Skip to playerSkip to main contentSkip to footer
  • yesterday
डिजिटल दौर में साइबर अटैक सबसे बड़े मुद्दे के रूप में उभरा है. उत्तराखंड भी झेल चुका है कई साइबर अटैक.

Category

🗞
News
Transcript
00:00BHARAT PAKISTAN KEE BEEK CHURU HUWA TANAV FILHAL THUMJUKA HAY
00:15IS STANAV MEN PAKISTAN NEN MISIL OR DRONS SE KAY HAMLLE KIA
00:19LECIN AB AANE VALE SEMEY MEN NAY ATAK KY AASHANKKA BADH GAY HAY
00:24YET AATAK HOGA SAYBOR ATAK
00:26इस हमले की बढ़ती आशंका पर भारत सरकार ने कदम उठाया है
00:30और राजसरकारों को साइबर सुरक्षा के प्रती अलवट रहने के निर्देश्टिये हैं
00:35हाला कि इसी तरह का हमला उतराखन में साल 2024 में देखने को मिला था
00:40जब साइबर अटेक के कारण डाज़े की करीब 102 वेबसाइट बंद हो गई थी
00:44हैकर ने ITDA का पूरा सर्वर हैक कर लिया था
00:48इस मामले पर साइबर एक्सपर्ट अंकुर चंद्रकांत का कहना है
00:53कि आने वाले समय में वार मिसाइल से नहीं होगा
00:56बलकि साइबर के जरिये होगा जिसकी चपेट में सबसे पहले यूवा आएंगे
01:02इसके रिए जागरुकता और साइबर पॉलिसी का होना बेहत जरूरी है
01:06Today, whatever war will happen, it will not happen with a missile or with a mouse.
01:12The first person who will come to us is our youth.
01:15Because they are active on Instagram, Facebook and YouTube.
01:18But they are not cyber aware. They don't know what to do or what to do.
01:22What to open the files or not.
01:24And believe that there are some people who are currently in the past.
01:29Some of our top bureaucrats like Vikram Isri Ji and Lily Ji have been trolled.
01:33Actually, we have trolling, bullying or cyber threats.
01:38We are not prepared for other policies.
01:40But cyber policies are very important.
01:43They are very important.
01:44If there is such a time,
01:46the NGOs and the government to come forward,
01:50they will train more.
01:52If people train more quickly,
01:54they will be able to reach them.
01:55Awareness is the biggest thing in today's time.
01:57Cyber Export is the most important thing.
02:07CBI, CID,
02:09the law enforcement is the best.
02:10Time to time.
02:11They are very good at it.
02:12They are very good at it.
02:15But,
02:16I think,
02:17I think,
02:18some of the bureaucrats,
02:19who are far away from this thing.
02:21There is a lobby.
02:22There is a C.A. lobby.
02:23There is a C.A. lobby.
02:24C.A. lobby.
02:25There are a lot of lobbies,
02:27which are a few inches behind today.
02:29There is a lot of work load.
02:31There is a lot of work load.
02:32It does not give this importance.
02:33But,
02:34it is very crucial.
02:35Cyber attacks are very important.
02:37Cyber attacks are being made by
02:40basic cyber hygiene practice.
02:43If someone has unknown email,
02:45then verify it.
02:47Unknown attachment file
02:48Don't do it.
02:51As you are in the profession,
02:53the role of the profession,
02:54the first thing is that
02:55what you have to do is verify it.
02:58Unknown attachments
02:59Don't do it.
03:00Because,
03:01the emails are in the computer,
03:03you can hack and compromise.
03:05The other thing is that
03:06we have seen many times
03:08that the malware can clone your system
03:10so that it is a problem.
03:12The third thing is that
03:14there are emails or links
03:15that will send you
03:16to an unknown website
03:18where you will see the URL
03:19which is the domain
03:20which you will see.
03:21It will see you.
03:22The domain is actually
03:24a phishing attempt
03:25where you have a government
03:27or password
03:28and you will find it.
03:30You will believe
03:31that it is a genuine website.
03:32So,
03:33there are some changes
03:34where we should be
03:35anonymous.
03:36Data security is a huge change
03:37which is also a bill
03:38which is also related to
03:40which data security is related.
03:41It is fine
03:42that if someone has
03:43lost data,
03:44then there is a lot of
03:45millions of dollars.
03:46So,
03:47we have working professionals
03:48who are working in security
03:49or who are anonymous
03:50who are working in capacity
03:51or who are working in capacity
03:52and we have to focus on
03:53what we need to do.
03:54So,
03:55we have to focus on
03:56what we need to do.
03:57So,
03:58we have to focus on
03:59what we need to do.
04:00So,
04:01we have to focus on
04:02what we need to do.
04:03vulnerability assessment
04:04of penetration testing
04:05in our website,
04:06in our application,
04:07in our server,
04:08we have to focus on
04:09what we need to do.
04:10So,
04:11we can explore
04:14this concept of vulnerability
04:15assessment
04:16or penetration testing
04:17which is şey
04:17which means
04:18this means
04:20что
04:22to go
04:23as far as
04:24to Honey
04:25and
04:27how to
04:30come
04:31to
04:32exactly
04:34how to
04:35be
04:36to
04:37
04:40चीज डिजिटल होती जा रही है
04:42ऐसे में साइबर क्राइम से बशने का
04:44सबसे अच्छा तरीका जाग रुपता है
04:46इसके लावार साइबर क्राइम
04:48की ट्रेनिंग को बेसिक ट्रेनिंग
04:50में शामिल करने पर भी जोड देना चाहिए
04:52ETV भारत के लिए देहरदून से

Recommended