Page 6 - Lesson 15.xps
P. 6

Module - V
                                                                                                Cyber Warfare
              Warfare and
                Its Types
                                            system is a ___________.
                                       (c)  A ______________is a hacker with criminal intent, who maliciously
                                            sabotage computer, steal information located on secure computers.
                                       (d)  ______________ are programs that work in disguise.

                                       (e)  Adware and spyware are one and the same ( True/False)
                       Note
                                 2.    Mention the types of cybercrime.
                                 3.    List the various types of cyber weapons.


                                  15.4 Cyber Penetration, Remedial Measures & National
                                         Cyber Security Policy


                                 15.5.1 Cyber Penetration : Modus Operandi

                                 How do our adversaries operate to penetrate into our Cyber Space? They send out
                                 numerous e- mails to internet users for cyber hacking. Generally these mails have
                                 spywares which are detrimental to the host computers and result in sharing /retrieval of
                                 data stored on the hard disk. Sometimes it also leads to crashing the computer. These
                                 spywares could facilitate remote administration of the host computer.

                                 Whenever a hacker penetrates a computer, he would attempt to install a spyware that
                                 will give him access to that computer at his will. He also may install malicious programme
                                 which would collect information from the computer and through internet, down load
                                 all files and particular IP address. An antivirus programme alone is not good enough to
                                 detect all such rogue programs, because while viruses are designed to propagate
                                 openly, spywares are designed to propagate by stealth. So the technologies required
                                 to detect viruses and spyware are also different.

                                 15.5.2  Indications

                                 How can I get indication that my computer is  Infected? There are very apparent
                                 indications which show your computer is infected. Be vigilant and look for the following:

                                 (a)   Poor system performance.
                                 (b)   Abnormal system behaviour e.g., system restarts or hangs frequently.

                                 (c)   Unknown services are running.
                                 (d)   Crashing of applications.

                                 (e)   Change in file extensions or contents.
                                 (f)   Hard Disk is busy or its light glows continuously.





           62
           62
                                                                                      MILITARY STUDIES
   1   2   3   4   5   6   7   8   9   10   11