ALL >> Computers >> View Article
India To Establish Cyber Command Authority. Online Computer Training Can Create It Awareness
During the recent past, countries across the world have witnessed cyber-attacks on computer systems and websites of government departments and defense establishments. Some of the countries, which have suffered cyber-attacks on government websites during the past few years, include U.S, China, S.Korea, Germany, India, Australia, Argentina, Estonia and Georgia. The computer systems of the Pentagon, the U.S Department of Defense headquarters have repeatedly faced hacking attacks. While China has been blamed by many countries for cyber-attacks, the country has also reported hacking attacks on defense ministry websites.
Recently, India has announced plans to establish a Cyber Command Authority (CCA) after a series of attacks on government websites, including the country's premier counter crime agency, Central Bureau of Investigation (CBI). The decision to establish CCA was taken after a confidential report shared by U.S, which claims that intelligence agencies of over 100 foreign countries are trying to intrude into India's cyber networks. The report also cautioned that some of the agencies have developed the capabilities ...
... to destabilize information infrastructure. The proposed authority will be established after the review of cyber security scenario. Lack of security conscious environment in government departments may lead to security gaps, which may exploited by those with malicious intentions. certified ethical hacker training program. Professionals must also keep themselves up to date on the latest threat in the cyber space.
Cyber-attacks may be initiated by hackers loyal to a rival nation, amateur hackers, organized cybercrime groups, hacktivists and foreign intelligence agencies. The recent Stuxnet attack on industrial installations, leakage of classified documents and diplomatic cables by WikiLeaks have acted as an eye-opener for many countries. Cyber security experts worldwide have expressed concerns that government sponsored cyber-attacks may quickly escalate into full-scale war if a foreign government's involvement is established by the affected country.
Add Comment
Computers Articles
1. How To Build A Peer-to-peer Marketplace?Author: brainbell10
2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10
3. Everything You Need To Know About Web Development In 2026
Author: chetna
4. Create A Strong Online Presence Today
Author: FutureGenApps
5. User Experience Design
Author: brainbell10
6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10
7. The Thrilling World Of Geometry Dash Lite
Author: Hattie
8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas
9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas
10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC
11. Unreal Game Development
Author: brainbell10
12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp
13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management
14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify
15. Why Choose Sataware?
Author: brainbell10






