Page 69 - MILITARY-STUDIES-2
P. 69
Module - V
Cyber Warfare
Warfare and
Its Types
system is a ___________.
(c) A ______________is a hacker with criminal intent, who maliciously
sabotage computer, steal information located on secure computers.
(d) ______________ are programs that work in disguise.
(e) Adware and spyware are one and the same ( True/False)
Note
2. Mention the types of cybercrime.
3. List the various types of cyber weapons.
15.4 Cyber Penetration, Remedial Measures & National
Cyber Security Policy
15.5.1 Cyber Penetration : Modus Operandi
How do our adversaries operate to penetrate into our Cyber Space? They send out
numerous e- mails to internet users for cyber hacking. Generally these mails have
spywares which are detrimental to the host computers and result in sharing /retrieval of
data stored on the hard disk. Sometimes it also leads to crashing the computer. These
spywares could facilitate remote administration of the host computer.
Whenever a hacker penetrates a computer, he would attempt to install a spyware that
will give him access to that computer at his will. He also may install malicious programme
which would collect information from the computer and through internet, down load
all files and particular IP address. An antivirus programme alone is not good enough to
detect all such rogue programs, because while viruses are designed to propagate
openly, spywares are designed to propagate by stealth. So the technologies required
to detect viruses and spyware are also different.
15.5.2 Indications
How can I get indication that my computer is Infected? There are very apparent
indications which show your computer is infected. Be vigilant and look for the following:
(a) Poor system performance.
(b) Abnormal system behaviour e.g., system restarts or hangs frequently.
(c) Unknown services are running.
(d) Crashing of applications.
(e) Change in file extensions or contents.
(f) Hard Disk is busy or its light glows continuously.
62
62
MILITARY STUDIES