Skip to main content

Posts

Showing posts from December, 2021

Can all cyber crimes be termed as cyber terrorism?

The nature of the terrorist threat to society has changed significantly in the course of recent years. We have recently seen several smaller but no less severe acts of terrorism around regions of great casualties and terrifying images, and the nature of the threat will continue to change as new technologies and abilities emerge from terrorist organizations. Cyber terrorism is a prime example of a newly vulnerable border. Cyber threats have increased in recent years, with high-profile attacks making headlines across the world. Nuclear installations and critical command-and-control systems are not immune to cyber attacks; one such attack could facilitate the theft of useful weapons. Additionally, nuclear weapons activity could be interfered with and controlled by them The term "cyber terrorism" is coined by the computer whiz Barry C. Collin. According to the U.S. Federal Bureau of Investigation, “Cyber terrorism is any premeditated, politically motivated attack against in

Role of AI in Cyber Security

  Artificial intelligence is the simulation of human intelligence processes by machine s , especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision. AI is very useful in the field of cyber security. Let’s say that a working employer click on a malicious phishing link using organizational system & it might have brought dire consequences. If the organization has used AI in this case, it might have saved the attacker from breaching the organizational network. AI will block the malicious request from going outside the organizational network in this case. Advantages of AI AI Learns More Over Time :  AI technology is intelligent, and it uses its ability to improve network security over time. It uses machine learning and deep learning to learn a business network’s behavior over time. It recognizes patterns on the network and clusters them. It then proceeds to detect any deviations or security inci

Importance of knowing Cyber Law for Techies

The world of internet is known as cyberspace and the laws prevailing in this area are known as Cyber laws. All its users, including the IT people or “techies” come under the ambit of these laws as it carries a kind of worldwide jurisdiction.   An IT organization is the department within a company that is charged with establishing, monitoring and maintaining information technology systems and services. It may also be charged with strategic planning to ensure that all IT initiatives support the respective business goals.  Cyber law is important because it touches almost all aspects of transactions and activities involving the cyberspace. Every action and reaction in the virtual world has some cyber legal angles. This field deals with the legal problems with cyber space as it helps businesses to prevent any kind of online crimes such as identities and data theft, privacy violation, banking frauds, c yber terrorism spreading malware and viruses , etc.   Cyber-Crime has not been defined i

Bug Bounty Hunters: Fake or Fame ?

    With the evolvement of the internet, we need someone who can identify the errors or the vulnerabilities in a website, computer or a system. The reward given to a person for identifying them is known as bug bounty. Over these 4 decades, the bug bounty industry has grown and still continues to grow at a rapid speed. Bug bounty hunters are earning enough by hacking into the systems or websites and identifying the specific errors or vulnerabilities of the website ethically and responsibly.  In return they rewarded in different forms and the reward varies on different platforms for different vulnerabilities based upon its severity. A few bug bounty hunters have started mentoring new upcoming talent and they use various platforms to promote themselves to attract the students. Out of them a few are manipulating the screenshots of the rewards which will misguide the students. A fake bug bounty hunter manipulates their actual reward to a much higher value which is fake. For example: If

Need of Cyber Security in 2021

  As the internet wold is growing day by day, the need for cyber security is at its peak. So, in this blog, I will be discussing some pros and cons of technology and how cyber security is needed in 2021. My blog is inspired by the session of Mr. Dinesh O Bareja which was organized by World Cyber Security Forum . Wanted a proper glimpse? Please check the complete session here . To understand the need of cyber security in 2021 completely, we need to start from the beginning i.e., the timeline of various search engine platforms like World Wide Web (WWW) coming into existence in 1990, FTP and TCP/IP in 1973 etc. By the year 1995, India officially started using internet in the country.  In continuation, let’s bring our focus to the Evolution of technology. This particular topic can be very well understood in the reference to human beings. In the 1960s – Let’s suppose we were babies and technology had a very little impact.   In the 1970s – We were still children; Technology was