Thursday, August 6, 2020

INDIA WON’T IMPORT POWER EQUIPMENT FROM CHINA

 

 


WON’T IMPORT POWER EQUIPMENT FROM CHINA

 

Union Power Minister R.K. Singh said India will not import power equipment from China, saying the sector, being strategic and essential, was vulnerable to cyber attacks

At a virtual conference with the States, the Minister said equipment imports from China and Pakistan would not be permitted

Cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices

Depending on context, cyberattacks can be part of cyberwarfare or cyberterrorism

Cyberattack can be employed by sovereign states, individuals, groups, society or organizations, and it may originate from an anonymous source

Attacker is a person or process that attempts to access data, functions or other restricted areas of the system without authorization, potentially with malicious intent

Cyberattacks have become increasingly sophisticated and dangerous

Three factors contribute to why cyber-attacks are launched against a state or an individual: the fear factor, spectacularity factor, and vulnerability factor

Attacks are broken down into two categories: syntactic attacks and semantic attacks

Syntactic attacks are straightforward; it is considered malicious software which includes viruses, worms, and Trojan horses

Semantic attack is the modification and dissemination of correct and incorrect information

 Control systems, energy resources, finance, telecommunications, transportation, and water facilities are seen as critical infrastructure targets during conflict. Cyberattacks that have an adverse physical effect are known as cyber-physical attacks

Cyberwarfare utilizes techniques of defending and attacking information and computer networks that inhabit cyberspace, often through a prolonged cyber campaign or series of related campaigns

Cyberterrorism is "the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population"

China's People's Liberation Army (PLA) has developed a strategy called "Integrated Network Electronic Warfare" which guides computer network operations and cyberwarfare tools. It helps link together network warfare tools and electronic warfare weapons against an opponent's information systems during conflict.

No comments:

Post a Comment