Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
      • Prelims Test Series 2025
    • CSE Integrated Guidance 2025
      • ARJUNA PRIME 2025
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
      • Prelims Test Series 2025
    • CSE Integrated Guidance 2025
      • ARJUNA PRIME 2025
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login

Cyberattacks

  • July 21, 2020
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments

Subject: Science and tech

Context:

Department of Telecommunications (DoT) has written to all web portals and websites within its ambit to conduct a security audit and submit a compliance certificate.

Concept:

  • Most of these attacks are in the nature of DDOS (distributed denial of service), phishing, data exfiltration, remote access tool malware and keylogging.

Phishing

  • It is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email.
  • The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine.

DDOS (distributed denial of service)

  • A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth.
  • As a result, the system is unable to fulfill legitimate requests.
  • Attackers can also use multiple compromised devices to launch this attack.

Data exfiltration

  • Data exfiltration  is the unauthorized transfer of data from a computer.
  • The transfer of data can be manual by someone with physical access to the computer or automated, carried out through malware over a network.

Key logging

  • Keyloggers are a type of monitoring software designed to record keystrokes made by a user.
  • One of the oldest forms of cyber threat, these keystroke loggers record the information type into a website or application and send to back to a third party.
Cyberattacks Science and tech

Recent Posts

  • Daily Prelims Notes 23 March 2025 March 23, 2025
  • Challenges in Uploading Voting Data March 23, 2025
  • Fertilizers Committee Warns Against Under-Funding of Nutrient Subsidy Schemes March 23, 2025
  • Tavasya: The Fourth Krivak-Class Stealth Frigate Launched March 23, 2025
  • Indo-French Naval Exercise Varuna 2024 March 23, 2025
  • No Mismatch Between Circulating Influenza Strains and Vaccine Strains March 23, 2025
  • South Cascade Glacier March 22, 2025
  • Made-in-India Web Browser March 22, 2025
  • Charting a route for IORA under India’s chairship March 22, 2025
  • Mar-a-Lago Accord and dollar devaluation March 22, 2025

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Course Portal
Search