Introduction
Threat to cyber security is constantly evolving with the evolution of newer and newer technologies and therefore, a coordinated multi-layered approach is imperative to protect the ICT networks through multiple line of strategies-National and international, Public & Private efforts besides bilateral and multilateral cooperation. Unless effective steps are taken by all the stake holders including service providers, government and the users, Cyber Crime Eco Systems would flourish to inflict maximum damage to the public which are now becoming more and more dependent on information technology in the upcoming digital world.
While cyber security issues have been lurking in the background for some time, year 2009 has seen a new beginning when President Barack Obama, while as a candidate for the White House, pledged to elevate cybersecurity as a national-security issue, equating it in significance with nuclear and biological weapons . US has now established Cyber Command with many nations contemplating the issue.
Scope
The subject would be dealt under the following heads for ease of assimilation and understanding :-:
Cyber terrorism.
Cyber security.
Various Definitions
Threats and targets.
Offensive tools.
Defensive tools.
Implementation.
Conclusion.
Methodology
The study of above mentioned topics is intended to be carried out through published material in websites, literature and certain underground sites which espouses themselves solely to hacking and other issues.
A blog would be created wherein our comments, observations and learning would be recorded for posterity.
Conclusion
Initial survey of the topic has lead us to a belief albeit temporary that there is virtually no research base on which truly secure systems are built and that there exists a minuscule of researchers who are thinking deeply about these problems.
While the immediate problems of cyber systems is being overcome by implementing “best piecemeal practices”, the fundamental problems has not been addressed. The reason is not difficult to observe. For historical reasons, no federal/Govt funding agency has assumed responsibility for supporting basic research in this area—as no funding agency feels it "owns" this problem.
In the absence of well established literature, it is intended to attempt systematic learning to cover various basic concepts to include definitions. Certain passive and active measures to include counter measure are also envisaged to be dealt in this maiden attempt.