SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Review of
National
Cyber
Security
Policy 2013 By
Chintan T. Pathak
LL.M,PGDIT,PGDTM,B.Com,DCL
Research Scholar
At
Veer Narmad South Gujarat
University
1
Review of National Cyber Security
Policy 2013 Chintan T. Pathak
The Internet has become the first
computing platform:
Standalone apps ---Web Based ---Cloud Computing
Some most frequently used Computer Applications:
 Emailing, Texting
 Gaming
 Search Engines
 Amazon, ebay
 Word Processors
 Wikipedia, Google maps
 Drop Box, Google Drive, Sky drive
 Web Browsers
Review of National Cyber Security Policy 2013
Chintan T. Pathak
2
How Much Data are on the Internet?
 The big four online storage & service companies
(Google, Microsoft, Amazon & facebook) have got
1200 petabytes( or 1.2 million terabytes)
(http://sceincefocus.com/qa/how-many-terabytes-
data-are-internet)
 Facebook process more than 500TB of data daily
(http://news.cnet.com/)
Review of National Cyber Security Policy 2013
Chintan T. Pathak
3
Why Cyber Security is an issue?
 New Technology may bring new vulnerabilities
 Large data on Internet (1.2 million terabytes)
 Evolving tactics by attackers
 Automation has made attackers more profitable
 Attack techniques propagation is now more rapid &
easier.
 Action at a distance is now possible
 Wireless networking
 Mobile computing
Review of National Cyber Security Policy 2013
Chintan T. Pathak
4
What is cyber security?
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to
minimize the number of successful cyber security attacks.
 Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered via
the Internet by cyber criminals.
 Though, cyber security is important for network, data and
application security.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
5
What is…?
 Communication security-protecting organization
communication media , technology , and content.
 Network security-is the protection of networking
components, connection and content.
 Information security-protection of information and its
critical elements , including the systems and hardware
that use , store or transmit that information.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
6
Cyber Security – India Perspective
Review of National Cyber Security Policy
2013 Chintan T. Pathak
7
Cyber Security – India Perspective
Spam in India:
 Spam originating in India accounted for one
percent of all spam originating in the top 25 spam
producing countries making India the eighteenth
ranked country worldwide for originating spam.
 A high percentage of email originating in India
constituted spam. Of the messages originating in
India 76 percent were considered spam.
(www.cert-india.com)4
Review of National Cyber Security Policy 2013
Chintan T. Pathak
8
Cyber Security – India Perspective
Threats to Confidential Information
Review of National Cyber Security Policy 2013
Chintan T. Pathak
9
Cyber Security – Global Trend
Review of National Cyber Security Policy 2013
Chintan T. Pathak
Recent studies reveal three major findings:
 Growing threat to national security - web espionage becomes increasingly
advanced, moving from curiosity to well-funded and well-organized operations
aimed at not only financial, but also political or technical gain
 Increasing threat to online services – affecting individuals and industry
because of growth of sophistication of attack techniques
 Emergence of a sophisticated market for software flaws – that can be used to
carry out espionage and attacks on Govt. and Critical information
infrastructure. Findings indicate a blurred line between legal and illegal sales
of software vulnerabilities.
10
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Review of National Cyber Security Policy 2013 Chintan
T. Pathak
 Preamble:
“..This policy, therefore, aims to create a cyber security framework,
which leads to specific actions and programmes to enhance the security
posture of country’s cyberspace..”
 Vision:
Build a secure & resilient cyberspace for Citizen, Business &
Government.
11
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Review of National Cyber Security Policy 2013
Chintan T. Pathak
 Mission:
1. To Protect information & information infrastructure
2. Build capability to:
- Prevent and Respond to Cyber threats.
3. Reduce vulnerability
4. Minimise damage from cyber incidents through – Institutional
Structure, People,
5. Process & Technology.
12
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Key Highlights of the Policy:
 Policy aims at creating a national level nodal agency that will co-
ordinate all matters related to cyber security in the country.
 It will encourage organizations to develop their own security policies
as per international best practices.
 The policy will ensure that all organizations earmark a specific budget
to implement their security policies and initiatives.
 Policy plans to offer various schemes and incentives to ensure that
proactive actions are taken for security compliance.
 To create an assurance framework, policy will create conformity
assessment and certification of compliance to cyber security best
practices, standards and guidelines.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
13
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Key Highlights of the Policy:
 Policy aims at encouraging open standards that facilitate
interoperability and data exchange among different IT products and
services.
 A legal framework will be created to address cyber security challenges
arising out of technological developments in cyber space.
 The policy also plans to enforce a periodic audit and evaluation of
adequacy and effectiveness of security of Information infrastructure in
India.
 The policy will create mechanisms to get early warnings in case of
security threats, vulnerability management and response to the
security threats thereof
Review of National Cyber Security Policy 2013
Chintan T. Pathak
14
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Key Highlights of the Policy:
 A 24X7 operational national level computer emergency response team
(CERT-in) will function as an umbrella organization that will handle all
communication and coordination in deal with cyber crisis situations.
 To secure e-governance services, policy will take various steps like
encouraging wider usage of Public Key Infrastructure (PKI) standards in
communications and engagement of expert security professionals /
organizations to assist in e-governance.
 The policy will encourage and mandate use of tested, validated and
certified IT products in all sensitive security areas
 The policy also plans to undertake and invest in various R&D programs in
area of national cyber security
Review of National Cyber Security Policy 2013
Chintan T. Pathak
15
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Issues not to be addressed satisfactory in Policy:
 Cloud Computing
 Citizen Privacy
 Governance of Social Media
 Policy is silent for data collection, handling ,storage and transmission
methods
 Policy is also silent about how it balancing citizen liberty and security
of nation.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
16
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Conclusion:
 The key to success of this policy lies in its effective implementation.
 The much talked about public-private partnership in this policy, if
implemented in true spirit, will go a long way in creating solutions to
the ever-changing threat landscape.
 Indigenous development of cyber security solutions as enumerated in
the policy is laudable but these solutions may not completely tide over
the supply chain risks and would also require building testing
infrastructure and facilities of global standards for evaluation.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
17
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Conclusion:
 The provisions to take care security risks emanating due to use of new
technologies e.g. Cloud Computing, has not been addressed.
 Another area which is left untouched by this policy is tackling the
risks arising due to increased use of social networking sites by
criminals and anti-national elements.
 There is also a need to incorporate cyber crime tracking, cyber
forensic capacity building and creation of a platform for sharing and
analysis of information between public and private sectors on
continuous basis.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
18
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Suggestions:
 Social economic political and technological background should be
taken into account while finalizing this policy.
 As India is a developing country hence it should be considered not in
continuum with developed world while finalization of this policy.
 Short and long term consistent realistic objectives should be there in
the policy.
 Fundamental root issues should be addressed in order to be able to
sustain secondary issues.
 Policy should consider available resources and their budgeting to
support the short and long term objective.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
19
National Cyber Security Policy 2013
Need of Today & Necessity for Tomorrow
Suggestions:
 Policy should not be static in nature. So as to be tuned to the changing
needs. There must be a provision for a constant review in order to
improve the policy and remove the impediments if any.
Review of National Cyber Security Policy 2013
Chintan T. Pathak
20
Thank You
“ In Security matters, there is nothing like
absolute Security”
Review of National Cyber Security Policy 2013
Chintan T. Pathak
21

Weitere ähnliche Inhalte

Was ist angesagt?

National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh Mohiuddin Murad
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 

Was ist angesagt? (20)

National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 

Andere mochten auch

Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policyNextBigWhat
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policybarbeejl
 
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09Dr D.C. Misra
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush AgrawalAnkush Agrawal
 
Role of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanRole of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanShravan Bhumkar
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & NetiquetteSteve Katz
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Guerillateaching netiquette
Guerillateaching netiquetteGuerillateaching netiquette
Guerillateaching netiquetteGuerillateacher
 
Role of ICT in Good Governance
Role of ICT in Good GovernanceRole of ICT in Good Governance
Role of ICT in Good GovernanceAmit Tyagi
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 

Andere mochten auch (20)

Cyber security
Cyber securityCyber security
Cyber security
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
 
it act
it act it act
it act
 
Netiquette
NetiquetteNetiquette
Netiquette
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
Role of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanRole of E-Governance In Bharat Nirman
Role of E-Governance In Bharat Nirman
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & Netiquette
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Guerillateaching netiquette
Guerillateaching netiquetteGuerillateaching netiquette
Guerillateaching netiquette
 
Role of ICT in Good Governance
Role of ICT in Good GovernanceRole of ICT in Good Governance
Role of ICT in Good Governance
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ipv4
Ipv4Ipv4
Ipv4
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
E governance
E governanceE governance
E governance
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Ip address
Ip addressIp address
Ip address
 

Ähnlich wie Review of India's 2013 National Cyber Security Policy

Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfsri_ias
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...Finni Rice
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...greendigital
 

Ähnlich wie Review of India's 2013 National Cyber Security Policy (20)

Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdf
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana BelingueCTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
E-Cambodia
E-CambodiaE-Cambodia
E-Cambodia
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
All Things Digital
All Things DigitalAll Things Digital
All Things Digital
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
 

Kürzlich hochgeladen

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Kürzlich hochgeladen (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 

Review of India's 2013 National Cyber Security Policy

  • 1. Review of National Cyber Security Policy 2013 By Chintan T. Pathak LL.M,PGDIT,PGDTM,B.Com,DCL Research Scholar At Veer Narmad South Gujarat University 1 Review of National Cyber Security Policy 2013 Chintan T. Pathak
  • 2. The Internet has become the first computing platform: Standalone apps ---Web Based ---Cloud Computing Some most frequently used Computer Applications:  Emailing, Texting  Gaming  Search Engines  Amazon, ebay  Word Processors  Wikipedia, Google maps  Drop Box, Google Drive, Sky drive  Web Browsers Review of National Cyber Security Policy 2013 Chintan T. Pathak 2
  • 3. How Much Data are on the Internet?  The big four online storage & service companies (Google, Microsoft, Amazon & facebook) have got 1200 petabytes( or 1.2 million terabytes) (http://sceincefocus.com/qa/how-many-terabytes- data-are-internet)  Facebook process more than 500TB of data daily (http://news.cnet.com/) Review of National Cyber Security Policy 2013 Chintan T. Pathak 3
  • 4. Why Cyber Security is an issue?  New Technology may bring new vulnerabilities  Large data on Internet (1.2 million terabytes)  Evolving tactics by attackers  Automation has made attackers more profitable  Attack techniques propagation is now more rapid & easier.  Action at a distance is now possible  Wireless networking  Mobile computing Review of National Cyber Security Policy 2013 Chintan T. Pathak 4
  • 5. What is cyber security?  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security. Review of National Cyber Security Policy 2013 Chintan T. Pathak 5
  • 6. What is…?  Communication security-protecting organization communication media , technology , and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information. Review of National Cyber Security Policy 2013 Chintan T. Pathak 6
  • 7. Cyber Security – India Perspective Review of National Cyber Security Policy 2013 Chintan T. Pathak 7
  • 8. Cyber Security – India Perspective Spam in India:  Spam originating in India accounted for one percent of all spam originating in the top 25 spam producing countries making India the eighteenth ranked country worldwide for originating spam.  A high percentage of email originating in India constituted spam. Of the messages originating in India 76 percent were considered spam. (www.cert-india.com)4 Review of National Cyber Security Policy 2013 Chintan T. Pathak 8
  • 9. Cyber Security – India Perspective Threats to Confidential Information Review of National Cyber Security Policy 2013 Chintan T. Pathak 9
  • 10. Cyber Security – Global Trend Review of National Cyber Security Policy 2013 Chintan T. Pathak Recent studies reveal three major findings:  Growing threat to national security - web espionage becomes increasingly advanced, moving from curiosity to well-funded and well-organized operations aimed at not only financial, but also political or technical gain  Increasing threat to online services – affecting individuals and industry because of growth of sophistication of attack techniques  Emergence of a sophisticated market for software flaws – that can be used to carry out espionage and attacks on Govt. and Critical information infrastructure. Findings indicate a blurred line between legal and illegal sales of software vulnerabilities. 10
  • 11. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Review of National Cyber Security Policy 2013 Chintan T. Pathak  Preamble: “..This policy, therefore, aims to create a cyber security framework, which leads to specific actions and programmes to enhance the security posture of country’s cyberspace..”  Vision: Build a secure & resilient cyberspace for Citizen, Business & Government. 11
  • 12. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Review of National Cyber Security Policy 2013 Chintan T. Pathak  Mission: 1. To Protect information & information infrastructure 2. Build capability to: - Prevent and Respond to Cyber threats. 3. Reduce vulnerability 4. Minimise damage from cyber incidents through – Institutional Structure, People, 5. Process & Technology. 12
  • 13. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Key Highlights of the Policy:  Policy aims at creating a national level nodal agency that will co- ordinate all matters related to cyber security in the country.  It will encourage organizations to develop their own security policies as per international best practices.  The policy will ensure that all organizations earmark a specific budget to implement their security policies and initiatives.  Policy plans to offer various schemes and incentives to ensure that proactive actions are taken for security compliance.  To create an assurance framework, policy will create conformity assessment and certification of compliance to cyber security best practices, standards and guidelines. Review of National Cyber Security Policy 2013 Chintan T. Pathak 13
  • 14. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Key Highlights of the Policy:  Policy aims at encouraging open standards that facilitate interoperability and data exchange among different IT products and services.  A legal framework will be created to address cyber security challenges arising out of technological developments in cyber space.  The policy also plans to enforce a periodic audit and evaluation of adequacy and effectiveness of security of Information infrastructure in India.  The policy will create mechanisms to get early warnings in case of security threats, vulnerability management and response to the security threats thereof Review of National Cyber Security Policy 2013 Chintan T. Pathak 14
  • 15. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Key Highlights of the Policy:  A 24X7 operational national level computer emergency response team (CERT-in) will function as an umbrella organization that will handle all communication and coordination in deal with cyber crisis situations.  To secure e-governance services, policy will take various steps like encouraging wider usage of Public Key Infrastructure (PKI) standards in communications and engagement of expert security professionals / organizations to assist in e-governance.  The policy will encourage and mandate use of tested, validated and certified IT products in all sensitive security areas  The policy also plans to undertake and invest in various R&D programs in area of national cyber security Review of National Cyber Security Policy 2013 Chintan T. Pathak 15
  • 16. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Issues not to be addressed satisfactory in Policy:  Cloud Computing  Citizen Privacy  Governance of Social Media  Policy is silent for data collection, handling ,storage and transmission methods  Policy is also silent about how it balancing citizen liberty and security of nation. Review of National Cyber Security Policy 2013 Chintan T. Pathak 16
  • 17. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Conclusion:  The key to success of this policy lies in its effective implementation.  The much talked about public-private partnership in this policy, if implemented in true spirit, will go a long way in creating solutions to the ever-changing threat landscape.  Indigenous development of cyber security solutions as enumerated in the policy is laudable but these solutions may not completely tide over the supply chain risks and would also require building testing infrastructure and facilities of global standards for evaluation. Review of National Cyber Security Policy 2013 Chintan T. Pathak 17
  • 18. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Conclusion:  The provisions to take care security risks emanating due to use of new technologies e.g. Cloud Computing, has not been addressed.  Another area which is left untouched by this policy is tackling the risks arising due to increased use of social networking sites by criminals and anti-national elements.  There is also a need to incorporate cyber crime tracking, cyber forensic capacity building and creation of a platform for sharing and analysis of information between public and private sectors on continuous basis. Review of National Cyber Security Policy 2013 Chintan T. Pathak 18
  • 19. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Suggestions:  Social economic political and technological background should be taken into account while finalizing this policy.  As India is a developing country hence it should be considered not in continuum with developed world while finalization of this policy.  Short and long term consistent realistic objectives should be there in the policy.  Fundamental root issues should be addressed in order to be able to sustain secondary issues.  Policy should consider available resources and their budgeting to support the short and long term objective. Review of National Cyber Security Policy 2013 Chintan T. Pathak 19
  • 20. National Cyber Security Policy 2013 Need of Today & Necessity for Tomorrow Suggestions:  Policy should not be static in nature. So as to be tuned to the changing needs. There must be a provision for a constant review in order to improve the policy and remove the impediments if any. Review of National Cyber Security Policy 2013 Chintan T. Pathak 20
  • 21. Thank You “ In Security matters, there is nothing like absolute Security” Review of National Cyber Security Policy 2013 Chintan T. Pathak 21