Cyber Security
Red Book
Red Book

Cyber security refers to the techniques of protecting computers, networks, programs and data from unauthorised access or attacks. It means securing the cyberspace from attack, damage, misuse and economic espionage.

Internet is a system of inter-connected devices using standardised communication protocols. Cyberspace is a connected internet ecosystem.

Interconnectedness of the cyberspace, multiple entry points to the internet and dependency of critical infrastructure on the cyberspace makes it vulnerable to cyber threats.

Cyber threats are anonymous and borderless. Thus, it makes the tracking of criminals difficult and cybersecurity a national security issue.

Cyber Security: Threats

As per the American political scientist Joseph Nye, there are four primary threats to cyberspace.

Cyber Warfare:

  • Cyber Warfare refers to a virtual conflict initiated as a politically motivated attack on the enemy’s computer and information systems waged via internet.
  • The aim of such an intrusion usually is to disrupt the systems, destroy them partially or entirely.
  • For instance, In 2010, Stuxnet, a malicious computer worm, was designed to attack industrial programmable logic controllers of the Iranian nuclear programme.

Cyber Espionage:

  • Use of computer networks to gain illicit access to confidential information, typically held by  a government or other organizations.
  • For instance, in Operation Shady RAT, the hackers had access to seventy government and private agencies around the world.

Cybercrime:

  • Hacking : It is an illegal invasion into a computer system or network.
  • Child Pornography : It refers to the pornography showing children on the internet.
  • Cyber Stalking : The use of the internet, email or other electronic communications to stalk a person is called as cyber stalking.
  • Denial of Service : A denial-of-service attack is a technology-driven attack that occurs when an attacker prevents legitimate users from accessing specific computer systems and networks.
  • Malware : It is a malicious software designed to perform an unwanted illegal act via the computer network. Some of the common malwares are – viruses, worms, trojans, hoax etc.
  • Phishing : It is a cybercrime in which targets are lured by mails to provide sensitive information(personal information, bank details) by someone posing as a legitimate website.
  • Botnet : Botnets are a number of internet-connected devices, with each one running its own bots. They are used to perform DoS attacks, steal data, send spam mails etc.
  • Various other types of cybercrimes are Trojans, Ransomware, Wiper Attacks, Intellectual Property Theft, Data Manipulation, data destruction, spyware, Network traveling worms etc.

Cyber Terrorism:

  • Politically motivated use of computers and IT to cause severe disruption or widespread fear in society is called as cyber terrorism.
  • It includes activities such as websites spreading extremist propaganda, recruiting terrorists, promoting the propaganda of terrorists etc.

Cyber Security: Elements

  • Application Security : Use of software or hardware to protect applications from external threats.
  • Information Security : Set of strategies for managing the processes, tools and policies for securing digital information.
  • Network Security : Protecting networks against internal and external threats.
  • Disaster recovery plan : Structured plan which guides the response to unplanned incidents; It enables an organisation to resume critical functions.
  • Operational Security : Analytical processes that classifies information assets and determines controls required to protect these assets.
  • End-user education :Policies to guide users for secure use of an organisation’s systems.

Cyber Security: Indian scenario

  • Security Aspect : Cyberspace has emerged as the 5th arena of war(after land, air, waterand space). Further, cyberspace has also allowed the terrorist groups to stay anonymous and propagate their nefarious activities.
  • Privacy of the users : As per the Kantar report, India’s internet base has breached the 600 million mark in 2023. It is likely to reach 900 million by the end of 2025. This will generate huge volumes of data.
  • Increasing cybercrimes : As per a report by the internet solutions provider Symantec, India is the third most vulnerable country in the world in terms of cybersecurity threats.
  • Economy : India aims to be a digital economy. India also has the third largest ecosystem for technology-driven startups in the world.
  • Promotion of innovation and entrepreneurship through the startups and enabling services (e.g.- Aadhaar, MyGov, Government e-Market, Digi-Locker) through the cyberspace requires a secure cyberspace.
  • E-commerce boom : The Indian E-commerce market is expected to reach US$ 200 billion by 2026. This increases the vulnerability of the consumers to online frauds (identity thefts, credit card frauds).
  • Protecting the critical infrastructure : Critical infrastructure systems such as finance, defence, transport, telecommunication etc requires security of networks to function efficiently.
  • Age of IoT : As we move into the 4th Industrial Revolution, the rise of Internet of Things, artificial intelligence, machine learning etc would require the communication systems to be secure.

Cyber Security: Architectural Issues

Dealing with data colonizationIndia is a net exporter of information, however data servers of majority of digital service providers are located outside India. India still lacks a comprehensive data protection law.
Policy IssuesThe National Cyber Security Policy does not lay down a comprehensive broad framework for robust cyber security ecosystem.
Legal SystemsA single IT Act is inadequate to deal with the different aspects of cyber security : Cyber Law, Cyber Security, Cyber Crimes etc.
No unified national security architectureEach law enforcement agency/armed force has its own cyber security agencies which makes it difficult to act in a coordinated manner.
Absence of a nodal bodyIndia has a number of institutions to deal with the cyber security, such as : MeiTY, NCIIPC, Ministry of Home Affairs. However, it has lacked an overarching nodal body to deal with cyber security issues in a coordinated manner.
Lack of R&D in cyberspaceBasic research, technology demonstration, skill enhancement of manpower has been lacking in the field of cyberspace.
Lack of awarenessDigital illiteracy in the Indian population has made them vulnerable to cyber-attacks.
Heavy import dependenceLack of a indigenous electronic manufacturing base has led to heavy dependence on imports for electronics and IT hardware. Further, there is no coherent certification mechanism to check the standards of the imported products. This directly poses a threat to national security.

 

Cyber Security: Steps taken

Institutional Measures:

  • Indian Computer Emergency Response Team (CERT-in) functions under MEITY  to secure India’s Communications and Information Infrastructure.
  • National Intelligence Grid (NATGRID)is a central agency which aims to have an integrated intelligence grid that will source sensitive personal information on citizens from different government agencies for counter-terrorism investigations.
  • Cyber Swachhta Kendra, a Botnet Cleaning and Malware Analysis Centre. It helps in detecting  malicious programmes and free tools to remove such programmes.
  • National Technical Research Organisation (NTRO)is a technical intelligence gathering agency. It undertakes  hi-tech surveillance jobs such as : satellite monitoring, data gathering and processing, software development.
  • National Critical Information Infrastructure Protection Centre (NCIIPC) national nodal agency for the protection of  Critical Information Infrastructure. It is created under the IT Act, 2000.
  • National cyber coordination centre (NCCC) under Ministry of Home Affairs, scans the internet traffic coming into the country and provides real time information regarding cyber threats to various security agencies.

Legislative Measures:

  • Information Technology Act, 2000 (amended in 2008)provides legal recognition to electronic documents. It also provides a legal framework for e-commerce transactions and to deal with cybercrimes.
  • National Cyber Security Policy 2013 aims to create a secure cyberspace; develop suitable indigenous security technologies and enhance global cooperation.
  • National Encryption Policy, 2015aims to secure transactions in Cyber Space for individuals, businesses, Government including nationally critical information systems and networks.

Programmes and Initiatives:

  • Cyber Surakshit Bharat Initiative isfirst public-private partnership where the various IT officers across the central and state government departments, banks, PSUs are trained by IT industry.
  • Indian Cyber Crime Coordination Centre Scheme(IC4 Scheme)acts as a nodal point in the fight against cybercrime and misuse of cyberspace for furthering the cause of extremist and terrorist groups.
  • Cyber Warrior Police Force(CWPF) to operate under National Information Security Policy and Guidelines wing of MHA’s CIS division.
  • Pradhan Mantri Gramin Digital Saksharta Abhiyan(PMGDISHA) is a component of the Digital India Programme  and aims to make 6 crore rural households digitally literate.

International measures:

  • Cyber-diplomacy-Indian government has entered into cyber security collaborations with countries such as the USA, European Union and Malaysia. For example, U.S.-India Cyber Relationship Framework.
  • Global Centre for Cybersecuritylaunched by the World Economic Forum (WEF) to serve as laboratory and early-warning think tank for future cybersecurity scenarios and help build a secure global cyberspace.

International Best Practice: The Israel Defence Force (IDF) has created two elite units for cyber warfare – C4I (Command, Control, Communications, Computers and Intelligence) and Military Intelligence.

Cyber Security: A way ahead

  • Gulshan Rai Committee Recommendation: Establishing a new Indian Cyber Crime Coordination Centre and linking it to NATGRID and CCTNS (Crime and Criminal Tracking Network System) to deal with cybercrimes.
  • Offensive cyber deterrence : The government should work towards building systems to intercept and exploit communication and digital networks.
  • Boost indigenous electronics manufacturing : The government should provide adequate funding for creating an indigenous electronics manufacturing ecosystem.
  • Developing PPP models : Tech start-ups and private industry should be encouraged to work with government agencies.
  • Cyber specialists : The government should draft recruitment guidelines to develop a cadre of cyber specialists.
  • Signing the Budapest Convention : The Budapest Convention (The Convention on Cybercrime) is the first international treaty dealing with cybercrimes. India should sign the treaty for effective international collaborations.

 

 

 

 

 

 

 

Print Friendly and PDF
Blog
Academy
Community