123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

India To Establish Cyber Command Authority. Online Computer Training Can Create It Awareness

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

During the recent past, countries across the world have witnessed cyber-attacks on computer systems and websites of government departments and defense establishments. Some of the countries, which have suffered cyber-attacks on government websites during the past few years, include U.S, China, S.Korea, Germany, India, Australia, Argentina, Estonia and Georgia. The computer systems of the Pentagon, the U.S Department of Defense headquarters have repeatedly faced hacking attacks. While China has been blamed by many countries for cyber-attacks, the country has also reported hacking attacks on defense ministry websites.

Recently, India has announced plans to establish a Cyber Command Authority (CCA) after a series of attacks on government websites, including the country's premier counter crime agency, Central Bureau of Investigation (CBI). The decision to establish CCA was taken after a confidential report shared by U.S, which claims that intelligence agencies of over 100 foreign countries are trying to intrude into India's cyber networks. The report also cautioned that some of the agencies have developed the capabilities ...
... to destabilize information infrastructure. The proposed authority will be established after the review of cyber security scenario. Lack of security conscious environment in government departments may lead to security gaps, which may exploited by those with malicious intentions. certified ethical hacker training program. Professionals must also keep themselves up to date on the latest threat in the cyber space.

Cyber-attacks may be initiated by hackers loyal to a rival nation, amateur hackers, organized cybercrime groups, hacktivists and foreign intelligence agencies. The recent Stuxnet attack on industrial installations, leakage of classified documents and diplomatic cables by WikiLeaks have acted as an eye-opener for many countries. Cyber security experts worldwide have expressed concerns that government sponsored cyber-attacks may quickly escalate into full-scale war if a foreign government's involvement is established by the affected country.

Total Views: 294Word Count: 416See All articles From Author

Add Comment

Computers Articles

1. How To Improve The Security Of Android App?
Author: goodcoders

2. How To Earn Money From Free Apps?
Author: goodcoders

3. How Artificial Intelligence Is Revolutionizing Accounting?
Author: goodcoders

4. Explain About Web Application Architecture: Components, Types, Best Practices
Author: goodcoders

5. Complete Guide To Fitness App Development
Author: goodcoders

6. Erp For Small And Big Enterprise
Author: AITS Software

7. Top Software Development Company Melbourne
Author: Technothinksup Solutions

8. The Devops Revolution: Accelerating Innovation In The Digital Age
Author: basheer ansari shaik

9. How Ai Is Transforming Software Development
Author: Technothinksup Solutions

10. How To Do Web Scraping With Ruby?
Author: goodcoders

11. How Mobile Apps Blooming In The Fashion Industry?
Author: goodcoders

12. How Cloud Computing Helps In The Field Of Mobile App Development?
Author: goodcoders

13. The Importance Of Cybersecurity In The Digital Age
Author: Mohammad Arsh

14. First-ever ‘identity Management Day’ Is April 13, 2021
Author: Reinfosec

15. Top 5 Project Management Software Of 2025
Author: Ben Gross

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: