Can you guess what's is the weapon which is biggest threat for F-35 fighter jets? It's not the Russian S400 system or any BVR missile, but its vulnerability to cyber attack. The F-35 fighter jets, which are also known as the flying computers can fall prey to an invisible enemies rather than an incoming missile as per Eurasiatimes.
Cyber attack has become a new era weapon which can completely cripple down your opponent. Doesn't matter how advance is technology, the system does have loop holes which is exploited by hackers and can render them useless. Even worse they can also reconfigure or recalibrate the system to be used against the same country.
If you think, cyber security is not a serious concern, watch for yourselves. The US President Joe Biden announced in December last year that cybersecurity would be a priority in his administration and now he is hiring a group of national security veterans with deep cyber expertise.
Disclosed in December, eight federal agencies and numerous companies, including software provider SolarWinds Corp in US were victims of CyberAttack. The US intelligence agencies held Russian state actors responsible for it, while, Moscow has denied involvement in the hack.
Cyber warfare requires negligible investment when compared to physical warfare. The enemy's socio-economic foundation and institution can be easily brought down with easy deniability.
China saw the scope, opportunity and value of cyber warfare very early. In April 1997, China’s Central Military Commission set up a 100-member elite corps to devise ways of hacking into American and other Western computer systems.
The recent hack into Microsoft Exchange servers have affected nearly 30,000 US Agencies including Govt. Organizations. Chinese hackers were suspected behind these attacks.
On 28th Feb 2021, an article was published by a US based agency Recorded Future. As per the security agency, China-Linked group RedEcho had targeted the Indian Power sector last year amid the ongoing tension between India and China at LAC.
Since early 2020, Recorded Future agency has observed a large increase in suspected targeted intrusion activity against Indian organizations from Chinese state-sponsored groups. 10 distinct Indian power sector organizations, including 4 of the 5 Regional Load Dispatch Centres (RLDC) responsible for operation of the power grid through balancing electricity supply and demand, have been identified as targets in a concerted campaign against India’s critical infrastructure. Other targets identified included 2 Indian seaports.
Most of these attacks are planted via malware present in the hardware and firmware which are made in China. As you already know that most of the electronic chips and hardware used in modern day computer be it mine are yours - all of them have Chinese components.
Since these components are made in China, the Chinese hackers are aware of such vulnerabilities and are therefore easily able to attack and hack into Indian systems.
But the question is what is India doing to counter China? We can not just let our systems at high risk of cyber attack by China.
India is now planning new national strategy to strengthen the country's cyber security. The new strategy will lay down the protocols for prevention and audit to secure the govt's digital connected water, health and education system - which are all considered as a critical infrastructure. The infrastructures such as Power Plants and aviation will be considered as supercritical.
As per WION, India's department of telecommunications has made a few amendments and the licensing conditions have been changed. Now, Indian telecom companies will have to consider "defence and national security" before buying equipment. They will be required to source from "trusted telecom equipment sources" which can loosely be translated to suppliers India can trust.
The new rules kick in from June 15 and once that happens, the telecom companies will not be able to use any products that are labelled "non-trusted". Chinese companies such as Huawei and ZTE will feel the pinch as no one will be able to use their gear if they are labelled "non-trusted".
Huawei and ZTE have been accused of installing back-doors in their technology. These are vulnerabilities that might leave doors open for hackers to exploit.
===================================================
WHOMSOEVER IT MAY CONCERN
Most of the pictures clip or BGM included in the Video
Belongs to their Respected Owners and we do not claim
rights...but under this, we are using them
===================================================
DISCLAIMER: UNDER SECTION 107 OF THE COPYRIGHT ACT 1976, ALLOWANCE IS MADE FOR "FAIR USE" FOR PURPOSES SUCH AS CRITICISM,
COMMENT, NEWS REPORTING, TEACHING, SCHOLARSHIP, AND RESEARCH. FAIR USE IS A USE PERMITTED BY COPYRIGHT STATUTE THAT MIGHT
OTHERWISE BE INFRINGING. NON-PROFIT, EDUCATIONAL OR PERSONAL USE TIPS THE BALANCE IN FAVOR OF FAIR USE.
Ещё видео!