     such as user's web surfing habit /preferences and e-mail. The illegal part of the
                     activity is that all the activity occurs without the users consent.

                       Intext Questions         15.2


               1.    Fill in the blanks.

                     (a)  Knowledge Robots are known as_______________.
                     (b)  Computer user who intends to gain unauthorised access to a computer


                                                                                                                61
                MILITARY STUDIES                                                                                61
   1   2   3   4   5   6   7   8   9   10