MUMBAI: The Reserve Bank today said there was an attempt to hack its website on Thursday, rendering it inaccessible for almost the entire day.
"It was a DNS (Domain Name System) attack where the hacker tried entering the website from a single Internet protocol address multiple times, jamming its bandwidth," an RBI spokesperson said.
Due to multiple requests received from the hacker's IP address, genuine entrants were unable to access the RBI website--www.rbi.org.in.
If a considerable proportion of your business operations are conducted via computer, it is likely that you use a range of software, such as a word processor, email client, accounting package and client relationship management tool.
The hardware security systems that act as firewalls vary in configuration and sophistication. One relatively simple device involves using a router-which controls the sending and receiving of messages-equipped with packet filters to examine the messages. This system can be configured to block traffic to or from certain Internet destinations or all unknown destinations. This type of security system is relatively inexpensive and easy to set up, but it also offers only minimal protection from hackers. A slightly more sophisticated and secure system is a proxy server.
NEW DELHI: A staggering 8,000 Cyber attacks were warded off during the 2010 Commonwealth Games, National Security Ad-visor Shivshankar Menon said Wednesday, pointing to India's capabilities. "There were over 8,000 attacks during the Commonwealth Games on ticketing and other systems. This was pure malice. I can't see any advantage in targeting ticketing and other networks," Menon said.
He was taking part in an interactive session after releasing a report on "India's Cyber Security Challenge" brought out by the Institute of
Defence Studies and Analyses (IDSA).
NEW DELHI: Indian computer experts have devised a technique to smoke out bots and deter their malicious programmers from taking over your desk computer or laptop, stealing passwords or vital information in your hard drive even without your suspecting anything amiss, or deluging website with emails to crash them.
Bots are emerging as one of the biggest threats to Cyber safety and security worldwide. They may sneak into your computer through an email link or a contaminated external device such as a USB drive, or through chinks in outdated software loaded on your system.
NEW DELHI: India is creating a "coherent and comprehensive" security policy to deal with the "anarchic new world" of Cyber threats, National Security Adviser Shivshankar Menon said.
"(The) government is in the process of putting in place the capabilities and the systems in India that will enable us deal with this anarchic new world of constant and undeclared Cyber threat, attack, counter-attack and defence," he said at the release of a report on "India's Cyber Security Challenge" by the Institute of Defence Studies and Analyses (IDSA).
NEW DELHI: Signaling an increasing trend in Cyber security incidents, the government said its agency Indian Computer Emergency Response Team (CERT-In) has handled over 13,000 such incidents in 2011 compared to 8,266 incidents in 2009.
"CERT-In has observed that there is significant increase in the number of Cyber security incidents in the country. A total of 8,266, 10,315 and 13,301 security incidents were reported to and handled by CERT-In during 2009, 2010 and 2011, respectively," Minister of State for Communications and IT Sachin Pilot said in a written reply to the Rajya Sabha
The name Cryptography comes from the greek words Crypto, which means hidden, and graphy, which means writing. Cryptography is defined in the dictionary as, “the art of writing or solving codes.” In this sense Cryptography can be seen as encrypting (writing codes) and decrypting (solving codes). When Cryptographers refer to plain text, they are referring to the original data set or a decrypted data set. When they refer to cipher text, they are referring to the encrypted message.
In current computer modernization where communication is one of the most important part, the email is expected to be obsoleted because social networking sites have increased in popularity. Multiple debates have ensued in regards to social networking surpassing email as the defacto method of communication.
Is it ethical for any computer expert to infiltrate into other person's websites and e mail accounts? Yes if it is a trustful 'hacker' who uses his ethics and software expertise to strengthen and making his employers websites or email accounts more secure from crackers, and No; if the computer wizard illegally gains access to someone's computer, website or e mail account for personal gains or deliberately damaging other persons reputation.