Why required
1.Internet Penetration
2.People spend time on internet
3.Emails, personal info on social media,
4.Businesses on internet, business data on internet
5.Goverment working on internet-digital india,e-governance etc
6.Threats to data ----terrorist, govt surveillance, use by busineses for profit motive, business competition
7.India is 4th most target country of web attack
Areas it requires
1.Government Infrastructure
2.Business infrastructure
3.Common people data
Threats from
1.Government surveillance on people
2.COmpanies using it for profit motive
3.Foreign government
4.Enemy nation
5.Terrorist organization
6.People against people
Types of security required
1.Hardware security-mobile phone, computers
2.Software security-operating system, apps
Steps taken
Policy
1.Cyber Security policy, 2013
Institutions
1.Cyber Emergency response team-IN
2.Cyber police by Maharashtra
3.national cyber security coordinator in 2014
4.national technological research organisation
Other initiatives
1.Asking for details of security features used by mobile manufacturer in India
2.Cyber swatchta kendra
Issue
1.General tendency of ignoring digital security by people
2.lack of trained staff within government organization as well as in general in country wrt cyber security.
3.Internet servers being setup outside the country which contain all the information. therefore making Indian consumer databse vulnerable.
4.Lack of fund assigned specifically for cyber security.
5.No law for manadatory data security by corporates
6.Indeginous tech is not there
7.Government official are not trained in cyber knowledge. As they are regularly using internet service, therefore they should have knowledge of threats and ways to avoid that
8.lack of coordination with other nation on cyber security
9.Ineffective law-IT act,200 is the only act
COmmittee setup
1.S N Krishna committee on data protection
effect of ineffective cyber security
1.Comon people-Financial loss, loss of privacy, misguided by bad people, cyberbuling etc
2.Society-riots, terrorism, loss of businesses to competitor
3.Nation-cyber war vulnerability, terrorist attack, effect on democracy as happened allegedly in US election
Attacks
1.2007-estonia
2.2010-stuxnet

No comments:
Post a Comment