WAYS TO PROTECT CYBER TERRORISM

“SOME WAYS TO PROTECT CYBER TERRORISM” Employ Strong Passwords: As simple as this sound, it is one of the most overlooked methods of keeping systems safe. There are a number of freely available tools that ‘guess’ passwords — a very common technique referred to as ‘brute force cracking. These programs work by repeatedly attempting to … Read more

PROTECTION FROM CYBER TERRORISM

PROTECTION FROM CYBER TERRORISM- A FEW SUGGESTIONS Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most of the militaries classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the most … Read more

INDIAN LAW & CYBER TERRORISM

In India there is no law, which is specifically dealing with prevention of malware through aggressive defense. Thus, the analogous provisions have to be applied in a purposive manner. The protection against malware attacks can be claimed under the following categories: Protection available under the Constitution of India and protection available under other statutes. Protection … Read more

CYBER TERRORISM

CYBER TERRORISM- THE DARK SIDE OF THE WEB WORLD “Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Computers and the internet are becoming an essential … Read more

Famous Hackers

Jonathan James Jonathan James was an American hacker. He is the first Juvenile who send to prison for cybercrime in the United States. He committed suicide on 18 May 2008, of a self-inflicted gunshot wound. In 1999, at the age of 16, he gained access to several computers by breaking the password of a NASA … Read more

Disadvantages of Ethical Hacking

As with all types of activities which have a darker side, there will be…..dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include: The ethical hacker using the knowledge they gain to do malicious hacking activities Allowing the company’s financial and banking details to be seen The possibility that the ethical hacker will send … Read more