Everything about Cyberwar?

What is Cyberwar?

  • Cyberwar is a form of war which takes places on computers and the Internet, through electronic means rather than physical ones.
  • With an increasing global reliance on technology for everything from managing national electrical grids to ordering supplies for troops, cyberwar is a method of attack which many nations are vulnerable to.
  • In cyberwar, people use technological means to launch a variety of attacks.
  • Some of these attacks take a very conventional form. Computers can be used, for example, for propaganda, espionage, and vandalism.
  • Denial of service attacks can be used to shut down websites, silencing the enemy and potentially disrupting their government and industry by creating a distraction.
  • Cyberwar can also be utilized to attack equipment and infrastructure, which is a major concern for heavily industrialized nations which rely on electronic systems for many tasks.

Challenges to India’s National Security:

  • India’s reliance on technology reflects from the fact that India is shifting gears by entering into facets of e-governance.
  • India has already brought sectors like income tax, passports” visa under the realm of e -governance.
  • Sectors like police and judiciary are to follow.
  • The travel sector is also heavily reliant on this.
  • Most of the Indian banks have gone on full-scale computerization.
  • This has also brought in concepts of e-commerce and e-banking.
  • The stock markets have also not remained immune.
  • To create havoc in the country these are lucrative targets to paralyze the economic and financial institutions.
  • The damage done can be catastrophic and irreversible.

Challenges and Concerns:

  • Some challenges and concerns are highlighted below :­
  • Lack of awareness and the culture of cyber security at individual as well as institutional level.
  • Lack of trained and qualified manpower to implement the counter measures.
  • Too many information security organisations which have become weak due to ‘turf wars’ or financial compulsions.
  • A weak IT Act which has became redundant due to non exploitation and age old cyber laws.
  • No e-mail account policy especially for the defence forces, police and the agency personnel.
  • Cyber attacks have come not only from terrorists but also from neighboring countries inimical to our National interests.

What is Seagrasses? 

Seagrasses are flowering plants that form dense underwater beds in shallow water. Distinct from seaweed, the plants provide shelter and food for a large range of animals, including fish, marine mammals and birds. Many seagrass meadows have been lost because of human activities, say researchers. Seagrasses are also knows as “lungs of the sea” Seagrass, which […]

Neutrino and Indian Neutrino Observatory

Neutrino

  • Very similar to electrons
  • Second most abundant particles after photon
  • Don’t carry any charge
  • Are not massless
  • Neutrinos are miniscule particles created in nuclear reactions, such as in the birth and death of sun and the stars, or in nuclear power plants.
  • Neutrinos interact with matter via the weak force. The weakness of this force gives neutrinos the property that matter is almost trans- parent to them.
  • Since they rarely interact, these neutrinos pass through the Sun, and even the Earth, unhindered. There are many other natural sources of neutrinos including exploding stars (supernovae), relic neutrinos, natural radioactivity, and cosmic ray interactions in the atmosphere of the Earth.

 

Indian Neutrino Observatory (INO) project 

INO, a proposed, underground observatory in Tamil Nadu to detect ephemeral particles called neutrinos — had been cleared by the Union government in 2015, after several years of deliberations, but has been stalled for over a year due to protests by activist groups, concerned over its environmental impact.

Bitcoin

Bitcoin is a digital currency that is not supported by any country’s government or central bank. It can be traded for services or goods with sellers who accept bitcoins as payment. Bitcoin was first  introduced in October 2008. It was invented by an unidentified programmer, or group of programmers, under the name of Satoshi Nakamoto. The system […]

GM mosquitoes

  • To suppress wild female Aedes aegypti mosquito populations that cause dengue, chikungunya and Zika were launched in Maharashtra’s Jalna district.
  • The technology uses genetically modified male Aedes aegypti mosquitoes that carry a dominant lethal gene. When male GM mosquitoes mate with wild female mosquitoes the lethal gene is passed on to offspring. The lethal gene in the offspring kills the larvae before they reach adulthood.
  • male mosquitoes do not bite humans, the release of GM males will not increase the risk of dengue, chikungunya and Zika.
  • Vector control using A. aegypti infected with the bacterium Wolbachia is achieved by using the life-shortening bacteria strain in both male and female mosquitoes
  • As Wolbachia is maternally inherited, the bacteria are anyway passed on to offspring. Dengue, Zika or chikunguya viruses cannot replicate when mosquitoes have Wolbachia . Unlike the RIDL technology, a feature of Wolbachia is that it is self-sustaining, making it a low-cost intervention.