{"id":32811,"date":"2018-10-29T16:33:27","date_gmt":"2018-10-29T11:03:27","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=32811"},"modified":"2018-10-29T16:33:27","modified_gmt":"2018-10-29T11:03:27","slug":"fearing-breach-election-commission-moves-to-secure-cyber-walls-for-2019","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/fearing-breach-election-commission-moves-to-secure-cyber-walls-for-2019\/","title":{"rendered":"Fearing breach, Election Commission moves to secure cyber walls for 2019"},"content":{"rendered":"<p><a href=\"https:\/\/indianexpress.com\/article\/india\/fearing-breach-election-commission-moves-to-secure-cyber-walls-for-2019-5383553\/\">Fearing breach, Election Commission moves to secure cyber walls for 2019<\/a><\/p>\n<p><strong><u>News<\/u><\/strong>:<\/p>\n<ol>\n<li>Cyber Security to be a part of Election Planning for the first time.<\/li>\n<\/ol>\n<p><strong><u>Important News:<\/u><\/strong><\/p>\n<ol start=\"2\">\n<li>Election Commission has, for the first time, keeping a strong vigilance over the election process, has brought Cyber Security in focus to avoid any cyber threats which can influence election process.<\/li>\n<li><strong> How Cyber Attack is a threat to election process:<\/strong><\/li>\n<\/ol>\n<ul>\n<li>A cyber-attack, irrespective of the actual damage caused, spreads misinformation and can delegitimize a democratic process<\/li>\n<\/ul>\n<ol start=\"4\">\n<li>Drive will protect its voter registration database and office networks from unauthorized influence and access during the Lok Sabha polls next year.<\/li>\n<li><strong><u> Key steps taken by Election Commission to secure Election from Cyber Threats:<\/u><\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong>Launched Cyber Security Regulations<\/strong>\u2013 To avoid any unauthorized access, disclosure, duplication, modification, diversion, destruction, loss, misuse or theft of protection information<\/li>\n<li><strong>Appointment of chief information security officer (CISO) and cyber security nodal officer (CSNO) <\/strong>&#8211; To implement the regulations and coordinate with electoral officers.<\/li>\n<li><strong>Third-party security audit of all poll-related applications and websites &#8211; <\/strong>Provided secured socket layer or SSL, which is a standard security protocol for keeping an internet connection secure<\/li>\n<li><strong>Workshops to train officers in cyber related crime<\/strong> &#8211; \u00a0Three regional workshops (north, south and central India) for poll officers to train them in Cyber Hygiene.<\/li>\n<li><strong>Proposal to recognize elections as \u2018critical information\u2019 under the IT Act, 2000<\/strong> \u2013 Under this act Election Infrastructure will be recognized as \u201ccritical information infrastructure\u201d (CII), which means infrastructure would be eligible for additional funding and resources.<\/li>\n<li><strong>Action Against Ghost Application <\/strong>&#8211; EC has begun identifying ghost applications and started taking them down \u2014 applications that mimic EC\u2019s logo.<\/li>\n<\/ul>\n<ol start=\"6\">\n<li>EC has also noticed that even though the VVPAT machine are not vulnerable to hacking, its increasing dependence on digital technology calls for strengthening of safeguards.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Fearing breach, Election Commission moves to secure cyber walls for 2019 News: Cyber Security to be a part of Election Planning for the first time. Important News: Election Commission has, for the first time, keeping a strong vigilance over the election process, has brought Cyber Security in focus to avoid any cyber threats which can&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/fearing-breach-election-commission-moves-to-secure-cyber-walls-for-2019\/\">Continue reading <span class=\"screen-reader-text\">Fearing breach, Election Commission moves to secure cyber walls for 2019<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[555],"tags":[],"class_list":["post-32811","post","type-post","status-publish","format-standard","hentry","category-test-1","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":"","cached_date":1704767350},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/32811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=32811"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/32811\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=32811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=32811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=32811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}