{"id":160751,"date":"2022-01-11T20:55:21","date_gmt":"2022-01-11T15:25:21","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=160751"},"modified":"2022-01-11T20:55:21","modified_gmt":"2022-01-11T15:25:21","slug":"answered-keeping-in-view-indias-internal-security-analyse-the-impact-of-cross-border-cyber-attacks-also-discuss-defensive-measures-against-these-sophisticated-attacks","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/answered-keeping-in-view-indias-internal-security-analyse-the-impact-of-cross-border-cyber-attacks-also-discuss-defensive-measures-against-these-sophisticated-attacks\/","title":{"rendered":"[Answered] Keeping in view India\u2019s internal security, analyse the impact of cross border cyber-attacks. Also discuss defensive measures against these sophisticated attacks."},"content":{"rendered":"<p><span data-contrast=\"auto\">Cyber threats are anonymous and borderless. Thus, it makes the tracking of criminals difficult and cybersecurity a national security issue.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Impact of cross border cyber attack<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">It will have debilitating impact on Critical Information Infrastructure (Power Plans, nuclear Plants, telecommunications etc.)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Cross border cyber-attacks can be used to threaten national security by indulging in contemporary forms of cross-border terrorism<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">It can be used to disrupt social harmony through radicalization. Terrorists may use social media to plan and execute terror attacks and for &#8220;virulent propaganda&#8221; to incite hatred and violence, recruit youth and raise funds.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">It can be used as spyware to get sensitive information.(e.g\u00a0India banning Chinese mobile applications)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">Defensive Measures\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">Institutional Measures\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>\n<ol style=\"list-style-type: lower-alpha;\">\n<li><span data-contrast=\"auto\">National Cyber Security Coordinator (NCSC) &#8211;\u00a0to coordinate with different agencies at the national level for cyber security matters.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Indian Computer Emergency Response Team (CERT-In) &#8211; to issue alerts and advisories regarding latest cyber threats and countermeasures on regular basis to various concerned agencies.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">National Critical Information Infrastructure Protection Centre (NCIIPC) has been\u00a0establishedThe\u00a0post of Chief Information Security Officer (CISO) has been created in various\u00a0organisations\u00a0to deal with cyber security issues.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Cyber\u00a0Swachhta\u00a0Kendra (Botnet Cleaning and Malware Analysis Centre) has been launched for detection of malicious programs and provide free tools to remove the same.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">National Cyber Coordination Centre (NCCC) has been set up for timely sharing of information with individual entities to enable them to undertake preventive and protective actions against existing and potential cyber security threats.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<\/li>\n<li><span data-contrast=\"auto\">Legislative Measures<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol style=\"list-style-type: lower-alpha;\">\n<li><span data-contrast=\"auto\">Information Technology Act, 2000\u00a0to provide legal recognition for electronic communication, electronic commerce and cyber-crimes. IT Act has deterrent provisions to deal with cyber threats and cyber-attacks.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats are anonymous and borderless. Thus, it makes the tracking of criminals difficult and cybersecurity a national security issue.\u00a0 Impact of cross border cyber attack\u00a0 It will have debilitating impact on Critical Information Infrastructure (Power Plans, nuclear Plants, telecommunications etc.)\u00a0 Cross border cyber-attacks can be used to threaten national security by indulging in contemporary&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/answered-keeping-in-view-indias-internal-security-analyse-the-impact-of-cross-border-cyber-attacks-also-discuss-defensive-measures-against-these-sophisticated-attacks\/\">Continue reading <span class=\"screen-reader-text\">[Answered] Keeping in view India\u2019s internal security, analyse the impact of cross border cyber-attacks. Also discuss defensive measures against these sophisticated attacks.<\/span><\/a><\/p>\n","protected":false},"author":10320,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-160751","post","type-post","status-publish","format-standard","hentry","category-public","entry"],"jetpack_featured_media_url":"","views":{"total":57,"cached_at":1698384439,"cached_date":1698441968},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/160751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10320"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=160751"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/160751\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=160751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=160751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=160751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}