SlideShare a Scribd company logo
1 of 21
NCSP- 2013
Created using iThoughts HD
National Cyber Security Policy - 2013 - As I Perceive it
1
PREAMBLE
 “..This policy, therefore, aims to create a
cyber security framework, which leads to
specific actions and programmes to
enhance the security posture of
country's cyberspace…”
National Cyber Security Policy - 2013 - As I Perceive it
2
MAIN SECTIONS
 Vision
 Mission
 Objectives
 Strategies
 Operationalization
National Cyber Security Policy - 2013 - As I Perceive it
3
VISION
Build a secure & resilient
cyberspace
 For citizens
 Businesses
 Government
National Cyber Security Policy - 2013 - As I Perceive it
4
MISSION
To protect information &
information infrastructure
Build capability to:
 Prevent and
 Respond to Cyber threats
National Cyber Security Policy - 2013 - As I Perceive it
5
MISSION
Reduce vulnerability
Minimise damage from cyber
incidents through:
 Institutional
Structures, People, Process &
Technology
National Cyber Security Policy - 2013 - As I Perceive it
6
OBJECTIVES
Create Secure cyber Eco system to
 Generate trust in IT and
 Enhance its adoption
Create Assurance framework for
 Design of policies
 Promote compliance to standards
National Cyber Security Policy - 2013 - As I Perceive it
7
OBJECTIVES
Strengthen laws and guidelines for
secure cyber ecosystem to enable
effective
 Prevention,
 Investigation and
 Prosecution of cyber crimes
National Cyber Security Policy - 2013 - As I Perceive it
8
OBJECTIVES
Create & enhance 24 X 7 National
& Sectorial mechanisms for:
 Obtaining strategic info on threat to
ICT infrastructure
 Creating scenarios for response
 Resolution & crisis management
National Cyber Security Policy - 2013 - As I Perceive it
9
OBJECTIVES
Enhance protection & resilience to
National Critical Information
Infrastructure by
 24 X 7 protection centre
 Mandate security practices related
to:
 Design, acquisition, Development &
Operation of information sources
National Cyber Security Policy - 2013 - As I Perceive it
10
OBJECTIVES
Develop indigenous security
technologies by:
 Frontier & Solution oriented
research
 Proof Of Concept
 Pilot
 Transition
 Diffusion
 Commercialisation
National Cyber Security Policy - 2013 - As I Perceive it
11
OBJECTIVES
 Improve visibility of integrity of ICT by
 Establishing Testing infrastructure for
security of such products
 Create 5,00,000 professionals skilled
in cyber security in next 5 years
 Provide Fiscal benefits to businesses
for adoption of security practices
National Cyber Security Policy - 2013 - As I Perceive it
12
OBJECTIVES
To enable protection of data to:
 Safeguard privacy of data of
citizens
 Minimize losses due to cyber
crimes /data theft
National Cyber Security Policy - 2013 - As I Perceive it
13
OBJECTIVES
Create a culture of cyber security
& privacy enabling responsible
behavior through effective
communication and promotion
National Cyber Security Policy - 2013 - As I Perceive it
14
OBJECTIVES
Develop effective Public-Private
partnerships through
 Technical &
 Operational collaboration
Enhance Global cooperation by
 Promoting sharing
 Leveraging relationships
National Cyber Security Policy - 2013 - As I Perceive it
15
STRATEGIES
A. Create Secure Cyber ecosystem
B. Create Assurance framework
C. Encourage Open Standards
National Cyber Security Policy - 2013 - As I Perceive it
16
STRATEGIES
 D. Strengthen Regulatory framework
 E. Create mechanisms for:
 Early warning of security threats,
 Vulnerability mangement &
 Threat response
 F. Securing e-Governance services
National Cyber Security Policy - 2013 - As I Perceive it
17
STRATEGIES
G. Protection & resilience of critical
information infrastructure
H. Promote R & D in Cyber security
I. Reduce supply chain risks
National Cyber Security Policy - 2013 - As I Perceive it
18
STRATEGIES
J. Human Resource development
K. Creating Cyber security awareness
L. Developing effective Public-Private
partnerships
National Cyber Security Policy - 2013 - As I Perceive it
19
STRATEGIES
M. Information sharing & co-operation
N. Prioritized approach for
implementation
National Cyber Security Policy - 2013 - As I Perceive it
20
OPERATIONALIZATION
Detailed Guidelines and
Plans of Action at
 National,
 Sectorial,
 State,
 Ministry,
 Department and
 Enterprise levels
National Cyber Security Policy - 2013 - As I Perceive it
21

More Related Content

What's hot

Information Security
Information SecurityInformation Security
Information Security
chenpingling
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
Togis UAB Ltd
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 

What's hot (20)

Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Ppt
PptPpt
Ppt
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
INVESTIGATION TECHNIQUES
INVESTIGATION TECHNIQUESINVESTIGATION TECHNIQUES
INVESTIGATION TECHNIQUES
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Viewers also liked

National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
NextBigWhat
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
barbeejl
 
Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security
USAID CEED II Project Moldova
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
cbtvid
 

Viewers also liked (20)

INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
Hacking
HackingHacking
Hacking
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ipv4
Ipv4Ipv4
Ipv4
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Ip address
Ip addressIp address
Ip address
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 

Similar to National cyber security policy 2013

CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana BelingueCTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
Commonwealth Telecommunications Organisation
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
Samir Pawaskar
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
ITU
 

Similar to National cyber security policy 2013 (20)

Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana BelingueCTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
The UK National Cyber Security Strategy
The UK National Cyber Security StrategyThe UK National Cyber Security Strategy
The UK National Cyber Security Strategy
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
 
cyber policy in Latvia
cyber policy in Latviacyber policy in Latvia
cyber policy in Latvia
 
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

National cyber security policy 2013

  • 1. NCSP- 2013 Created using iThoughts HD National Cyber Security Policy - 2013 - As I Perceive it 1
  • 2. PREAMBLE  “..This policy, therefore, aims to create a cyber security framework, which leads to specific actions and programmes to enhance the security posture of country's cyberspace…” National Cyber Security Policy - 2013 - As I Perceive it 2
  • 3. MAIN SECTIONS  Vision  Mission  Objectives  Strategies  Operationalization National Cyber Security Policy - 2013 - As I Perceive it 3
  • 4. VISION Build a secure & resilient cyberspace  For citizens  Businesses  Government National Cyber Security Policy - 2013 - As I Perceive it 4
  • 5. MISSION To protect information & information infrastructure Build capability to:  Prevent and  Respond to Cyber threats National Cyber Security Policy - 2013 - As I Perceive it 5
  • 6. MISSION Reduce vulnerability Minimise damage from cyber incidents through:  Institutional Structures, People, Process & Technology National Cyber Security Policy - 2013 - As I Perceive it 6
  • 7. OBJECTIVES Create Secure cyber Eco system to  Generate trust in IT and  Enhance its adoption Create Assurance framework for  Design of policies  Promote compliance to standards National Cyber Security Policy - 2013 - As I Perceive it 7
  • 8. OBJECTIVES Strengthen laws and guidelines for secure cyber ecosystem to enable effective  Prevention,  Investigation and  Prosecution of cyber crimes National Cyber Security Policy - 2013 - As I Perceive it 8
  • 9. OBJECTIVES Create & enhance 24 X 7 National & Sectorial mechanisms for:  Obtaining strategic info on threat to ICT infrastructure  Creating scenarios for response  Resolution & crisis management National Cyber Security Policy - 2013 - As I Perceive it 9
  • 10. OBJECTIVES Enhance protection & resilience to National Critical Information Infrastructure by  24 X 7 protection centre  Mandate security practices related to:  Design, acquisition, Development & Operation of information sources National Cyber Security Policy - 2013 - As I Perceive it 10
  • 11. OBJECTIVES Develop indigenous security technologies by:  Frontier & Solution oriented research  Proof Of Concept  Pilot  Transition  Diffusion  Commercialisation National Cyber Security Policy - 2013 - As I Perceive it 11
  • 12. OBJECTIVES  Improve visibility of integrity of ICT by  Establishing Testing infrastructure for security of such products  Create 5,00,000 professionals skilled in cyber security in next 5 years  Provide Fiscal benefits to businesses for adoption of security practices National Cyber Security Policy - 2013 - As I Perceive it 12
  • 13. OBJECTIVES To enable protection of data to:  Safeguard privacy of data of citizens  Minimize losses due to cyber crimes /data theft National Cyber Security Policy - 2013 - As I Perceive it 13
  • 14. OBJECTIVES Create a culture of cyber security & privacy enabling responsible behavior through effective communication and promotion National Cyber Security Policy - 2013 - As I Perceive it 14
  • 15. OBJECTIVES Develop effective Public-Private partnerships through  Technical &  Operational collaboration Enhance Global cooperation by  Promoting sharing  Leveraging relationships National Cyber Security Policy - 2013 - As I Perceive it 15
  • 16. STRATEGIES A. Create Secure Cyber ecosystem B. Create Assurance framework C. Encourage Open Standards National Cyber Security Policy - 2013 - As I Perceive it 16
  • 17. STRATEGIES  D. Strengthen Regulatory framework  E. Create mechanisms for:  Early warning of security threats,  Vulnerability mangement &  Threat response  F. Securing e-Governance services National Cyber Security Policy - 2013 - As I Perceive it 17
  • 18. STRATEGIES G. Protection & resilience of critical information infrastructure H. Promote R & D in Cyber security I. Reduce supply chain risks National Cyber Security Policy - 2013 - As I Perceive it 18
  • 19. STRATEGIES J. Human Resource development K. Creating Cyber security awareness L. Developing effective Public-Private partnerships National Cyber Security Policy - 2013 - As I Perceive it 19
  • 20. STRATEGIES M. Information sharing & co-operation N. Prioritized approach for implementation National Cyber Security Policy - 2013 - As I Perceive it 20
  • 21. OPERATIONALIZATION Detailed Guidelines and Plans of Action at  National,  Sectorial,  State,  Ministry,  Department and  Enterprise levels National Cyber Security Policy - 2013 - As I Perceive it 21