When will INS Arihant will have K15 Sagarika operational , further do it is comparable with Tomahawk Cruise missile , if range of missile is not good how can it effect INS Arihant kill capability.? Seniors please put light
Vulnerability and penetration testing is done by banking and finance industries etc.So this should not be taken as surprise only way to judge your security is to run vulnerability assessment tools and later exploiting it. So if they are doing that this is not new. I am also into same feild.this...
First of all comparison cannot be made , Information security is huge it has many branches and research can be done on each and every aspects it goes beyond site deformation.
US have that power they spend huge sum in R&D we all are using 90% of internet protocol(my assumtion :) ) made in US varsities and in western country in fact TCP/IP was made for US DEFENCE project but later used as publicly ,So they invest in developing new means of securing assets,new...
You got is wrong. There are different types of exploitations
a) Script kiddy these rum automated tools to launch attack
2) People who can launch precise attack with knowledge of web application exploitation and can form their own tools inperl and python and can use ruby languages in...
Tshering i live in mumbai our community is well capable to launch attack . But Tshering we are in initial satage in contrast western countries invest money to R&D for non traditional exploitations. CIA has capability to break codes etc
How you came to know china hacked into pentagon . What is hacking ? Pakistani hacked into PC of Indian army does not say hacker is genious . People are unaware of security issues and by simple tricks one can brek into systems . But to break into oranisation where security is properly appllied...
Yes you are right most of the vendors are promising with zeroday attack measures.Security is very complex and have many branches, Application security to network security all these have to work in relation to each other in biger organisation like BCP and risk assesment and proper process and...
Most of the attacks coming are now days are more sophisticated and are based on web application exploitation.Other exploit unpatched devices.Some scientist now at blackhat conference said that SSL based vpn can also be cracked as per their research.Governments certainly posses that power so we...
In 20 years time more's law is going to fail as electron at that level will be unstable hence quantum computing(till now we achieve it at level of 7 electrons) will come into picture . You can imagine that in 20 years of time todays fastest supercomputer will we used by you as general...
Dear Friends,
Supercomputer application is important for our country in some feilds.When earlier we need it for ur weather stations we demanded it from US but US denied it to us so we created our own PARAM PADMA. This machines performs trillion of calculations per seconds these are important...
1) Properly configured firewall does not grantee security . Security is a multilayer approach.
2) What is physically fixed bug?
3) Honey pot allow us to study what attacker using (tools , measures,etc) .I would prefer SIEM instead of this one . It is normally easy for good cracker to...
You can see this as terrorist does not need planning to attack any vulnerability of armed forces ,civilian organizational they can rise from abyss and attack.
But security forces have to do multilayer protection right from border of nation to security of school
this does not mean...
Honeypot does not infect .ITS is a formof IPS that used to study attacks.Although after applying Network Security (firewall at perimeter ,IPSIDS then Kernel level HIDS ) organizations thinks there job is done .
But it is not correct you have to constantly monitor traffic ( We also Study...