About the USCYBERCOM or Lucideus……
1- First we talk about the most powerful country the United States of America….
In America, USCYBERCOM manipulates the function of cyber, USCYBERCOM comes under the DOD (United States Department of Defense).
USCYBERCOM was founded in 2009 at the NSA headquarters in Fort George G. Meade, Maryland.
Work of USCYBERCOM
USCYBERCOM teams guard the Pentagon’s networks against rivals like Iran North Korea, China, and Russia and struggle thousands of actors like terrorist crowds and expert hackers.
General Paul M. Nakasone
General Paul M. Nakasone considered his present duties as Commander, U.S. Cyber Command and Director, Chief, Central Security Service in 2018, On January 2021, the New York Times published that General Nakasone and other officials responsible for cybersecurity missed an extensive network intrusion operation mounted by Russian cyber-criminals for over nine months.
2- Lucideus
Lucideus was found in 2012 in New Delhi India Lucideus is an international enterprise cybersecurity company, The first customer of Lucideus was Tata sky(A Telecom company in India). In 2016, Lucideus was responsible for the security evaluation/analysis of the BHIM application, an Adhar mobile payment platform built by the National payment corporation of India.
Saket Modi is a co-founder of Lucideus, He has evaluated cyber walls of companies like Google Pay, BookMyShow, MiPay, etc. He is more than just a computer science graduate, an entrepreneur, and a Whitehathacker. He is also the Indian Ambassador of Cyber Security in Education at the National Education Awards 2013.
In a freewheeling chat with YS Weekender, Saket Modi, CEO Lucideus talks about his first hack in school, During his school days, Saket was an average student, except when it came to math and computer science, as he was always excelling in those subjects. And his love for programming was set early in life. His first hack wasn’t a decent hack, after all, Saket admits. Finding it difficult to clear his chemistry papers in Class XII, his teacher warned him that he would have to definitely pass the pre-boards in to stand a chance at the boards. “So, he had to do something. “And the ‘something’ was definitely not studying,” Saket laughs on conservation. He went on to get his hands on the chemistry question paper right before the exam by hacking. He basically downloaded a free tool from the internet to hack a password-protected word file. It’s not a big deal for him. he had the password within three hours, but Saket informed his teacher, and did not cheat in the exams.
Let's talk about the punishment for cybercrime in the world
Cybercrime is an illegal activity that targets computers, a computer network, or a machine. In simple words It is an act of bullying, harassing, or threatening someone using the Internet.
1- India
In India, A person who intentionally destroys, or alters any computer source code (computer commands, design, and layout), when it is required to be maintained by law charges a crime and can be punished with 3 years’ detaining or a fine of 2 Lakhs, or If a person cheats someone using a computer resource or a communication device, he/she could face imprisonment up to 3 years or/and fine up to 1 Lakh INR.
2- USA
Computer hackers in the USA go to prison for 10 years for a first attack, and a recidivist gets up to 20 years in prison. Also, any attempt to cause harm to computers will result in dangerous problems. Even if there is no explicit damage, the attempt to cause damage to the computer would be punished by the legislative provisions. The scale of damage is estimated by the sum of the overall damage in one year. In particular, defense or national security cases can be punished without any proof.
3- Germany
1- Any person who obtains without authorization, for himself or for another, data which are not meant for him and which are specially protected against unauthorized access, shall be liable to imprisonment for a term not exceeding three years or to a fine.
2 Data within the meaning of subsection 1 are only such as are stored or transmitted electronically or magnetically or in any form not directly visible.
QUOTES
1-” Cybersecurity needs women to be successful and without them, it will not as the best talent a must.” ― — - Ian R. McAndrew, PhD
2-” Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.” — — Anna Maria Chavez
3- “The nature and scope of security threats in the cyber era are four-dimensional compared to the early nuclear age.” — — — -Ben Sasse
4-” You may have heard of Black Friday and Cyber Monday. There’s another day you might want to know about: Giving Tuesday. The idea is pretty straightforward. On the Tuesday after Thanksgiving, shoppers take a break from their gift-buying and donate what they can to charity.” — — — — Bill Gates
5- “Information is wealth.” — -
So beware😈😈😈😈😈👹👹 from cyber attacks and follow or share our page WIZARDING CODES for the latest updates Thank you for visit — — — — ANANY SHARMA(WIZARDING CODES)