India to build cyber attack proof operating system

tarunraju

Sanathan Pepe
Mod
Joined
Sep 18, 2009
Messages
9,080
Likes
40,077
Country flag
You should have been specific while giving me knowledge of what I define. Since definitions are case sensitive in technical field.
No, I needn't be. Nobody encrypts printed or written data in this age any more. Any other forms of cryptography are obsolete, so anyone talking about "encryption" is talking about electronic data encryption 99% of the time.

I couldn't find Sarawat claiming the upcoming system to be 'immune' or 'attack proof'. He is simply talking about help in ability to prevent attacks through this system. He is talking about reducing vulnerability of organization's data if/over internet. Let me know if official claims are made somewhere. Hype is what media projecting & hype is over which uneducated fools jumping.
Maybe you had trouble reading the headline, I didn't, and the OP didn't mention till post #16 that "cyber-attack proof" was a fabrication by the press in Mangalore.


The very authority can decide on that not anyone else.
Nobody's talking about who's decision it is. We're talking about whether it's justified, in our opinion, or not, and if you're going to build a new infrastructure from scratch, it's obviously not justified, the costs are going to run into tens, if not hundreds of billions of dollars (like it did, for the US milnet)
 

EagleOne

Regular Member
Joined
May 10, 2010
Messages
886
Likes
87
Read the headline.
There you go. This should have been mentioned.
For example, servers and supercomputers all over the world are controlled remotely over telnet (which is a common way to do it, and is prone to vulnerabilities). Regardless of what OS or FS the system is using, the attacker will use the same protocol an admin sitting in Delhi will use, to control servers located in Nagpur. It's tougher than it sounds, but a person who is diligent enough can exploit those vulnerabilities, and compromise the system.
if we start a unique protocol ..... then wht will be the case

like soap where the role of interacting parties are fixed-some thing more advanced
 
Last edited:

nrj

Ambassador
Joined
Nov 16, 2009
Messages
9,658
Likes
3,911
Country flag
No, I needn't be. Nobody encrypts printed or written data in this age any more. Any other forms of cryptography are obsolete, so anyone talking about "encryption" is talking about electronic data encryption 99% of the time.
Underlined part is debatable while the bolded part answers it well.

tarunraju said:
Maybe you had trouble reading the headline, I didn't, and the OP didn't mention till post #16 that "cyber-attack proof" was a fabrication by the press in Mangalore.
Or maybe I don't start jumping on conclusion just by reading Headlines while looking for the legitimacy of the same.

Nobody's talking about who's decision it is. We're talking about whether it's justified, in our opinion, or not, and if you're going to build a new infrastructure from scratch, it's obviously not justified, the costs are going to run into tens, if not hundreds of billions of dollars (like it did, for the US milnet)
Its good that the decision power & absolute authority is thus left to more qualified people.
 

tarunraju

Sanathan Pepe
Mod
Joined
Sep 18, 2009
Messages
9,080
Likes
40,077
Country flag
Underlined part is debatable while the bolded part answers it well.
No, it isn't. In a computer-related discussion it's commonsense that the term "encryption" refers to electronic data encryption, just as in a computer-related discussion "data" refers to electronic data, not written data.



Or maybe I don't start jumping on conclusion just by reading Headlines while looking for the legitimacy of the same.
A headline is intended to convey the contents of the article. You do understand absolute facts from a headline. That's the whole utility of the headline. So when the headline said "cyber-attack proof", it did mean to communicate that DRDO claimed the system will be "cyber-attack proof".



Its good that the decision power & absolute authority is thus left to more qualified people.
And we're not talking about who it's left to, rather what in our opinion is viable, just as in this forum we talk about what in our opinion is the right thing our government should be doing with the military, what aircraft they should be buying, so on and so forth, when obviously they're more qualified to do things than us, and things are left to them.
 
Last edited:

nrj

Ambassador
Joined
Nov 16, 2009
Messages
9,658
Likes
3,911
Country flag
tarunraju said:
A headline is intended to convey the contents of the article. You do understand absolute facts from a headline. That's the whole utility of the headline. So when the headline said "cyber-attack proof", it did mean to communicate that DRDO claimed the system will be "cyber-attack proof".
Maybe thats the way you interpret the entire information communicated by media outlets who are most of the times irresponsible. Although DRDO still not claiming it to be 'attack-proof' or 'immune'.
 

tarunraju

Sanathan Pepe
Mod
Joined
Sep 18, 2009
Messages
9,080
Likes
40,077
Country flag
Maybe thats the way you interpret the entire information communicated by media outlets who are most of the times irresponsible. Although DRDO still not claiming it to be 'attack-proof' or 'immune'.
There was no text in the article claiming to the contrary of the headline. Maybe you're new to what's the purpose of a headline. It's intended to state what's the article in a nutshell.
 

nrj

Ambassador
Joined
Nov 16, 2009
Messages
9,658
Likes
3,911
Country flag
There was no text in the article claiming to the contrary of the headline. Maybe you're new to what's the purpose of a headline. It's intended to state what's the article in a nutshell.
There is no claim made by DRDO on record. Media headlines & hypocrites can jump around with conclusions.
 

sandeepdg

Senior Member
Joined
Sep 5, 2009
Messages
2,333
Likes
227
Seems, the DRDO is back to doing what it does best: Bloating !! And practically speaking, by definition, there's no such damn thing as a hack-proof OS. And now, that they have bloated about it, I am very sure, whenever this OS is up and running, it will become a favorite for hackers especially from those across our immediate borders !
 

Sridhar

House keeper
Senior Member
Joined
Feb 16, 2009
Messages
3,474
Likes
1,061
Country flag
Dr Saraswat has said complete architecture and complete framework , does it include a new protocol too ? If it is true then he should be right in claiming that it is not hackable unless the source codes are out. If it uses one of the standard protocols the security can be compromised.
 

sathya

Regular Member
Joined
Aug 23, 2009
Messages
413
Likes
173
Country flag
Cyber security command on cards in India

By admin at 16 December, 2010, 2:43 am

SOURCE: Herald Publications Pvt Ltd

The National Security Advisory Board (NSAB) has recommended formation of a central cyber security command on the lines of the US Cyber Command (USCYBERCOM) set up last May to fight back the new generation attacks on the government's computer systems and networks.
A policy paper of the board stresses need for such a command not only to prevent any leaks of the sensitive information but also to ensure the valued government data is not hacked or destroyed by anybody from outside or from within the system. The document gives an insight to a lot of work done by China for inflicting damage to the computer networks in other countries.
The latest such attack was made on the website of Central Bureau of Investigation (CBI), purportedly from Pakistan, destroying all the data on its website (cbi.nic.in) which is still not up even after 11 days of struggle by the National Informatic Centre engineers who maintain the government websites. Luckily, the intruders could not get into the CBI's computer that stores the sensitive data, inaccessible easily from the Internet.
India does not have the risk of wiki type leaks as access to the classified and sensitive material is limited to a very limited number of top officials unlike even a corporal having access to the diplomatic cables of the US missions, the government sources say.
Moreover, they say the government organisations doing the sensitive works have been already ordered to prepare cyber crisis management plans.
Defence and nuclear installations had upgraded their measures and laid down standard operating procedures even before wiki-leaks started trickling early last July, when Iranian nuclear facilities in Natanz were reportedly hit by a computer worm Stunxnet.
This work is touted as the first discovered worm that spies on and reprogrammes industrial systems. Russians described it as a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world.
Only the other day Defence Minister A K Antony admitted in Parliament that India is already exposed to the possible cyber attacks and explained how the top army brass was working in unison to make cyber systems secure and non-porous to protect systems.
"The paradigms of security in the age of information technology are seldom constant. The evolving security matrix is complex and calls for co-operation and coordination of the highest level," Antony said.
Earlier last month, he also told the army commanders that cyber attacks were "fast becoming the next generation of threats" and as such, no single service could work in isolation. "We need to make our cyber systems as secure and as non-porous as possible," he said.
The assertion comes amid frequent attacks and the subsequent alerts sounded by the army authorities over China and Pakistan-based cyber spies peeking into India's sensitive business, diplomatic and strategic records.
The policy paper distributed by NSAB among the country's strategic community stresses on simultaneous creation of a security centre that should monitor cyber operations and undertake active monitoring of cyber space.
It also stresses need for funding to develop innovative technologies to protect the Indian networks and promote growth of critical skills in the arena.
The research paper, titled "Informationising Warfare" warns that "as China grows militarily and economically, its resultant strategies are all likely to expand, especially in the cyber warfare arena." Perhaps the most crucial among the beyond rules criteria is manifested in the form of "asymmetric warfare" — for instance, cyber attacks directed against data networks.
"The primary idea is to strike in unexpected ways against vulnerable targets," the paper says, stressing that India has to prepare for these strategies that do not fall in the terrain of the present defence structure of Indian Army, Indian Air Force and Indian Navy, the researcher underlined.
The research paper quotes two Chinese strategists explaining a "combination scenario" being tried by China in which it secretly musters large amounts of capital and launches a sneak attack on an adversary's financial markets.
Subsequently, it inflicts a computer virus and hacker attachment in the opponent's computer systems and attacks his networks to disrupt and paralyse the networks of civilian electricity, traffic dispatch, financial transactions, telephone communications, and mass media, thereby causing social panic, street riots, and political crises for the adversary, the paper said.
The cyber warfare consists of two types: Cyber attacks and cyber protection. Cyber attacks include virus attacks and hacker attacks. Computer virus attacks refer to operational actions that use computer viruses to destroy or tamper information stored in computer systems in a manner that they do not work properly.
"In the military field, the core equipment of military information systems and cyberised weapons are all likely targets of computer virus attacks. Computer hacker attacks refer to those actions taken by hackers to intrude upon and destroy an opponent's cyber systems," the paper stressed.
It points out that Beijing is also pursuing a diverse and comprehensive portfolio of space warfare investments since the late 1980s. The status of these programmes runs from advanced concept development and testing, through product engineering evaluation, line-level manufacturing and acquisition from foreign sources, to integration as war-fighting capabilities into the Chinese armed forces.
"The evidence suggests that these programmes are protean: They lend themselves to steady evolution across the spectrum, from space denial to space dominance, if Beijing's political goals change over time, though at present and for the foreseeable future, they are optimised for the space-denial mission," the paper said.
Its stress is that the defence planning and implementation in future has to incorporate the virtual word to limit physical damage to the real one as China is increasingly integrating computer technology into modern military organisations to play the twin roles of being both a target and a weapon.
Cyber forces are most likely to be integrated by China into an overall battle strategy as part of a combined arms campaign. The aim is to increase the 'fog of war' for the enemy and to reduce it for one's own forces—to be achieved through direct military strikes designed to degrade the enemy's information-processing and communications systems or by attacking the systems internally to achieve, not denial of service, but a denial of capability.
 

sathya

Regular Member
Joined
Aug 23, 2009
Messages
413
Likes
173
Country flag
India raising its own offensive Cyber warriors now

By admin at 16 December, 2010, 2:57 am

SOURCE : zone-h.com

No doubt this is a late step , Government of India has finally decided to build a network of ethical hackers to spy on the classified data of hostile nations by hacking into their computer systems Information Technology professionals and ethical hackers will be hired for this purpose .IT workers and ethical hackers who sign up for the ambitious project will be protected by law, says the proposal being discussed by senior Government administrators.

The government is worried about spying and sabotage from neighboring countries, particularly China and Pakistan .According to the government proposal, the National Technical Research Organisation (NTRO) along with Defence Intelligence Agency (DIA) will be responsible for creating cyber-offensive capabilities. NTRO is a key government Agency that gathers technical intelligence while DIA is tasked with collating inputs from the Navy, Army and Air Force.

The NTRO will also suggest measures to ensure legal protection to recruits, a move that is expected to coax software professionals into joining the government group because under the Indian IT Act, hacking is punishable with imprisonment up to three years, or carries a fine up to `2 lakh, or both.

"Even if the offense is done on a computer on foreign soil, it is punishable under Indian laws," says cyber lawyer Pavan Duggal, adding that the IT Act will have to be changed for "patriotic stealth operations". Reports Economics Times India
 

Latest Replies

Global Defence

New threads

Articles

Top