Page 8 - Lesson 15.xps
P. 8
Module - V
Cyber Warfare
Warfare and
Its Types a nodal agency for coordination of crisis management efforts. CERT-In also acts as an
umbrella organization for coordination actions and operationalization of sectoral CERTs.
Intext Questions 15.3
1. Expand the following-
Note (a) CERT
(b) ICT
(c) NCIIPC
2. What are the indications of the computer system being infected?
3. What are the limitations of firewall?
4. Why is a good firewall called the first line of defence?
ACTIVITY 15.1
Watch the documentary "Zero Days" at https://topdocumentaryfilms.com/zero-days/
What You Have Learnt
This lesson in Cyber warfare has given you an insight into the following:
• Certain definitions connected with cyber warfare;
• Types of threat which include cyber espionage, cyber attack and cyber sabotage
and cyber propaganda;
• You have also studied about types of Cybercrime, Cyber Attackers and Cyber
Weapons
• Cyber Penetration and indication that give us an idea that our computer is
infected. Remedial measures have to be under taken to prevent cyber attacks.
Terminal Exercises
1. Write short notes on
(a) Cyberwarfare.
(b) Cyber Espionage.
(c) Cyber Sabotage.
(d) CERT and National Cyber Security Policy.
(e) Remedial measures against cyber penetration.
64
64
MILITARY STUDIES