Skip to playerSkip to main contentSkip to footer
  • 5/17/2025
भारत पाक तनाव के बीच पूरे देश में साइबर अटैक का खतरा बढ़ा है. इस बीच प्रशासन अलर्ट मोड में है.

Category

🗞
News
Transcript
00:00Baiti dino bharat or paakistan ke bich mein tanah ki sthiti bani hoi thi
00:04Lekin abhi hai sthiti bhale hi tal gai hai
00:08Lekin khatra abhi bhi mandra raha hai
00:10Bharat per paakistan chin ke sath mil kar
00:14Cyber attack karne ki firaak mein hai
00:16Aisame chandigarh prashashan ki or se
00:19Cyber attack ko lhe kar eka advisory jari ki gai hai
00:22Jahaan per sabhi ko satark rehnene ki hidayat di gai hai
00:26Hum is samay chandigarh ke engineering college me hai
00:29Jahaan per cyber security center hai
00:33Jis ko nirdeish karthi hai
00:36Professor Divya Bansal
00:38Aayyeo nse baat karthi hai
00:40Ki ye joh cyber attack hai
00:42Ye kis tarha hamla kar sakta hai
00:44Namaskar ma'am
00:45Namaskar
00:46Ma'am cyber attack ki baat ki gai hai
00:49Aur prashashan ki or se advisory bhi jari ki gai hai
00:53To kis tarha ki advisory jari ki gai hai
00:55Kis tarha satark rehnene ke liye kaha gya hai
00:57Toh dekhi hai
00:58Jho humari ministry of electronics and IT hai
01:02Unho ne ek critical infrastructure IT management plan bana ya tha
01:07Aur us ke niyukth
01:09Us crisis management plan ke niyukth
01:11Har organization mein
01:13Har department joh unka hooga
01:15Government department hooga
01:16Unka ek chief security chief information security officer ho na
01:19Niwara hai hai
01:21Toh us department pere agar koi bhi cyber attack ho ta hai
01:25Ya us ko security ke liye strengthen karna hai
01:27Uska incident response kaise karna hai
01:29Us sab ki handling ke liye
01:31Jho chief information security officers hai
01:33Jhi ne siso kaha jata hai
01:34In ko niyukth
01:36Inki niyukthi ensure karna ke liye
01:38He advisory jari ki gai hai
01:40Ma'am cyber attack ki baat kare hai
01:43Kyunki bhale hi border par sthiti tanap puran thi
01:46Aisai me cyber attack ki kis tarha ki threat
01:50Jho bharat ko mil raha hai
01:53Ya mil sakti hai
01:54Haa toh aap ne dekha hoga ki
01:57Jaisa ki Ukraine Russia ke case me bhi
02:00Jho cyber attacks hai
02:01Woh target kiye goye thai
02:03Jho critical information infrastructure hai
02:05Toh ab jho hai
02:07Wars jho hai
02:09Uska ek ye pánchma dimension hai
02:10Jisko hum information warfare bholte hai
02:12Toh ye jho land sea or sky
02:14Aap dekh rahe hai hai
02:15Usme toh jang
02:16Aap ne dekha kis tarha ka konflikt huo
02:19Or kiise
02:19Aamari military forces
02:21Ne bhoat achha
02:22Bhoat achhi tarha se usko lada
02:23Lekin ye jho
02:24Pánchma dimension hai
02:26Jho ki humara
02:27Information warfare ka hai
02:30Toh isme jho humara enemy state hai
02:32Voh kooshis kertai hai ki
02:33Jho humare critical IT infrastructure hai
02:35Usko niche kaise laaya jai
02:37Toh jaisa humara power sector hai
02:39Humara banking sector hai
02:40Hamaare SCADA systems hai
02:43Financial systems hai
02:45Hamaari websites hai
02:47Toh unko kisi na kisi tarhaan se
02:49Niche lane ke liye
02:50Attack kar kar
02:51Taki woh unka jho
02:53Aise time ke upar
02:54Yhe wale departments ya
02:57Sectors jho hai
02:58Woh services citizens ko na provide
03:00Kar sakhi
03:01Uske liye attacks target kia jate hai
03:03Aapne attacks ki baat ki ki
03:06Yhe jho
03:07Pura system hai
03:09Jis se
03:09Sameh bharat
03:10Jjudha hua hai
03:11Even
03:11UPI
03:12Top level
03:14Per
03:14Istimal kiya jata hai
03:16Toh kia is tarha ki financial attacks
03:18Par bhi
03:19Financial par bhi attack
03:20Hota hai
03:21Bilkul
03:22Unka objective
03:22Hi
03:23Toh unka objective
03:24Hai ki
03:25Jis
03:26Cheez ke upar
03:26You know
03:27Humara jho finance
03:28Economics hai
03:29Woh zyada depend
03:30Kertata hai
03:31Ya
03:31Koonsi
03:31Ais
03:32Essential
03:32Services
03:33Jis
03:34Jis
03:35Ko
03:35Hemare
03:35Citizens
03:36Use
03:36Kertate
03:36Jis
03:37Jis
03:37Me
03:37Aapka
03:37Jho
03:37UPI
03:38Banking
03:39Hai
03:39Yhe
03:39Sab
03:39Bhi
03:39Aata
03:39Hai
03:40Unko
03:40Attack
03:40Karna
03:41Unko
03:41Niche
03:41Leke
03:41Aana
03:42Unka
03:42Udash
03:42Hi
03:43Ye
03:43Baat
03:46Karin
03:46Ki
03:46Cyber
03:47Attack
03:48Se
03:48Related
03:48Training
03:49Ki
03:49Aap
03:49Chandigar
03:50Police
03:50Ke
03:50Saat
03:50Bhi
03:51Kama
03:51Kama
03:52Chandigar
03:52Police
03:52Ko
03:52Bhi
03:53E
03:53Tarah
03:53Se
03:53Kahi
03:54Na
03:54Kahi
03:54Kaisis
03:55Me
03:55Madad
03:55Karpa
03:56Toh
03:56Ye
03:56Atax
03:57Kis
03:58Tarah
03:58Ke
03:58Chandigar
03:59Me
03:59Dekhe
03:59Jate
03:59Kis
04:00Tarah
04:00Polis
04:00Aap
04:01Kaisat
04:01Kama
04:01Kati
04:01Jho
04:03Abhi
04:04Hame
04:04Nek
04:04Atax
04:05Dekhye
04:05Hai
04:05Basically
04:06Uska
04:06Jho
04:06Nature
04:07Almost
04:07Pura
04:08India
04:08Me
04:08Same
04:08Hi
04:08Raha
04:09Hai
04:09To
04:10Jais
04:10Aap
04:10Nek
04:11Khud
04:11Hi
04:11Kaha
04:11Upi
04:12Based
04:12Financial
04:13Frauds
04:13Hai
04:14Ye
04:14Bohut
04:14Zyadha
04:15Hai
04:15Or
04:16Is
04:16Is
04:17Vakt
04:17In
04:17Particular
04:18China
04:19Ne
04:20Eks
04:20Malware
04:21Zari
04:21Kiya
04:22Hai
04:22Jho
04:22Ki
04:22Eks
04:22File
04:23Danse
04:24Of
04:24Hilary
04:24Karke
04:25To
04:25Ki
04:26Jho
04:26Ki
04:26Pdf
04:27Or
04:27Word
04:27Document
04:27Ka
04:28File
04:28Jho
04:28Whatsapp
04:29Channels
04:29Or
04:29In
04:30Sub
04:30Ketru
04:30Propagate
04:31Kaya
04:31Jata
04:31Hai
04:31To
04:31Koi
04:32Bhi
04:32Agar
04:32Us
04:32File
04:32Ko
04:33Jais
04:33Kho
04:34Ta
04:34Hai
04:34To
04:35Us
04:35Ke
04:36Jo
04:36System
04:37Me
04:37Ya
04:37Phone
04:38Me
04:38Ho
04:39Malware
04:39Spread
04:39Jata
04:40Jis
04:40Seki
04:40Utki
04:41Files
04:41Ko
04:41Damage
04:42Karte
04:42Hai
04:42Ya
04:42Fier
04:43Sensitive
04:43Documents
04:43Nikal
04:44Kar
04:44Kis
04:45Or
04:45Cloud
04:46Kee
04:46O
04:46Par
04:46Waha
04:47Par
04:47Se
04:47Steal
04:47Kee
04:48Jate
04:48Hai
04:48To
04:49Nature
04:49Of
04:50Frauds
04:51Hai
04:51Almost
04:52Sare
04:52Common
04:53Hai
04:53Voice
04:54Based
04:55VoIP
04:55Jis
04:56Koe
04:56Voice
04:57Over
04:57IP
04:57Based
04:57Frauds
04:58Bohut
04:58Common
04:58Hai
04:59Canada
05:00Calling
05:00Whale
05:04Fishing
05:05Vishing
05:05Ye
05:05Sare
05:06Attacks
05:06Dek
05:06Jis
05:07Me
05:07Ki
05:07Bahaar
05:08Se
05:09Call
05:09Ata
05:09Hai
05:09Kis
05:10Kis
05:12Koe
05:12Bhout
05:12Urgency
05:13Koe
05:13Saat
05:13Call
05:13Kia
05:14Jata
05:14Hai
05:14Kya
05:14Aap
05:14Ke
05:15Be
05:15Ti
05:15Ko
05:15Ye
05:15Ho
05:15Gaya
05:15Aap
05:16Kaa
05:16Arrest
05:16Ho
05:16Gaya
05:17Ya
05:17Firm
05:17Is
05:17Tarah
05:17Kee
05:17Urgent
05:18Situation
05:18Me
05:18Emergent
05:19Situation
05:19Me
05:19To
05:20Us
05:20Tarah
05:20Ka
05:20Emergent
05:21Sik
05:21Kare
05:22Diya
05:22Jata
05:22Hai
05:22Taki
05:23Psychologically
05:24Weak
05:25Ho
05:25Jaya
05:25Or
05:25Correct
05:26Decisions
05:26Nahin
05:27Lep
05:27Paya
05:27Or
05:27Us
05:27Time
05:28Ke
05:28O
05:28Par
05:28Unki
05:29Jo
05:29Bhi
05:29Vulnerability
05:30Hot
05:30Hot
05:30Tee
05:30Hai
05:31Unki
05:31Sistem
05:32Ko
05:32Compromise
05:32Karke
05:33Unse
05:33Unka
05:33OTP
05:34Lekar
05:34Transactions
05:35Kar
05:35Liy
05:36Jati
05:36Hai
05:36Or
05:37By
05:37The
05:37Time
05:38Woh
05:38Ek
05:38Bank
05:38Me
05:39Paisa
05:39Jata
05:39Hai
05:40Woha
05:40Se
05:40Dispers
05:41Karke
05:41Bohut
05:42Lumbi
05:42Chain
05:42Me
05:43Distribute
05:43Kar
05:43Dia
05:43Jata
05:44Hai
05:44Taki
05:44Investigation
05:45Bohut
05:45Mushkil
05:45Ho
05:45Jaya
05:46To
05:46Hem
05:47Ne
05:47Is
05:47Tar
05:47Ha
05:47K
05:47Bohut
05:48Common
05:48Attacks
05:48Dek
05:49To
05:49Hem
05:49In
05:50Attacks
05:50Me
05:50Jho
05:51Technical
05:52Skill
05:52Hai
05:52Us
05:53Se
05:53Social
05:54Engineering
05:54Social
05:55Engineering
05:55Psychology
05:56Use
05:57Ki
05:58Stress
05:58Situation
05:59Create
05:59Karna
05:59Urgency
06:00Create
06:00Karna
06:01Par
06:01Na
06:01Dabaw
06:02Dalna
06:02Or
06:02A
06:03Cheez
06:03Kud
06:03Se
06:03Kar
06:04Va
06:04Lena
06:04Ha
06:06Ha
06:06To
06:07Us
06:07Se
06:08Related
06:09I
06:09Think
06:0960
06:13Bharat
06:17Pakistan
06:17Ke
06:17Bheat
06:18Jib
06:18Tanab
06:18Ben
06:19Ra
06:19Tha
06:19To
06:19Us
06:20Dhor
06:20An
06:20Pakistan
06:20Ki
06:21Hit
06:21List
06:21Me
06:21Chandigar
06:22Ko
06:22Bhi
06:22Dekha
06:22Gya
06:23Hai
06:23Yaha
06:24Par
06:24Defense
06:25Ki
06:25Or
06:25Se
06:26Special
06:26Teams
06:27Or
06:27Yaha
06:27Taki
06:28Air
06:28Port
06:28Ko
06:28Bhi
06:28A
06:29Under
06:30Liya
06:31Gya
06:31Tha
06:31To
06:31Defense
06:32Ke
06:32Saat
06:33Aap
06:33Kis
06:33Tanah
06:33Kam
06:33Karna
06:34Rhe
06:34H
06:34H
06:34H
06:35H
06:35Kis
06:35Tanah
06:36N
06:36M
06:37Dekh
06:43Bhi
06:43Ham
06:44Loh
06:44Is
06:45Ba
06:45Rhe
06:45Min
06:45Zah
06:45Da
06:45Ba
06:46N
06:46K
06:46K
06:46K
06:47Bhat
06:47A
06:47G
06:48Bho
06:48H
06:48Bho
06:49T
06:49T
06:50A
06:51Domain
06:51Ho
06:52Ta
06:52Jis
06:52Ko
06:52Open
06:52Source
06:52Intelligence
06:53Pola
06:53Jata
06:54Hai
06:54To
06:54Jho
06:54Intelligence
06:55Gathering
06:55Ki
06:55Jati
06:56Hai
06:56Har
06:57Country
06:57Ka
06:57Jo
06:57Defense
06:58Ho
06:58Ta
06:58Bho
06:59At
06:59Alag
06:59Alag
06:59Darhans
07:00Se
07:00Intelligence
07:00Go
07:00Gather
07:01Kata
07:01A
07:01Human
07:02Intelligence
07:02Pola
07:02Jata
07:03A
07:03Signal
07:03Intelligence
07:13our social media and online platforms have a very sensitive information on them.
07:19Pakistan is also the way that if someone has a very sensitive information,
07:24it is not necessary that they will email it or do it with a secure channel.
07:29Because they know that their channels have surveillance and spying.
07:34So they have a very different handle, which is not popular,
07:39and there is a lot of traffic on their internal videos or cryptic messages.
07:44So this kind of intelligence gathering is called open source intelligence.
07:50Another big change you have seen is our disinformation.
07:56Information warfare is a main research area of this research center.
08:00We have been researching for almost 8 years.
08:04Our PhD scholars, fake news, misinformation campaigns,
08:08and all of them have done PhDs.
08:11In this case, you will see that whenever there is an episode,
08:15or incident,
08:18there is a very old news that is propagated.
08:21And you will see that the news is anti-India,
08:27but the handle, the DP is made of India's flag.
08:31So there is a lot of confusion.
08:33There is a lot of confusion.
08:34There is a lot of confusion.
08:35There is a lot of Indians that are saying,
08:37but there are not Indians in the real world.
08:39When we examine it further,
08:43the IP addresses are coming from them.
08:46They are coming from Malaysia, Turkey, China.
08:50And it is not happening.
08:51It is happening.
08:52People of Pakistan are changingюсь.
08:53If we observe this data or due to how the data here
08:55you read about it or if you see it,
08:57it is not going to be done without the information.
09:00It is definitely a good school,
09:01because this is a well-planned
09:03information campaign.
09:04That is the right way of saying it is
09:05the type of information.
09:06Because it is a very well-planned
09:07information campaign.
09:08That is,
09:09and the media have also worked well with these
09:10This time, the media also fought very well, they were very sensitive and I think our first
09:20game was attacked.
09:21So, at that time, it was clearly starting to see that the narrative building, these different
09:28news channels, different countries, started to do it in foreign channels and built anti-India
09:35narratives.
09:36So, the disinformation, where is happening, how is the narrative building happening and how
09:43to deal with it.
09:45So, we give our research and our work from this.
09:51This was the Professor of the Cyber Security Center, Divya Bunsen, who told us that the
10:02Boreders, Boreders, but Cyber attack has been created.
10:07This is the case for the Chandigarh Prashashan, but the team, Professor Divya's team, the
10:14team has been looking for Cyber attack.
10:17Camera person, Kishin, with the report, ETV, Bharat.

Recommended