Skip to main content

While The World Braces For E-threats, India Moves Slow

By- Rajat Pandit, TNN

After the first four "real" battlefields of land, air, sea and now increasingly space, India needs to get serious on the virtual front as well. The country should begin planning a full-fledged military cyber command, instead of the current piecemeal and disjointed steps to bolster cyber security, grappling as it already is with incessant online espionage and other attacks from China, Pakistan and others.

This was the clear takeaway from the deliberations on cyber security and cyber warfare at the high-profile Munich security conference on Sunday, even though hardly figured in the discussions. experts said, the emergence of "cyber weapons" like the Stuxnet Software "Worm" that was used to sabotage Iran's nuclear program, had changed the entire security ball game, almost on a par with the use of nuclear bombs in 1945.

"Someone used a cyber weapon in peacetime to physically destroy what the nation(Iran) could describe as its critical infrastructure. It was a new class of weapon that caused a thousand centrifuges in Iran to self-destruct", said, General(rtd) Michel V. Hayden, former CIA director.

Swedish foreign minister Carl Bildt expressed fear that the risk of terrorist or others getting hold of cyber weapons was possibly much higher than nuclear weapons. "stealing and using Stuxnet might be more easy and dangerous than nuclear weapons" he said.

Well executed cyber attacks after all can cripple a nation's military assets and strategic networks, energy grids and banking, communications and "infrastructure". moreover, unlike missiles or bombs, which can be traced back to an adversary for retaliatory strikes, here the enemy remains unknown.

Stuxnet is a case in point, though a few fingers were pointed at Israel, as also the US, the exact origin of the "worm" still remains unknown. So, it no wonder several countries like the USA and the UK have setup cyber military forces to thwart deadly attacks that can come from anywhere anytime.

India too has reasons to worry, China-watchers in India say Beijing already has 2-3 "hacker Brigades" and 30000 computer professionals in its Militia. China based online Espionage gangs have been regularly accessing classified documents from several Indian security establishments.

Comments

Priya Balan said…
Cinema is one of the best entertainment. catalog printing and banner printing Good admin. By Club flyers

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p