Optimize IAS
  • Home
  • About Us
  • Free Initiatives
    • Daily Practice Sheets
    • Daily Prelims Notes
    • Prelims Power Play
    • Mains Factly
    • Sunday Essay Sadhna
  • Courses
    • Mains Master Notes
    • Prelims Test Series
      • Laqshya 2024
    • Integrated Guidance 2024
      • ARJUNA PRIME 2024
    • Daily Answer Writing
  • Downloads
    • Important Topics List for Prelims 2023
    • Daily Prelims Notes Compilation
    • Daily Practice Sheet Compilation
    • PPP Compilation
    • PSIR Notes
    • General Studies Notes
    • UPSC Mains Previous Year Papers
  • Portal Login
  • Home
  • About Us
  • Free Initiatives
    • Daily Practice Sheets
    • Daily Prelims Notes
    • Prelims Power Play
    • Mains Factly
    • Sunday Essay Sadhna
  • Courses
    • Mains Master Notes
    • Prelims Test Series
      • Laqshya 2024
    • Integrated Guidance 2024
      • ARJUNA PRIME 2024
    • Daily Answer Writing
  • Downloads
    • Important Topics List for Prelims 2023
    • Daily Prelims Notes Compilation
    • Daily Practice Sheet Compilation
    • PPP Compilation
    • PSIR Notes
    • General Studies Notes
    • UPSC Mains Previous Year Papers
  • Portal Login

MALWARES

  • March 7, 2021
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments
Print Friendly, PDF & Email

 

 

MALWARES

Context:

On March 3, Maharashtra Power Minister Nitin Raut announced that a State Cyber Cell probe had found 14 Trojan horses in the servers of the Maharashtra State Electricity Transmission Company.

The announcement came in the wake of a report from Recorded Future, a U.S.-based cyber security firm, stating that a group linked to the Chinese government, which it called ‘Red Echo’, had targeted 10 vital nodes in India’s power distribution system and two seaports.

Concept:

Malware is the shortened form of malicious software.

Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software including Ransom wares, Computer Viruses, Worms, Trojan Horses, Spyware, Adware, Scareware etc.

This is any program or file that is harmful to a computer user. The term refers to software that is deployed with malicious intent.

Malware can be deployed even remotely, and tracking the source of malware is hard. It can take the form of executable code, scripts, active content, and other software.

These malicious programs can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users’ computer activity without their permission.

This combination has enabled commercial malware providers to supply sophisticated black markets for both malware and the information that it collects.

Shadow pad:

Shadow Pad is a backdoor Trojan malware, which means it opens a secret path from its target system to its command and control servers. Information can be extracted or more malicious code delivered via this path.

Shadow Pad is built to target supply-chain infrastructure in sectors like transportation, tele communication, energy and more.

It was first identified in 2017, when it was found hidden in a legitimate software produced by a company named Net Sarang. Trojanised softwares, or softwares that have dangers hidden in them, like the eponymous Trojan horse from Greek mythology, are the primary mode of delivery for Shadow Pad.

MALWARES
Print Friendly, PDF & Email

Recent Posts

  • Prelims Power Play 20 September 2023 September 20, 2023
  • Daily Practice Sheet 20 September 2023 September 20, 2023
  • What are SDGs? Assess the progress in last 7 years? Also enumerate he challenges in achieving it. September 20, 2023
  • Why are fishers organisation opposed to WTO pact on fisheries? September 20, 2023
  • India-Middle East-Europe Corridor underlines a crucial geopolitical shift. Comment September 20, 2023
  • Critically examine India Canada relation with emphasis on Indian diaspora there. September 20, 2023
  • Why are inter state river disputes so difficult to solve? Why are they increasing? Suggest measures to handle them more effectively September 20, 2023
  • The essence of participatory democracy is inclusion, not exclusion. In the light of this statement argue in favour of the women reservation bill. September 20, 2023
  • How is the Constitution amended? What are the different procedures for amending provisions in the Indian Constitution? Can constitutional amendments be struck down for want of ratification by States? Is there a time ­limit prescribed for ratification? September 20, 2023
  • The six entrances of the New Parliament Complex, and their guardian animals September 20, 2023

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Free Initiatives

  • Daily Practice Sheets
  • Daily Prelims Notes
  • Mains Factly
  • Prelims Power Play
  • Sunday Essay Sadhna

My Proven Strategy

  • Interview Strategy
  • Mains Strategy
  • Motivational
  • Prelims Strategy

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Santosh Pandey Quora Santosh Sir Telegram Santosh Sir Youtube Optimize IAS Instagram

Course Portal
Search