123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

India To Establish Cyber Command Authority. Online Computer Training Can Create It Awareness

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

During the recent past, countries across the world have witnessed cyber-attacks on computer systems and websites of government departments and defense establishments. Some of the countries, which have suffered cyber-attacks on government websites during the past few years, include U.S, China, S.Korea, Germany, India, Australia, Argentina, Estonia and Georgia. The computer systems of the Pentagon, the U.S Department of Defense headquarters have repeatedly faced hacking attacks. While China has been blamed by many countries for cyber-attacks, the country has also reported hacking attacks on defense ministry websites.

Recently, India has announced plans to establish a Cyber Command Authority (CCA) after a series of attacks on government websites, including the country's premier counter crime agency, Central Bureau of Investigation (CBI). The decision to establish CCA was taken after a confidential report shared by U.S, which claims that intelligence agencies of over 100 foreign countries are trying to intrude into India's cyber networks. The report also cautioned that some of the agencies have developed the capabilities ...
... to destabilize information infrastructure. The proposed authority will be established after the review of cyber security scenario. Lack of security conscious environment in government departments may lead to security gaps, which may exploited by those with malicious intentions. certified ethical hacker training program. Professionals must also keep themselves up to date on the latest threat in the cyber space.

Cyber-attacks may be initiated by hackers loyal to a rival nation, amateur hackers, organized cybercrime groups, hacktivists and foreign intelligence agencies. The recent Stuxnet attack on industrial installations, leakage of classified documents and diplomatic cables by WikiLeaks have acted as an eye-opener for many countries. Cyber security experts worldwide have expressed concerns that government sponsored cyber-attacks may quickly escalate into full-scale war if a foreign government's involvement is established by the affected country.

Total Views: 338Word Count: 416See All articles From Author

Add Comment

Computers Articles

1. Scraping Dan Murphys Liquor Products Details Data
Author: FoodDataScrape

2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Lahore
Author: bluewizard.pk

3. How Does Blockchain Resolve Data Privacy And Security Issues For Businesses?
Author: Severus Snape

4. Scrape Quick-commerce Data From Deliveroo Hop Uae
Author: FoodDataScrape

5. Web Scraping Quick-commerce Data From Noon Minutes Uae
Author: FoodDataScrape

6. Helical Insight: Best Open Source Data Visualization Tool In 2025
Author: Vhelical

7. Scrape Top Selling Grocery Product Data From Walmart Usa
Author: FoodDataScrape

8. Extract Quick Commerce Data From Flipkart Minutes
Author: FoodDataScrape

9. Refurbished Laptop Scams And How To Safely Buy A Trusted Device
Author: Sujtha

10. Web Scraping Freshco Supermarket Product Data In Canada
Author: FoodDataScrape

11. How To Compare Two Lists In Excel​: A Definitive Guide For Data Professionals
Author: blackjack

12. Monthly Updated Uber Eats Menu Dataset For 500k+ Restaurants
Author: FoodDataScrape

13. Extract Mcdonalds Store Locations Data In Usa For Competitiveness
Author: FoodDataScrape

14. Scrape Spicy Food Trend Data In Usa 2025 For Competitive Advantage
Author: FoodDataScrape

15. Why Startups Should Invest In Custom Software Development Service
Author: Albert

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: