{"id":92032,"date":"2021-03-03T19:50:40","date_gmt":"2021-03-03T14:20:40","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=92032"},"modified":"2021-03-26T18:28:03","modified_gmt":"2021-03-26T12:58:03","slug":"cyber-attacks-and-cyber-security-in-india-explained-pointwise","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/cyber-attacks-and-cyber-security-in-india-explained-pointwise\/","title":{"rendered":"Cyber attacks and Cyber Security in India &#8211; Explained Pointwise"},"content":{"rendered":"\n<h5><b>Introduction<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Recently there were <a href=\"https:\/\/forumias.com\/blog\/possible-evidence-of-chinas-cyber-warfare-against-india\/\" target=\"_blank\" rel=\"noopener noreferrer\">many instances of Chinese led cyber-attacks<\/a> on Indians and India based companies. A US-based cyber group has informed about Chinese hackers <strong>targeting Indian companies that developed Covid-19 vaccines<\/strong> (<a href=\"https:\/\/forumias.com\/blog\/india-approves-two-covid-19-vaccines-for-emergency-use\/\" target=\"_blank\" rel=\"noopener noreferrer\">Covaxin and Covishield<\/a>). Similarly, another US report informed about a Chinese firm (Red Echo) that was using <strong>malware called ShadowPad<\/strong> to target India\u2019s power sector. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There were also evidences that some of these Chinese led cyber-attacks were backed by the Chinese government. Apart from China, India has also faced cyber-attacks from Russia, North Korea and other countries. These examples highlighted the need to strengthen India\u2019s <a href=\"https:\/\/forumias.com\/blog\/security-news\/cyber-security-news-and-updates\/\">cyber security<\/a> infrastructure.\u00a0<\/span><\/p>\n<h5><b>What is Cyber Security?<\/b><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">There are<strong> 4 main types of threat to cyber security<\/strong>:<\/span>\n<ol>\n<li style=\"font-weight: 400;\"><b>Cyber espionage:<\/b><span style=\"font-weight: 400;\"> It is an Intelligence gathering and data theft activity. The data theft will occur without the user\u2019s permission\/knowledge.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cyber warfare:<\/b><span style=\"font-weight: 400;\"> It refers to the use of digital attacks (like computer viruses and hacking) by one country to disrupt the computers or information networks of another country.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cyber terrorism<\/b><span style=\"font-weight: 400;\">: It refers to the convergence of terrorism and cyberspace. In this, the terrorists will use the internet to conduct violent activities such as threats, loss of life etc. Terrorists will use cyberspace to achieve their political and ideological gains.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cyber crime: <\/b><span style=\"font-weight: 400;\">It is any criminal activity that involves a computer, networked device or a computer network.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<h5><b>Few recent examples of cyber attacks in India<\/b><\/h5>\n<p><b>Global Cyber Security Index 2018 <\/b>positioned<span style=\"font-weight: 400;\"> India at 23rd place globally. The report mentioned India&#8217;s vulnerability to cyber-attacks. Some of the examples of cyber attacks are:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A Goldman Sachs backed firm Cyfirma has reported that Chinese hacker group APT 10 (also known as Stone Panda) had<\/span><b> allegedly attacked the <a href=\"https:\/\/forumias.com\/blog\/concerns-of-hasty-approval-to-covid-19-vaccine\/\">Covid-19 vaccine<\/a><\/b><span style=\"font-weight: 400;\"> manufacturers in India. Cyfirma has also mentioned that there were links between the Chinese government and Stone Panda.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In <\/span><b>November 2020 Microsoft detected<\/b><span style=\"font-weight: 400;\"> cyber attacks from Russia and North Korea. Microsoft mentioned that these attacks were targeting the Covid-19 vaccine companies in India, France, Canada, South Korea and the United States.<\/span><\/li>\n<li>Similarly, in February 2021, a US-based cyber company had mentioned about the Chinese group called Red Echo. They cautioned that Red Echo was using <strong>malware called ShadowPad<\/strong> to target India\u2019s power sector.<\/li>\n<\/ol>\n<h5><b>Government initiatives to strengthen Cyber Security in India<\/b><\/h5>\n<p>The Indian government have taken many steps to strengthen cyber security. They are,<\/p>\n<ol>\n<li style=\"font-weight: 400;\"><b>Information Technology Act (IT) 2000<\/b><span style=\"font-weight: 400;\"> &#8211; It is the primary law for dealing with cyber-crime and digital commerce in India.\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The act covers a broad range of offences including child pornography, cyber terrorism etc.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Section 75<\/b><span style=\"font-weight: 400;\"> of the Act empowers the government to punish people located outside India who is accused of the offence.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><b>National Cyber Security Policy, 2013<\/b><span style=\"font-weight: 400;\">: The policy provides the vision and strategic direction to protect the national cyberspace. Some objectives of the policy are:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To <strong>create a secure and robust cyber-ecosystem<\/strong> and building adequate trust and confidence in electronic transactions.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The policy aims to<strong> guide<\/strong> <strong>stakeholder\u2019s <\/strong>(users)<strong> actions<\/strong> for ensuring protection in cyberspace.<\/span><\/li>\n<li>To <strong>strengthen the regulatory framework<\/strong> in India for ensuring secure cyber ecosystem.<\/li>\n<li>To develop suitable indigenous technologies in the ICT sector.<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><b>National Critical Information Infrastructure Protection Centre (NCIIPC):<\/b>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> The NCIIPC was created by <\/span><b>Section 70A <\/b><span style=\"font-weight: 400;\">of the IT Act.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It is designated as a <strong>national nodal agency<\/strong> in respect of critical information infrastructure protection.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It aims to protect and safeguard critical information infrastructure (CII) against cyberterrorism, cyberwarfare and other threats.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><b>CERT-In (Cyber Emergency Response Team \u2013 India) <\/b><span style=\"font-weight: 400;\">&#8211; It was created by Section 70B of the IT Act. It is the national <strong>nodal agency to respond against computer security threats<\/strong> as and when required.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>National Cyber Security Coordination Centre (NCCC):<\/b><span style=\"font-weight: 400;\"> The NCCC is mandated to <strong>perform real-time threat assessment. <\/strong>Further, they also <strong>create situational awareness<\/strong> of potential cyber threats to the country. It was made operational in 2017.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cyber Swachhta Kendra:<\/b><span style=\"font-weight: 400;\">\u00a0 It is a platform for users to analyse and clean their systems by removing various viruses, bots\/ malware, Trojans, etc. It was launched in 2017.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cyber Surakshit Bharat Initiative:<\/b><span style=\"font-weight: 400;\"> It was launched in 2018. The initiative aims to <strong>spread awareness about cybercrime<\/strong>. The initiative also focuse on the <strong>capacity building<\/strong> of Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/forumias.com\/blog\/what-is-sandes-platform\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Sandes Platform<\/b><\/a><span style=\"font-weight: 400;\">: <\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It is an instant messaging platform like WhatsApp. It was previously named as\u00a0 Government Instant Messaging System(GIMS).\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\">The platform can be used for all kinds of communications by anyone with a mobile number or email id. The platform will ensure <span style=\"font-weight: 400;\">secure communication between users. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It was launched in 2020 for State and Central government employees, now the scope has been extended to every citizen.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h5><b>Challenges in tackling cyber offences<\/b><\/h5>\n<ol>\n<li style=\"font-weight: 400;\"><b>Poor cyber security infrastructure<\/b><span style=\"font-weight: 400;\">: Very few cities in India have cyber crime cells and the establishment of dedicated cyber courts is also very less in India.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Awareness issue: <\/b><span style=\"font-weight: 400;\">People don\u2019t report cyber crimes either due to low awareness or fear of harassment.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">There are many <strong>data-related problems<\/strong> in ensuring cyber security. Such as,<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The majority of Indian data is stored in data centres located outside India. So, the data storing companies not report cyberattacks to India. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Growing online transactions have generated bigger incentives for cybercriminals. A recent cyberattack on Zomato(food delivery app) is an example of that.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><b>Capacity deficit of officials:<\/b><span style=\"font-weight: 400;\"> The law enforcement agencies who are required to conduct cyber investigation often lack the requisite cyber skills and training.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Anonymity:<\/b><span style=\"font-weight: 400;\"> Cyberspace allows individuals to hide or misrepresent one\u2019s profile using encrypting tools. This creates a larger challenge during the investigation.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Jurisdictional concern<\/b><span style=\"font-weight: 400;\">: In cyber offences, an individual can conduct a crime from sitting in a remote location of anywhere in the globe. A recent <\/span><b>Wannacry malware attack <\/b>is a perfect example of that. <span style=\"font-weight: 400;\">Even if the person gets identified it requires global cooperation to bring the person and conduct a trial in court.<\/span><\/li>\n<\/ol>\n<h5><b>Suggestions to improve cyber security<\/b><\/h5>\n<ol>\n<li><b>Coordination Enhancement:<\/b><span style=\"font-weight: 400;\"> There is a need to improve coordination at international, national, state and local levels. An important step in this regard could be the <strong>signing of the <\/strong><\/span><b>Budapest Convention<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong> on Cyber-crime<\/strong> by the Indian government.<br \/>\n<\/span><\/span><\/p>\n<div class=\"content-box-green\"><strong>Budapest Convention<\/strong><strong> on Cyber-crime:<\/strong> It is the first international treaty attempting to address cybercrime. The convention addresses cybercrime by steps such as harmonizing national laws, increasing cooperation among nations and improving investigative techniques in cybercrime.<\/div>\n<\/li>\n<li><b>Robust Training of law enforcement agencies is the need of the hour. <\/b>The government will have to provide <span style=\"font-weight: 400;\">continuous, robust and effective training to law enforcement agencies and individuals with a special focus on cyber security and safe internet handling techniques.<\/span><\/li>\n<li><b>Infrastructure Development: <\/b><span style=\"font-weight: 400;\">This would involve creating more cyber cells, cyber courts and cyber forensic labs so that the violators are duly punished.<\/span><\/li>\n<li><b>Inculcating Digital Literacy:<\/b><span style=\"font-weight: 400;\"> This can be done by addressing the vulnerabilities of the masses towards cyber offences.<\/span><\/li>\n<li><b>Responsibility on Service providers<\/b><span style=\"font-weight: 400;\">: Website owners must be made more cautious towards traffic on their sites and report any irregularity. This will ensure\u00a0<strong>large scale data collection on cyber attacks.\u00a0<\/strong>These data can be used to create a new cyber security strategy in future.\u00a0<\/span><\/li>\n<li><b>Amending of the Information Technology Act: <\/b><span style=\"font-weight: 400;\">There is a need to put a legal responsibility on companies to conduct regular cyber security audits. For that, the IT Act can be amended to include mandatory cyber security audit by independent agencies.<\/span><\/li>\n<\/ol>\n<h5><b>Conclusion<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The recent pandemic has once again shown the importance of cyberspace for mankind. Considering the need for cyber security the government needs to fast pace the <\/span><b>National Cyber Security Strategy 2020 and its implementation.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Recently there were many instances of Chinese led cyber-attacks on Indians and India based companies. A US-based cyber group has informed about Chinese hackers targeting Indian companies that developed Covid-19 vaccines (Covaxin and Covishield). Similarly, another US report informed about a Chinese firm (Red Echo) that was using malware called ShadowPad to target India\u2019s&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/cyber-attacks-and-cyber-security-in-india-explained-pointwise\/\">Continue reading <span class=\"screen-reader-text\">Cyber attacks and Cyber Security in India &#8211; Explained Pointwise<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[130,9],"tags":[1361,8000],"class_list":["post-92032","post","type-post","status-publish","format-standard","hentry","category-7-pm","category-public","tag-sec_4","tag-security_issues","entry"],"jetpack_featured_media_url":"","views":{"total":16,"cached_at":1698385991,"cached_date":1698474171},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/92032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=92032"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/92032\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=92032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=92032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=92032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}