Short essay on security threats in india

Internal security in India is considered as the national subjects that covers many multifaceted individual subjects, across the centre, state and local jurisdictions, defined by the borders of the homeland yet challenged by exceptional local conflicts of the country's huge and diverse landscape. In present condition, internal security is dealt by numerous executive bodies with intricate functional and reporting relationships.

Law and order is a state subject and the state police are accountable for maintaining the internal security. The Ministry of Home Affairs has been charged for internal security, management of paramilitary forces, border management, centre-state relations, administration of union territories and disaster management. For maintaining internal security, effectual communication networks has pivotal role. Communication networks described as an interconnection of communicating through electronic gadgets like computers, laptops, mobiles, telephones which enables executives to transmit important and secret information of all other sectors including voice, data, video, and internet networks.

Communication network should not be understood with the computer networks such as LAN, WAN because they are just one type of the Communication networks.

Various communication networks are the mainstay of much of the critical infrastructure in many sectors today such as civil aviation, shipping, railways, power, nuclear, oil and gas, finance, banking, IT, law enforcement, intelligence agencies, space, defence, and government networks. As such, communications systems serve in other key internal and external security and emergency readiness. Furthermore, the communication networks are mainly dependent on each other in complicated way.

Essay on the Internal Security of India

If there is a failure of one communication network, it can affect badly in other sectors. In the Communication Networks, there may be serious security attacks such as data theft, fraud, and denial of service attacks, hacking, and cyber warfare, terrorist and antinational activities. A cyber-attack which can control the infrastructure may harm the system and disrupt the communication network.

The attacks can be through viruses, malware, Trojans, hacking, network scanning, probing, and phishing. Furthermore, the Social network attacks can be one of the major sources of attacks in future because it is used by huge number of users and they post their personal information on sites through these networks. It has been explained in technical reports that Network security is a major part of a network that needs to be maintained because information is being passed between computers and is very susceptible to attack.

Since last decade, experts that manage network security have seen a huge number of hackers and criminals that created malicious threats which disrupted the communication around the globe ITSecurity, A Virus is a "program or piece of code that is loaded onto computer without user knowledge and runs against his wishes. Viruses can hugely damage to computers. With respect to a network, if a virus is downloaded then all the computers in the network would be affected because the virus would make copies of itself and spread itself across networks.

A worm is similar to a virus but a worm can run itself whereas a virus needs a host program to run. To protect from worm, it is necessary to install a security suite, such as Kaspersky Total Protection, that protects the computer against threats such as viruses and worms.

Start Uploading your Essays Now.

A Trojan Horse is "a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on user's hard disk. In a network if a Trojan Horse is installed on a computer and interferes with the file allocation table it could cause enormous damage to all computers of that network.

  • Internal Security-I Division | Ministry of Home Affairs | GoI;
  • Allocation of Work?
  • how important is prewriting to the success of an essay.
  • Essay on Nationalism.
  • Short essay on nuclear power in india.

In order to get protected, security professionals must have Security suites, such as Norton Internet Security that will prevent from downloading Trojan Horses. SPAM is "flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise pick to receive it. Also you can buy a variety of SPAM filters that work efficiently. Phishing is also a security threat that misuses user's valuable information. Phishing is explained as an e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients.

Phishing is one of the worst security threats over a network because a lot of people that use computers linked up to a network are amateurs and would be very susceptible to giving out information that could cause situations such as theft of money or identity theft.

Security Threats Essay | Bartleby

It is recommended to use Phishing filters to filter out this unwanted mail and to prevent threat. A packet sniffer is a device or program that allows snooping on traffic travelling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis. In a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft, so this is a major security threat to a network.

When strong encryption is used, all packets are unreadable to any but not to the destination address. Computer viruses never occur naturally.

cyber security threats - IT security threats - information security - isaca cybersecurity - Essay

They are always induced by people. Once created and released, however, their diffusion is not directly under human control. Denial-Of-Service DoS is an attack targeted at depriving legitimate users from online services. It is done by flooding the network or server with useless and invalid authentication requests which eventually brings the whole network down, resulting in no connectivity. As a result of this, users are prevented from using a service.

How do i write time in an essay

Description: A DoS attack is initiated by sending needless and sup. Memory corruption can be described as the vulnerability that may occur in a computer system when its memory is altered without an explicit assignment. The contents of a memory location are modified due to programming errors which enable attackers to execute an arbitrary code. It is one of the proble. Trojan or Trojan horse is the name given to a computer virus.

It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

Description: Mostly Trojans are. All rights reserved. For reprint rights: Times Syndication Service. Choose your reason below and click on the Report button.

  • Climate Change and National Security, Part II: How Big a Threat is the Climate? - Lawfare.
  • National security?
  • Internal Security-I Division.

This will alert our moderators to take action. Get instant notifications from Economic Times Allow Not now You can switch off notifications anytime using browser settings. ET Portfolio.

Challenges to Internal Security through Communication Networks

Brand Solutions. TomorrowMakers Let's get smarter about money. India Mobile Congress Largest digital technology forum. Tetra Pak India in safe, sustainable and digital. Electron Quiz Time to unlock knowledge. ET NOW. Market Watch. Suggest a new Definition Proposed definitions will be considered for inclusion in the Economictimes.

Definition: Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Description: Major areas covered in cyber security are: 1 Application Security 2 Information Security 3 Disaster recovery 4 Network Security Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance.

Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Disaster recovery planning is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. Any business should have a concrete plan for disaster recovery to resume normal business operations as quickly as possible after a disaster.

Network security includes activities to protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components include: a Anti-virus and anti-spyware, b Firewall, to block unauthorized access to your network, c Intrusion prevention systems IPS , to identify fast-spreading threats, such as zero-day or zero-hour attacks, and d Virtual Private Networks VPNs , to provide secure remote access.