Skip to main content

Currently Skimming:

4 Information Technology and Communications Security in India
Pages 31-42

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 31...
... The information security perspective differs from country to country. Developed countries are concerned with managing and operating nuclear power plants, dams, power grids, air traffic control systems (ATC)
From page 32...
... Unlike what is witnessed in developed countries, attacks on national networks and the national infrastructure in India are more likely to be politically motivated than motivated by economic gain. Observation of Internet traffic and intrusion attempts by hackers over a period of time suggests that script kiddies21 are hacking into some of our networks in order to use the bandwidth to launch attacks on others.
From page 33...
... Behind such digital convergence is the drive toward material convergence and natural interfaces. The various dimensions of the wireless information society are • human interface that makes technology transparent • virtual presence that makes distance transparent • seamless solutions that make systems transparent In the upcoming era of virtual presence, the creation of global innovation networks will become possible.
From page 34...
... Multiple cohesive security components such as intrusion detection appliances and specialized virtual private network (VPN) gateways will have to be used.
From page 35...
... It continually incorporates new technology but lacks central administrative control. To understand the environment in which incident handlers work, it is necessary to understand that the Internet is global and has no central authority.
From page 36...
... The offensive component comprises sniffers, scanners, denial-ofservice attacks, viruses, and hardware and software bugs. The monitoring component consists of traffic analyzers, intrusion detection systems, international communication interception, communications intelligence, and passive detection.
From page 37...
... India, therefore, is very vulnerable because manipulative information very quickly creates panic. Information Warfare Information warfare is the use of information to achieve national objectives.
From page 38...
... , the Silver Lords, and the Pakistan Hackers Club (PHC) are other groups.
From page 39...
... An examination of the country domain defacements indicates that the number of Indian domain defacements is growing. A closer look at the motives for defacements indicates that the primary reason given for more than about half of the attacks was "just for fun," or "I want to be the best defacer as a challenger, as a patriot." Political reasons accounted for about one-tenth of the just-for-fun attacks.
From page 40...
... The Pakistan Hackers Club has not been placing significantly offensive messages. For example, the Silver Lords' messages about "Free Kashmir," using vile language and threats, exemplify offensive and threatening messages.
From page 41...
... Through data mining to interlink apparently unconnected events combined with information fusion, recovery procedures, 41
From page 42...
... • sensors for predictive analysis based on the flow at the backbone level • information sharing • data mining tools not only to predict attacks in advance, but also to predict low-intensity, long-duration attacks and the formation of groups • data mining to interlink apparently unconnected events • information fusion • recovery procedures and CERT-In • use of cryptography The Lessons In today's borderless world, protecting the world is everyone's business. Terrorism was once the problem of the developing nations.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.