Advancement in The Computer Field - 1st - Chapter
Advancement in The Computer Field - 1st - Chapter
© Copyright
The Department of Employment and Training has prepared the TNPSC Group-I
Preliminary and Main Exam study material in the form of e-content for the benefit of
Competitive Exam aspirants and it is being uploaded in this Virtual Learning Portal. This e-
content study material is the sole property of the Department of Employment and Training.
No one (either an individual or an institution) is allowed to make copy or reproduce the
matter in any form. The trespassers will be prosecuted under the Indian Copyright Act.
It is a cost-free service provided to the job seekers who are preparing for the
Competitive Exams.
Commissioner,
Supercomputers play an important role in the field of computational science, and are
used for a wide range of computationally intensive tasks in various fields, including
quantum mechanics, weather forecasting, climate research, oil and gas exploration,
molecular modeling (computing the structures and properties of chemical compounds,
biological macromolecules, polymers, and crystals), and physical simulations (such as
simulations of the early moments of the universe, airplane and spacecraft
aerodynamics, the detonation of nuclear weapons, and nuclear fusion).
Supercomputers were introduced in the 1960s, and for several decades the fastest was
made by Seymour Cray at Control Data Corporation (CDC), Cray Research and
subsequent companies bearing his name or monogram.
The US has long been a leader in the supercomputer field, first through Cray’s almost
uninterrupted dominance of the field, and later through a variety of technology
companies. Japan made major strides in the field in the 1980s and 90s, but since then
China has become increasingly active in the field. As of June 2018, the fastest
Page 1
supercomputer on the TOP500 supercomputer list (a respected international tracker of
the world’s fastest supercomputers) is the Summit, in the United States, with a
LINPACK benchmark score of 122.3 PFLOPS, exceeding the previous record holder,
Surway TaihuLight, by around 29 PFLOPS. Sunnway TaihuLight’s is notable for its use
of indigenous chips and is the first Chinese computer to enter to TOP500 list without
using handware from the United States. As of June 2018, China had more computers
(206) on the TOP500 list than the United States (124); however, US built computers
held eight of the top 20 positions, the U.S. has six of the top 10 and China has two.
India’s supercomputer program was started in the late 1980s because Cray
supercomputers (from the USA) were denied for import due to an arms ambargo
imposed on India, as it was a dual-use technology and could be used for developing
nuclear weapons.
As of June 2018, India has five systems on the TOP500 list ranking.
Rmax Repeak
Rank Site Name (TFlop/s) (TFlop/s)
39 Indian Institute of Pratyush (Cray – XC40) 3,763.9 4,006.2
Tropical Meteorology
66 National Centre for Mihir (Cray XC40) 2,570.4 2,808.7
Medium Range Weather
Forecasting
206 Software Company InC1 – Lenova C1040 1,123.2 1,413.1
327 Indian Institute of SERC – Cray XC40 901.5 1,244.2
Science
496 Indian Institute of Data Plex DX360M4 719.2 790.7
Tropical Meteorology
Page 2
India’s Fastest Supercomputer
• Pratyush, India’s fastest supercomputer yet, was unveiled at the Indian Institute
of Tropical Meteorology (IITM) in Pune.
• Pratysuh is a collection of several computers that can deliver a peak power of 6.8
petaflops, facilitating the weather forecasting and climate monitoring in the
country.
• It will help India with better forecasts regarding monsoon, extreme events,
cyclones, tsunamis, earthquakes, air quality, lightning, fishing, hot and cold
waves, flood and drought among others. It will enable to map regions in India at
a resolution of 3 km and the globe at 12 km.
• Pratyush is fourth fastest supercomputer in the world dedicated for
weather and climate research. It follows supercomputing machines in
Japan, US and United Kingdom. It will improve rankings of Indian
supercomputer from 300s in Top500 list, a respected international tracker of
the world’s fastest supercomputers.
FUTURE SUPERCOMPUTERS
The Indian Government has proposed to commit 2.5 billion USD to supercomputing
research during the 12th Five-year plan period (2012-2017). The project will be handled
by Indian Institute of Science (IISc), Bangalore. Additionally, it was later revealed that
India plans to develop a supercomputer with processing power in the exaflop range. C-
DAC will develop it within the subsequent five years of approval.
Page 3
THREATS TO COMPUTERS
BOTNETS:
What they are? A collection of software robots, or ‘bots’, that creates an army of
infected computers (known as ‘zombies’) that are remotely controlled by the originator.
Yours may be one of them, and you may not even know it.
1. Find weaknesses (or pre-existing bugs) in your security settings and exploit
them to access your information.
2. Install a Trojan horse, providing a back door for hackers to enter and search for
your information.
MALWARE: Malware is one of the more common ways to infiltrate or damage your
computer
What it is? Malicious software that infects your computer, such as computer viruses,
worms, Trojan horses, spyware, and adware.
1. Intimidate you with scareware, which is usually a pop-up message that tells you
your computer has a security problems or other false information.
2. Reformat the hand drive of your computer causing you to lose all your
information.
Page 4
3. Alter or delete files.
4. Steal sensitive information
5. Send emails on your behalf
6. Take control of your computer and all the software running on it.
What it is? A means to point you to malicious and illegitimate website by redirecting
the legitimates URL Even if the URL is entered correctly, it can still be redirected to
fake website.
Convince you that the site is real and legitimate by spoofing or looking almost identical
to the actual site down to the smallest details. You may enter your person information
and unknowingly give it to someone with malicious intent.
PHISHING
Phishing is used most often by cyber criminals because. It’s easy to execute and can
produce the results they’re looking for with very little effort.
What it is? Fake emails, text messages and websites created to look like they’re from
authentic companies. They’re sent by criminals to steal personal and financial
information from you. This is the known as “spoofing”.
What it does?
1. Trick you into gibing them information by asking you to update, validate or
confirm your account, it is often presented in a manner than seems official and
intimidating, to encourage you to take action.
2. Provides cyber criminals with your username and passwords so that they can
access your accounts (your online bank account, shopping accounts, etc) and
steal your credit card numbers.
Page 5
RANSOMWARE
What it is? Ransomware is a type of malware that restricts access to your computer or
your files and display a message that demands payment for the restriction to be
removed. The two most common means of infection appear to be phishing emails that
contain malicious attachments and pop-up website advertisements.
SPAM
Spam is one of the more common methods of both sending information out and
collecting it from unsuspecting people.
What it is?
Page 6
3. Phish for your information by tricking you into following links or entering details
with too-good-to-be-true offers and promotions.
4. Provide a vehicle for malware, scams, fraud and threats to your privacy.
SPOOFING
This technique is often used in conjunction with phishing an attempt to steal your
information.
What it is?
A website or email address that is created to look like it comes from a legitimate source.
An email address may even include your name, or the name of someone you know,
making it difficult to discern site that requires login or other personal information.
SPYWARE
Spyware and adware are often used by third parties to infiltrate your computer.
What it is?
Software that collects personal information about you without you knowing. They
often come in the form of a ‘free’ download and are installed automatically with or
without your consent. These are difficult to remove and can infect your computer with
viruses.
1. Collect information about you without you knowing about it and give it to third
parties.
2. Send your usernames, passwords, surfing habits, list of applications you’ve
downloaded, settings, and even the version of your operating system to third
parties.
3. Orange the way your computer runs without your knowledge
4. Take you to unwanted sites or inundate you with uncontrollable pop-up ads.
Page 7
TROJAN HORSES
What it is? A malicious program that is disguised as, or embedded within, legitimate
software. It is an executable file that will install itself and run automatically once it’s
downloaded.
VIRUSES:
1. Send spam
2. Provide criminals with access to your computer and contact lists.
3. Scan and find personal information like passwords on your computer
4. Hijack your web browser.
5. Disable your security settings.
6. Display unwanted ads.
7. When a program is running, the virus attached to it could infiltrate your hard
drive and also spread to USB keys and external hard drives. Any attachment you
create using this program and sent to someone else could also infect them with
the virus.
Page 8
WI-FI EAVESDROPPING: WiFi eavesdropping is another method used by cyber
criminals to capture personal information.
What it is? Virtual ‘listening in’ on information that’s shared over an unsecured (not
encrypted) WiFi network.
WORMS
What they are? A worm, unlike a virus, goes to work on its own without attaching
itself to files or programs. It lives in your computer memory, doesn’t damage or alter
the hard drive and propagates by sending itself to other computers in a network –
whether with a company or the internet itself.
The key reinstallation attack (or Krack) vulnerability allows a malicious actor to read
encrypted network traffic on a Wi-FI Protected Access II (WPA2) router and send
traffic back to the network.
1. Krack can affect both personal (home users, and small businesses) and
enterprise networks. Any devices that are connected to the network, such as
laptops, smartphones, smart devices, even an installed USB key, can be read by
the attacker. A malicious actor could use this vulnerability to steal sensitive
Page 9
information, and also insert malware or ransomware that would make a website
unsafe to visit.
2. Krack does not divulge Wi-Fi passwords to attackers, nor does it permit a
malicious device to be connected to the network. Krack is unable to compromise
Virtual Private Networks (VPN) or HTTPS protocols used by online shopping
and banking sites.
CYBER WARS
Cyberwarfare can present a multitude of threats to a nation. At the most basic level,
cyber-attacks can be used to support traditional warfare. For example, tampering with
the operation of air defences via cyber means to facilitate an air attack. Aside from
these ‘hard’ threats, cyber warfare can also contribute to ‘soft’ threats such as espionage
and propagnanda.
Espionage
For example Massive spying by the US in many countries, revealed Edward Snowden.
Page 10
The NSA recording nearly every cell phone conversation in the Bahamas, without the
Bahamian government’s permission, and similar programs in Kenya, the Philippines,
Mexico and Afghanistan.
The ‘Titan Rain’ probes of American defence contractors computer systems since 2003.
The Office of Personnel Management data breach, in the US, widely attributed to
China.
Sabotage
Computers and satellites that coordinate other activities are vulnerable components of
a system and could lead to the disruption of equipment. Compromise of military
systems, such as C41STAR components that are responsible for orders and
communications could lead to their interception or malicious replacement. Power,
water, fuel, communications, and transportation infrastructure all may be vulnerable to
disruption. According to experts, the civilian realm is also at risk, nothing that the
security breaches have already gone beyond stolen credit cared numbers and that
potential targets can also include the electric power grid, trains, or the stock market.
In mid July 2010, security experts discovered a malicious software program called
Stuxnet that had infiltrated factory computers and had spread to plants around the
world. It is considered “the first attack on critical industrial infrastructure that sits at
the foundation of modern economies,”.
Stuxnet, while extremely effective in delaying Iran’s nuclear program for the
development of nuclear weaponry, came at a high cost. For the first time, it became
clear that not only could cyber weapons be defensive but they could be offensive. The
large decentratlization and scale of cyberspace make it extremely difficult to direct
from a policy perspective. Non-state actors can play as large a part in the cyberwar
space as state actors, which leads to dangerous, sometimes disastrous, consequences.
Small groups of highly skilled malware developers can as effectively impact global
politics and cyber warfare as warfare as large governmental agencies. A major aspect of
this ability lies in the willingness of these groups to share their exploits and
developments on the web as a form of arms proliferation. This allows lesser hackers to
Page 11
become more proficient in creating large scale attacks that once only a small handful
was skillful enough to manage. Also, thriving black markets for these kinds of cyber
weapons are buying and selling these cyber capabilities to the highest-bidder without
regard for consequences.
Denial-of-service attack
The federal government of the United States admits that the electric power grid is
susceptible to cyberwarfare. In April 2009, reports surfaced that China and Russia had
infiltrated the U.S. electrical grid and left behind software programs that could be used
to disrupt the system, according to current and former national security officials. The
North American Electric Reliability Corporation (NERC) has issued a public notice that
warns that the electrical grid is not adequately protected from cyber attack. China
denies intruding into the U.S. electrical grid. One countermeasure would be to
disconnect the power grid from the Internet and run the net with droop speed control
only. Massive power outages caused by a cyber attack could the economy, district from
a simultaneous military attack, or create a national trauma.
Page 12
Propaganda
Economic disruption
In 2017, the WannaCry and Petya cyber attacks, masquerading as ransomware, caused
large-scale disruptions in Ukraine as well as to the U.K.’s Nation Health Service,
pharmaceutical giant Merck, Maersk shipping company and other organizations
around the world. These threats have been recognized as the onset of the fifth
generation cyber attacks.
The rise of cyber as a warfighting domain has led to efforts to determine how
cyberspace can be used to foster peace. For example, the German civil rights panel FifF
runs a campaign for cyberspace – for the control of cyberweapons and surveillance
technology and against the militarization of cyberspace and the development and
stockpiling of offensive exploits and malware. Measures for cyber peace include
policymakers developing new rules and norms for warfare, individuals and
organizations building new tools and secure infrastructures, promoting open source,
the establishment of cybersecurity centers, auditing of critical infrastructure
cybersecurity, obligations to disclose vulnerabilities, disarmament, defensive security
Page 13
strategies, decentralization, education and widely applying relevant tools and
infrastructures, encryption and other cyberdefenses.
Questions:
Page 14