CYBER SECURITY IN INDIA



Similar documents
CYBER SECURITY IN INDIA'S COUNTER TERRORISM STRATEGY

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

National Cyber Security Policy -2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Computer Networks & Computer Security

Hackers: Detection and Prevention

NATO & Cyber Conflict: Background & Challenges

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Certified Cyber Security Analyst VS-1160

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Penetration Testing Service. By Comsec Information Security Consulting

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

CYBERSPACE SECURITY CONTINUUM

INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Network Security and the Small Business

Hybrid Warfare & Cyber Defence

GAO INFORMATION SECURITY. Computer Attacks at Department of Defense Pose Increasing Risks

NETWORK SECURITY ASPECTS & VULNERABILITIES

E-BUSINESS THREATS AND SOLUTIONS

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

California State University, Chico. Information Security Incident Management Plan

Managing Cyber Risk through Insurance

National Cyber Crime Unit

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Application Intrusion Detection

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

DATA PROTECTION LAWS OF THE WORLD. India

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

FORMULATION OF CYBER SECURITY STRATEGY FOR PAKISTAN

Internet Safety and Security: Strategies for Building an Internet Safety Wall

What legal aspects are needed to address specific ICT related issues?

Defending Against Data Beaches: Internal Controls for Cybersecurity

CYBER CRIME AWARENESS

COB 302 Management Information System (Lesson 8)

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

The Four-Step Guide to Understanding Cyber Risk

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

2 Gabi Siboni, 1 Senior Research Fellow and Director,

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

The Battlefield. critical infrastructure:

AT A HEARING ENTITLED THREATS TO THE HOMELAND

EXIN Information Security Foundation based on ISO/IEC Sample Exam

IQware's Approach to Software and IT security Issues

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cracking and Computer Security

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

Protecting Organizations from Cyber Attack

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Identifying Cyber Risks and How they Impact Your Business

Cyber security Country Experience: Establishment of Information Security Projects.

Data Management & Protection: Common Definitions

CHAPTER 10: COMPUTER SECURITY AND RISKS

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Information Technology Cyber Security Policy

How Secure is Your SCADA System?

Vulnerability Assessment & Compliance

CRYPTUS DIPLOMA IN IT SECURITY

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cyber/ Network Security. FINEX Global

EC Council Certified Ethical Hacker V8

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

How To Use A College Computer System Safely

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

International Journal of Enterprise Computing and Business Systems

2012 NCSA / Symantec. National Small Business Study

Computer Security Maintenance Information and Self-Check Activities

Risk Assessment Guide

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

IY2760/CS3760: Part 6. IY2760: Part 6

Defending Against Cyber Attacks with SessionLevel Network Security

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Information Security Incident Management Guidelines

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Transcription:

CYBER SECURITY IN INDIA Introduction In the last couple of decades India has carved a niche for itself in the field of Information technology. Optimization of Information technology in Banking, Defence, Services, and Telecom sectors to name a few has therefore also exposed them vulnerable to Cyber attacks. Such attacks can be so enormous as to collapse our economic system. Information technology has exposed the user to such a huge data bank that conventional warfare is replaced by Cyber attacks crippling the whole economic, defence and security system of any nation. This newly added dimension to terrorize is now frequently being exploited by anti-national groups to use the cyber space to carry out their evil designs. More frightening it is to digest the thought that means to counter such attacks are very limited and absent sometimes. Meaning of Cyber Terrorism Cyber terrorism can be defined as-...the convergence of terrorism and cyber space. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks and information stored therein when done to intimidate or coerce a government or its people in the furtherance of political or social objectives. Further to qualify as cyber terrorism, an attack should result in violence against persons or property or at least cause enough harm to generate fear. Attacks that lead to bodily injury or deaths, explosions, plane crashes, water contamination or severe economic loss would be examples... This however comprehensive definition suffers the limitation of focusing more on conventional attacks. Terrorists may direct an attack to disrupt key economic activities and create more panic than conventional attacks. During the recent unearthing of terrorist networks the most outstanding feature has been use of techno tools like Cellular phones, Satellite phones(who can forget the 26/11 Mumbai Attack) and e-mails and have mastered the use of Laptops and Tablet PCs to give finesse to their nefarious designs. The architects of terror are now becoming more techno savvy.

Modes of Cyber Attacks Use of computer viruses and worms is most popular weapons in Cyber terrorism; however it can be classified broadly into the following categories- 1).Physical Attack- Damaging the Cyber system by use of conventional methods like bombs, fire etc. 2).Syntactic Attack- Damaging by modifying the logic of the system to introduce delayed processing or making the system unpredictable by introducing computer viruses, worms, Trojans etc. 3).Semantic Attack- This exploits the confidence of the user in the system. Information keyed in the system at the entry and exit modifies the information already stored by inducing errors without the knowledge of user. Cyber terrorism, besides paralyzing the computer infrastructure has gone far beyond by usage of Internet in designing and uploading websites on which false propaganda can be posted bringing it under the category of Psychological Warfare. Tools of Cyber Terrorism Cyber terrorists unleash this new age terrorism by utilizing tools like- 1).Hacking- Any kind of unauthorized access to a computer or network of computers using ingredients technologies Packet sniffing, Tempest attacks, Password cracking, and Buffer outflow etc. 2).Trojans- Programmes pretending to do one thing while actually meant to do something entirely different like the woodan trojan horse of 12th century B.C. 3).Computer Viruses- A computer programme infecting the existing programmes thereby making them unpredictable. 4).Computer Worms- These are self contained programmes or a set of programmes able to spread

functional copies of itself or its segments to other computer systems usually via network connections. 5).E-Mail related Crimes- Worms and Viruses are used for spreading threats and defamatory stuff by attaching them to host programmes. 6).Denial of Services- Attacks aimed to deny access to a computer or network to duly authorized persons. 7).Cryptology- Encryption of voice/data links to disseminate terror which cannot be viewed or heard by a person without knowledge of encryption code. Challenges to our National Security Dependence on IT Sector is increasing day by day in every field. India is also shifting gears to E- Governance. Government departments like Income tax, Passports, visas are under the realm of it. Police and Judiciary are following the same suit. Travel, Banking, Stock Markets can't even think of functioning without full scale computerization. Havocs in these by means of InfoTech can be catastrophic and irreversible. The major challenges and concerns are- 1. Lack of awareness and the culture of Cyber security at individual as well as institutional level. 2. Lack of trained and qualified human resources to implement counter measures. 3. Lacunae in the Information Technology Act and age old Cyber laws. 4. E-Mail account policy is not present in most of the key areas like police, defiance forces etc. 5. Existing Cyber Security Initiatives- Some counter initiatives to control Cyber attacks are- National Informatics Centre- A premier government body providing network backbone and E-Governance support to Central, State Governments, and to other state bodies.

Indian Computer Emergency Response Team- Also known as Cert-In is the most important constituent of India's Cyber community for enhancing the security communications and infrastructure through proactive action and effective collaboration aimed at security incident prevention and response and security assurance. National Information Security Assurance Programme (NISAP)- This is for Government and Critical Infrastructures. The highlights are- 1. Government and critical infrastructures to have a security policy and create a point of contact. 2. Mandatory for organizations to implement security control and report any security incident to Cert-In. Cert-In to create a panel of auditors for IT security. All organizations to be subject to a third party audit from this panel once a year and Cert-In to be reported on security compliance on periodic basis. Indo-US Cyber Security Forum(IUSCSF)- Set up in 2001 this high powered delegation aims at- 1. Setting up of an India Information Sharing and Analysis Centre(ISAC) for better cooperation in anti-hacking measures. 2. Setting up an alliance with Confederation of Indian Industries(CII) awareness programmes about threats in Cyberspace. 3. Increasing cooperation between India's Standard Testing and Quality Certification(STQC) and US National Institute of Standards and Technology(NIST). 4. Setting of R&D Groups on Cyber security, Cyber Forensics and Anti spasm research. Suggestions-

The threat of Cyber Attacks can be tackled through the following initiatives- Need to sensitize common citizen about dangers of Cyber Terrorism. Aggressive Strategy at academic level through involvement of Cert-In professionals. Joint effort by all Government agencies to attract qualified and skilled personnel. Cyber security not to be given mere lip service and bureaucratic dominance be avoided. Cyber security agreements to be given utmost importance. More investment in this field in terms of Finance and Manpower. Close vigil on recent developments in the IT sector of our potential adversaries. Conclusion- The landscape of terrorism will entirely change and jeopardize the national security if the nexus between Hacker and Terrorists remain unchecked. A common vision to ensure Cyber security is the call of the day. Author Name: Samir Dixit Designation: Asst. Professor (Laws) College of Law & Legal studies Teerthankar Mahaveer University Moradabad (U.P.),