NEW DELHI: India is creating a "coherent and comprehensive" security policy to deal with the "anarchic new world" of Cyber threats, National Security Adviser Shivshankar Menon said.
"(The) government is in the process of putting in place the capabilities and the systems in India that will enable us deal with this anarchic new world of constant and undeclared Cyber threat, attack, counter-attack and defence," he said at the release of a report on "India's Cyber Security Challenge" by the Institute of Defence Studies and Analyses (IDSA).
NEW DELHI: Signaling an increasing trend in Cyber security incidents, the government said its agency Indian Computer Emergency Response Team (CERT-In) has handled over 13,000 such incidents in 2011 compared to 8,266 incidents in 2009.
"CERT-In has observed that there is significant increase in the number of Cyber security incidents in the country. A total of 8,266, 10,315 and 13,301 security incidents were reported to and handled by CERT-In during 2009, 2010 and 2011, respectively," Minister of State for Communications and IT Sachin Pilot said in a written reply to the Rajya Sabha
The name Cryptography comes from the greek words Crypto, which means hidden, and graphy, which means writing. Cryptography is defined in the dictionary as, “the art of writing or solving codes.” In this sense Cryptography can be seen as encrypting (writing codes) and decrypting (solving codes). When Cryptographers refer to plain text, they are referring to the original data set or a decrypted data set. When they refer to cipher text, they are referring to the encrypted message.
In current computer modernization where communication is one of the most important part, the email is expected to be obsoleted because social networking sites have increased in popularity. Multiple debates have ensued in regards to social networking surpassing email as the defacto method of communication.
Is it ethical for any computer expert to infiltrate into other person's websites and e mail accounts? Yes if it is a trustful 'hacker' who uses his ethics and software expertise to strengthen and making his employers websites or email accounts more secure from crackers, and No; if the computer wizard illegally gains access to someone's computer, website or e mail account for personal gains or deliberately damaging other persons reputation.