123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

India To Establish Cyber Command Authority. Online Computer Training Can Create It Awareness

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

During the recent past, countries across the world have witnessed cyber-attacks on computer systems and websites of government departments and defense establishments. Some of the countries, which have suffered cyber-attacks on government websites during the past few years, include U.S, China, S.Korea, Germany, India, Australia, Argentina, Estonia and Georgia. The computer systems of the Pentagon, the U.S Department of Defense headquarters have repeatedly faced hacking attacks. While China has been blamed by many countries for cyber-attacks, the country has also reported hacking attacks on defense ministry websites.

Recently, India has announced plans to establish a Cyber Command Authority (CCA) after a series of attacks on government websites, including the country's premier counter crime agency, Central Bureau of Investigation (CBI). The decision to establish CCA was taken after a confidential report shared by U.S, which claims that intelligence agencies of over 100 foreign countries are trying to intrude into India's cyber networks. The report also cautioned that some of the agencies have developed the capabilities ...
... to destabilize information infrastructure. The proposed authority will be established after the review of cyber security scenario. Lack of security conscious environment in government departments may lead to security gaps, which may exploited by those with malicious intentions. certified ethical hacker training program. Professionals must also keep themselves up to date on the latest threat in the cyber space.

Cyber-attacks may be initiated by hackers loyal to a rival nation, amateur hackers, organized cybercrime groups, hacktivists and foreign intelligence agencies. The recent Stuxnet attack on industrial installations, leakage of classified documents and diplomatic cables by WikiLeaks have acted as an eye-opener for many countries. Cyber security experts worldwide have expressed concerns that government sponsored cyber-attacks may quickly escalate into full-scale war if a foreign government's involvement is established by the affected country.

Total Views: 328Word Count: 416See All articles From Author

Add Comment

Computers Articles

1. Loan Lending Apps: Simple Loans For Busy Lives
Author: davidbeckam

2. Top Features Of Supplier Management Software And Supplier Portal Software
Author: sneha

3. How Health & Wellness Brands Are Using Whatsapp For Better Client Retention
Author: Connverz

4. Top Benefits Of Cloud-based Erp Solutions For Growing Enterprises
Author: sneha

5. Top 5 Sop Challenges And Data-backed Ways To Solve Them
Author: Alice White

6. How Can Grocery Api Data Scraping Help You Navigate Swiggy And Instamart Data?
Author: Mobile App Scraping

7. Etmf In The Era Of Digital Trials: Challenges, Innovations, And Opportunities
Author: Giselle Bates

8. Leverage Real-time Offer Intelligence For Food Delivery Apps
Author: Food Data Scrape

9. Top 10 Features To Look For In Sales Order Management Software In 2025
Author: sneha

10. 最佳且超棒的站群服务器
Author: 8U Cloud

11. How Cyber Ab Marketplace Supports C3pao And Cmmc Provisional Assessor
Author: Ariento Inc

12. Top 10 Benefits Of It Consulting Services For Your Business!
Author: GIGABITTechnologies

13. Unlocking App Success: Aso App Store Optimization In Bangaloreq
Author: Cubikeymedia

14. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi Tool
Author: Vhelical

15. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: