Tuesday, 2 May 2017

The Cyber Warfare





Cyber warfare can be defined as the use of information technology to disrupt and destroy the activities of a state or organization, by attacking the total information systems for strategic or military purposes.

The impact of Cyber-attack can be very large; it can affect different sectors of a nation like:
1. Government sector
2. Business sector
3. Social Media
4. Individual level


Cyber-attacks Recorded in the History:

(As per Wikipedia information).

  • 2007 Cyber-attacks on Estonia, wide ranging attack targeting government and commercial institutions
  • July 2009 Cyber-attacks against South Korea and United States
  • 2010 Cyber-attacks on Burma, related to the 2010 Burmese General Election
  • 2010 Japan–South Korea Cyber Warfare
  • 2013 Singapore Cyber-attacks
  • #OpIsrael, a broad "anti-Israel" attack
  • Cyber-attacks during the Russo-Georgian War
  • Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States





Types of Cyber Attacks:

Many security vulnerabilities occur due to increased internet connectivity. Cyber attackers exploit those vulnerabilities. Different types of Cyber-attacks are explained below:

1. Phishing
Phishing attacks are coming in the form of Emails to inbox. While clicking the link on the mail, it will steal user data.

2. Denial-of-Service (DoS) Attacks
A DoS attack causes damaging the service to a network. Attackers send bulk volumes of traffic through the network and then the network becomes overloaded and can’t work anymore.
In a DoS, the attacker uses multiple computers to send the data that will overload the system. In this case, a PC user may not even realize that his computer has been hijacked and became a part of the DoS attack.
Due to DoS attacks, online access would be blocked to a site, and the business or organization can’t function properly.

3. Password Attacks
Password attack is that some unknown source trying to gain access your system by cracking your password. There are programs which are used to guess passwords, and also to compare various possible word combinations against a dictionary file.

4. Malware
Malware is defined as the code with malicious purpose which can steal data or destroys something on the PC.
Malware includes Trojans, viruses and worms.
Malware is commonly penetrated to a system while opening email attachments, downloading a software or through Operating System vulnerabilities.

5. Rogue Software
A Rogue software is a malware that pop ups as a necessary security software which can keep your system safe and protected from hacking.
Rogue security software gives alerts that the user system security is in trouble and has to download the software to protect the system. While clicking “Yes”, the Rogue software will be  downloaded to the system.

6. “Man in the Middle” (MITM)
The MITM can grab information from the end users and the entity (like banks) which user is communicating with.
To explain, if you are banking online, the man in the middle will communicate with you as an executive from Bank, and communicate with the Bank as it’s you. The man in the middle can then receive all of the information exchanged between both parties, like bank accounts and personal data.

7. Password Re-use
Users have a tendency to use the same password for many sites. Once attackers hack some sites, they collect a list of passwords and try to use it for accessing your sensitive information like Bank account or other crucial information.

8. Malvertising
Malvertising is downloading a malware through clicking an ad. Attackers would upload infected ads to different sites through an ad network. When a user clicks on any of these ads, some kind of malware will be downloaded to the system.

Hacking: Preventive Measures

  • Banking or shopping should be done on your own device only. NEVER do it on a public computer, in a cafĂ©, or a free WiFi — there might be chances of your data to be stolen.
  • Use a strong password with numbers, characters and special characters, and don’t use the same password for multiple sites. Don’t share your password with others also.
  • Be careful always while clicking on suspicious attachments or email links. Confirm the URL of website the link directs you to.
  • Don’t share sensitive information on social networks. Hackers can grab all those valuable data. Tighten your Social-Media security settings also.
  • Give password and lock all devices and never leave them unattended. Lock flash drives and external hard drives also with password if there is sensitive information.
  • Activate Firewall. It monitors all the incoming and outgoing network traffic towards your computer.
  • Update operating system, browser, and other important software with the latest security patches to minimize threats from viruses and malware.
  • Do not install ‘cracked’ software which can attract spyware to your system.
  • Update anti-virus/anti-malware software regularly, and do a regular backup of data.
  • Be careful while plugging flash drives, external hard drives, and smart phone to the PC. Malware can be transferred through it.
  • Don’t share any sensitive information like Bank account PIN through Emails or phone calls if some unknown person emails or calls you and telling that they’re from the Bank.
  • While uploading your personal data to any online file sharing services, do it as encrypted mode only.

Networking Security Training in Cochin 

Soften Technologies offers networking security training and certification like CCNA Security, CCNP Security, CCIE Security along with MCSE, RHCE and Linux. We offer Software Programming courses also, like ASP.NET, PHP, Java, Android, Embedded Systems, Software Testing in Cochin, Kerala. 


CALL: 8129199511, 0484 4037036 for your queries.

Email: softentechnologiescochin@gmail.com








Driving Driverless



The Driverless Cars



A driverless or autonomous car is a vehicle that is able to sense its surroundings and navigate without human control. A lot of such vehicles are being developed currently.

Automobile companies such as Ford, Mercedes and Tesla are there in the scene to build autonomous vehicles. The Google self-driving car project Waymo is advancing so fast that it has covered over 2.5 million miles as self-driven test ride.

Advancement in electronics and computing technology have gradually been automating several driving functions in the last decades. Experiments have been conducted on self-driving cars since 1920s. In July 2013, Vislab demonstrated a driverless vehicle BRAiVE which moved autonomously on a mixed public traffic route.

Driverless Cars: How do they work?



It’s same as planes fly on autopilot mode. Driverless cars can take control of driving tasks such as steering, accelerating, braking, cruise control, indicating, anti-lane drift, self-parking. Self-driving vehicles use sensors, computer vision, GPS and Lidar(a remote sensing technology) to move from one location to other.

The sensory information is then processed using high end computers to navigate the suitable pathways for the vehicle to advance, avoiding the obstacles and same time, obeying the road signs and signals.

The self-driving car uses a digital map, which will be continuously updated as per the sensory input. This allows the vehicle to respond to the changing situations, and to travel through unknown and unfamiliar territories.

Automated Vehicles Classification



Self-driving vehicles can be classified as below:
A: Driver has total control of vehicle all the times.
B: There are some vehicle controls which are automated, for e.g. automatic braking.
C: More than one control can be automated simultaneously, for e.g. cruise control and lane keeping.
D: The driver can give up control in certain situations
E: Driver is not needed to play any part in the driving process at all.


Advantages of Driverless Cars

  • Driverless cars will be safer, because 80% of car crashes are caused by driver error. There would be no bad drivers, drunk and drugged drivers on the road if cars are driverless.
  • Travel times can be reduced drastically as the vehicle can automatically increase speed as per the traffic situation.
  • There will be no fatigue and tiresomeness due to continuous driving.
  • Sensors can see far ahead than human senses, so it can detect smaller obstacles on the road.
  • Car will park itself; no need to waste time finding a parking place.
  • Self-driving cars can save on fuels due to efficient and smooth driving
  • Passengers will experience a smooth and comfortable riding.
  • There will be no need for driving licenses or tests. People of any kind like disabled, elder citizens also can enjoy the car travel without a driver.
  • Autonomous cars are more self-aware, so car thieves have no hope any more.


Disadvantages of Driverless Cars

  • Driverless cars will be more expensive.
  • A computer malfunctioncan cause crashes or big accidents.
  • Hackers can intrude into the vehicle's software and controlits operation.
  • Heavy rain can interfere with roof-mounted laser sensors, and snow can block the cameras.
  • Terrorists can load self-driving cars with explosives and able to send to the desired target.
  • Truck and taxi drivers maylose their jobs
  • Human signals like hand signals are difficult for a computer to understand.


Software Languages Used:

Some of the software languages used on the self-driving vehicles are as below:
  • C++
  • Python
  • Matlab
  • Java



New Autonomous Vehicle Software

Oxbotica, an Engineering Science Research Company has developed a new software system for converting regular cars into driverless vehicles.

The systemcalled Selenium can take in data through visual cameras, laser scanners, or radar systems. Then, through a series of algorithms,the system can identify where the car is now, and what surrounds the car, and how it can move smoothly to the target location, avoiding the obstacles.

Software Programming Courses & Networking Training in Cochin

Soften Technologies offers software programming courses and networking training and certification in Cochin, Kerala. ASP.NET, PHP, Java, Android, Embedded Systems, Software Testing are offered along with networking training like CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert) certifications, RHCE (Red Hat Certified Engineer), and Linux.


CALL: 8129199511, 0484 4037036 for your queries.

Email: softentechnologiescochin@gmail.com