Sunday 21 October 2012

CYBER SNOOPING


CYBER SNOOPING

There are too many malcontents in the online world, and they spare neither governments not individuals.

Secret Invasion

Backdoor Ghostnet                 Trojan
Malware defender 2009          Misleading Application
W32.Xanib.A                          Virus
W32.SillyFDC.BBM              Worm
W32.Fidamag.A                     Virus
Bloodhound.PDF.9                Trojan,  Virus, Worm
Unix.Psybot                            Worm

These are some of the malwares which destroy online services all over the world. These are called 1] software, 2] spyware, 3] malware(malicious software)
These are first observed by Canada IWM. It found out that a malware unleashed from four servers in China had infiltrated 1295 computers containing confidential government data in 103 countries. That malware is called gh0st RAT. It could monitor the text files in the infected computer, but could also supposedly log keystrokes, capture video and audio and do a host of other such things.
It is said that many of the computers had been infected al most two years ago—and the malware had remained undetected.
It pointed out that it had been detected by IWM largely because the agency was looking for something like it.
It may have remained undetected for many years.
It is observed that the malware is passing back information to four servers in China.
The Chinese govt. denied that.
The main purpose of this snooping mission is to keep an eye on what the Dalai Lama and other exiled leaders of Tibet were doing. How those govt.s are helping them.

Some of the nationalisitic Russians with good software skills had attacked online services in 2007 and in 2008. They disrupted several services, including emergency ones. They also could disrupt email or data to throw their operations out of gear.
Effects:-1. The hackers effected the G-mai in Feb.2009. People could not access their accounts. Mails could not be opened fast. Google could handle this situation.
            2. In the US and UK millions of consumers have face theft of their credit and debit card data in the past few years from their safe sites.
3. State Bank of India’s website was hacked.
Cyber terrorism is evolving from guns and grenades to the internet. The hackers are breaking into networks that control missiles or satellites.
In the civilian realm, a hacker attack in a wired country can paralyse a] airport operations, b] banking,  c] dozens of other things – in fact, almost anything that is connected to the Web.

How does it effect India:-
            In India common network is  connecting all its departments. Any thing can happen in a large scale any time.
            It enables the hackers to break into the National Informatics Centre network, most ministries including Defence  and Home.

Precautions:-
            Computers in India and globally have old hardware and software. These are the best to hacking and spread virus. So the hard drive need to be changed periodically.


No comments:

Post a Comment

647. PRESENTATION SKILLS MBA I - II

PRESENTATION  SKILLS MBA   I - II There are many types of presentations.                    1.       written,        story, manual...