Print Friendly, PDF & Email

11 AUGUST, 2017 (MAINS)

TODAYS ANSWER WRITING CHALLENGE FROM GS-III

 

Q1. The rise of the global computer network is destroying the link between geographical location and the power of local governments to assert control over online behavior. In today’s world, India’s cyberspace security is quite vulnerable. Comment. (200 words)

 

Please write the answer in comments section

  • Osho Korde

    Cyberspace is such a term, which is not yet completely defined and also has no geographical limitation. It is a term associated with application of the Internet worldwide. It is also called as a virtual space as physical existence of cyberspace is not detectable at all.
    Types of Security threats

    Cybercrimes consist of specific crimes dealing with computers and networks, such as hacking, phishing and the facilitation of traditional crime through the use of computers (child pornography, hate crimes, telemarketing/internet fraud). A brief introduction to some common cyber related violations, or cybercrimes as they are more commonly referred to are discussed below:

    Dissemination of Malicious Software (Malware)

    Malware is defined as a software designed to perform an unwanted illegal act via the computer network. It could be also defined as software with malicious intent. Malware can be classified based on how they get executed, how they spread, and/or what they do. Some of them are discussed below.

    Cyber Terrorism

    ‘Cyber terrorism is the convergence of terrorism and cyber space. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

    With the huge growth in the number of Internet users all over the world, the security of data and its proper management plays a vital role for future prosperity and potentiality. It is concerned with people trying to access remote service is that they are not authorized to use.