About the USCYBERCOM or Lucideus……

Anany sharma
5 min readJan 27, 2021

--

1- First we talk about the most powerful country the United States of America….

United States of America

In America, USCYBERCOM manipulates the function of cyber, USCYBERCOM comes under the DOD (United States Department of Defense).

USCYBERCOM was founded in 2009 at the NSA headquarters in Fort George G. Meade, Maryland.

Work of USCYBERCOM

USCYBERCOM teams guard the Pentagon’s networks against rivals like Iran North Korea, China, and Russia and struggle thousands of actors like terrorist crowds and expert hackers.

USCYBERCOM

General Paul M. Nakasone

General Paul M. Nakasone considered his present duties as Commander, U.S. Cyber Command and Director, Chief, Central Security Service in 2018, On January 2021, the New York Times published that General Nakasone and other officials responsible for cybersecurity missed an extensive network intrusion operation mounted by Russian cyber-criminals for over nine months.

General Paul M. Nakasone (Director of the National Security Agency and Chief of the Central Security Service)

2- Lucideus

Lucideus was found in 2012 in New Delhi India Lucideus is an international enterprise cybersecurity company, The first customer of Lucideus was Tata sky(A Telecom company in India). In 2016, Lucideus was responsible for the security evaluation/analysis of the BHIM application, an Adhar mobile payment platform built by the National payment corporation of India.

Saket Modi is a co-founder of Lucideus, He has evaluated cyber walls of companies like Google Pay, BookMyShow, MiPay, etc. He is more than just a computer science graduate, an entrepreneur, and a Whitehathacker. He is also the Indian Ambassador of Cyber Security in Education at the National Education Awards 2013.

In a freewheeling chat with YS Weekender, Saket Modi, CEO Lucideus talks about his first hack in school, During his school days, Saket was an average student, except when it came to math and computer science, as he was always excelling in those subjects. And his love for programming was set early in life. His first hack wasn’t a decent hack, after all, Saket admits. Finding it difficult to clear his chemistry papers in Class XII, his teacher warned him that he would have to definitely pass the pre-boards in to stand a chance at the boards. “So, he had to do something. “And the ‘something’ was definitely not studying,” Saket laughs on conservation. He went on to get his hands on the chemistry question paper right before the exam by hacking. He basically downloaded a free tool from the internet to hack a password-protected word file. It’s not a big deal for him. he had the password within three hours, but Saket informed his teacher, and did not cheat in the exams.

Saket Modi

Let's talk about the punishment for cybercrime in the world

Cybercrime is an illegal activity that targets computers, a computer network, or a machine. In simple words It is an act of bullying, harassing, or threatening someone using the Internet.

1- India

In India, A person who intentionally destroys, or alters any computer source code (computer commands, design, and layout), when it is required to be maintained by law charges a crime and can be punished with 3 years’ detaining or a fine of 2 Lakhs, or If a person cheats someone using a computer resource or a communication device, he/she could face imprisonment up to 3 years or/and fine up to 1 Lakh INR.

2- USA

Computer hackers in the USA go to prison for 10 years for a first attack, and a recidivist gets up to 20 years in prison. Also, any attempt to cause harm to computers will result in dangerous problems. Even if there is no explicit damage, the attempt to cause damage to the computer would be punished by the legislative provisions. The scale of damage is estimated by the sum of the overall damage in one year. In particular, defense or national security cases can be punished without any proof.

3- Germany

1- Any person who obtains without authorization, for himself or for another, data which are not meant for him and which are specially protected against unauthorized access, shall be liable to imprisonment for a term not exceeding three years or to a fine.
2 Data within the meaning of subsection 1 are only such as are stored or transmitted electronically or magnetically or in any form not directly visible.

QUOTES

1-” Cybersecurity needs women to be successful and without them, it will not as the best talent a must.” ― — - Ian R. McAndrew, PhD

2-” Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.” — — Anna Maria Chavez

3- “The nature and scope of security threats in the cyber era are four-dimensional compared to the early nuclear age.” — — — -Ben Sasse

4-” You may have heard of Black Friday and Cyber Monday. There’s another day you might want to know about: Giving Tuesday. The idea is pretty straightforward. On the Tuesday after Thanksgiving, shoppers take a break from their gift-buying and donate what they can to charity.” — — — — Bill Gates

5- “Information is wealth.” — -

So beware😈😈😈😈😈👹👹 from cyber attacks and follow or share our page WIZARDING CODES for the latest updates Thank you for visit — — — — ANANY SHARMA(WIZARDING CODES)

--

--

Anany sharma
Anany sharma

Written by Anany sharma

Security used to be an inconvenience sometimes, but now it’s a necessity all the time. — Martina Navratilova.

No responses yet