123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

India To Establish Cyber Command Authority. Online Computer Training Can Create It Awareness

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

During the recent past, countries across the world have witnessed cyber-attacks on computer systems and websites of government departments and defense establishments. Some of the countries, which have suffered cyber-attacks on government websites during the past few years, include U.S, China, S.Korea, Germany, India, Australia, Argentina, Estonia and Georgia. The computer systems of the Pentagon, the U.S Department of Defense headquarters have repeatedly faced hacking attacks. While China has been blamed by many countries for cyber-attacks, the country has also reported hacking attacks on defense ministry websites.

Recently, India has announced plans to establish a Cyber Command Authority (CCA) after a series of attacks on government websites, including the country's premier counter crime agency, Central Bureau of Investigation (CBI). The decision to establish CCA was taken after a confidential report shared by U.S, which claims that intelligence agencies of over 100 foreign countries are trying to intrude into India's cyber networks. The report also cautioned that some of the agencies have developed the capabilities ...
... to destabilize information infrastructure. The proposed authority will be established after the review of cyber security scenario. Lack of security conscious environment in government departments may lead to security gaps, which may exploited by those with malicious intentions. certified ethical hacker training program. Professionals must also keep themselves up to date on the latest threat in the cyber space.

Cyber-attacks may be initiated by hackers loyal to a rival nation, amateur hackers, organized cybercrime groups, hacktivists and foreign intelligence agencies. The recent Stuxnet attack on industrial installations, leakage of classified documents and diplomatic cables by WikiLeaks have acted as an eye-opener for many countries. Cyber security experts worldwide have expressed concerns that government sponsored cyber-attacks may quickly escalate into full-scale war if a foreign government's involvement is established by the affected country.

Total Views: 368Word Count: 416See All articles From Author

Add Comment

Computers Articles

1. Martindale Law Firm Competitive Analysis Data For Legal Industry
Author: Den Rediant

2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates

3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors

4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen

5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns

6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs

7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant

8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant

9. Answering_services
Author: brainbell10

10. Api_security
Author: brainbell10

11. Appium
Author: brainbell10

12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant

13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant

14. Adobe_xd
Author: brainbell

15. Amazon Sagemaker Services
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: