Words of Wisdom:

"Trying is the first step toward failure." - Wallace

Indian Sateilletes in Space

  • Date Submitted: 11/15/2011 12:53 AM
  • Flesch-Kincaid Score: 36.1 
  • Words: 1080
  • Essay Grade: no grades
  • Report this Essay
essay on Indian Satellites In Space.

For the purpose of putting Indian satellites in space, the Government established a Space Science & Technology Centre (SSTC) in 1965 in Thumba, followed by the erection of a Satellite Telecommunication Earth Station in 1967 at Ahmedabad. Since the creation of the Indian Space Research Organisation (ISRO) on August 15, 1969, in the Department of Atomic Energy, ISRO has managed India's space research and the uses of space for peaceful purposes.
In 1972, the Government established the Space Commission and the Department of Space (DOS) to conduct the nation's space activities for ISRO at four space centers across the country. DOS reports directly to the Prime Minister and ISRO was placed under DOS on June 1, 1972, and made a Government organisation on April 1, 1975 virus/worm attack, trojan attack, denial of service attack, distributed denial of service attack, e-mail spoofing, intellectual property crime, or cyber stalking.
Unauthorized access, also known as cracking as opposed to hacking, means gaining access to a system without permission of the users or without proper authority, generally done either by faking identity, or by cracking access codes. E-mail is bombing means sending a large number of mails to the victim resulting in the victims mail account (in case of individual) or server (in case of corporations) crashing.
While data diddling is a kind of attack which involves altering the raw data before it is processed by a system and re-altering it after processing, Salami attack is generally used to commit financial crimes. In salami attack the alteration so small that in a single case it would go unnoticed. For example, if a bank employee deducts five rupees from every customer's account, while the individual customers are unlikely to notice this small change but the employee will make a significant earning.
Internet time theft connotes the usage by an unauthorized person of Internet time paid for by someone else....


Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments