Page 8 - Lesson 15.xps
P. 8

Module - V
                                                                                                Cyber Warfare
              Warfare and
                Its Types        a nodal agency for coordination of crisis management efforts. CERT-In also acts as an
                                 umbrella organization for coordination actions and operationalization of sectoral CERTs.

                                         Intext Questions         15.3


                                 1.    Expand the following-
                       Note            (a)  CERT

                                       (b)  ICT
                                       (c)  NCIIPC

                                 2.    What are the indications of the computer system being infected?
                                 3.    What are the limitations of firewall?

                                 4.    Why is a good firewall called the first line of defence?


                                         ACTIVITY 15.1

                                 Watch the documentary "Zero Days" at https://topdocumentaryfilms.com/zero-days/



                                         What You Have Learnt

                                 This lesson in Cyber warfare has given you an insight into the following:

                                 •     Certain definitions connected with cyber warfare;
                                 •     Types of  threat which include cyber espionage, cyber attack and cyber sabotage
                                       and cyber propaganda;

                                 •     You have also studied about types of Cybercrime, Cyber Attackers and Cyber
                                       Weapons
                                 •     Cyber Penetration and indication that give us an idea that our computer is
                                       infected. Remedial measures have to be under taken to prevent cyber attacks.


                                         Terminal  Exercises


                                 1.    Write short notes on
                                       (a)  Cyberwarfare.

                                       (b)  Cyber Espionage.

                                       (c)  Cyber Sabotage.

                                       (d)  CERT and National Cyber Security Policy.

                                       (e)  Remedial measures against cyber penetration.


           64
           64
                                                                                      MILITARY STUDIES
   3   4   5   6   7   8   9   10   11