Wednesday, August 30, 2017

Topic of the day-Cyber Security

Why required
1.Internet Penetration
2.People spend time on internet
3.Emails, personal info on social media,
4.Businesses on internet, business data on internet
5.Goverment working on internet-digital india,e-governance etc
6.Threats to data ----terrorist, govt surveillance, use by busineses for profit motive, business competition
7.India is 4th most target country of web attack

Areas it requires
1.Government Infrastructure
2.Business infrastructure
3.Common people data

Threats from
1.Government surveillance on people
2.COmpanies using it for profit motive
3.Foreign government
4.Enemy nation
5.Terrorist organization
6.People against people

Types of security required
1.Hardware security-mobile phone, computers
2.Software security-operating system, apps

Steps taken
Policy
1.Cyber Security policy, 2013

Institutions
1.Cyber Emergency response team-IN
2.Cyber police by Maharashtra
3.national cyber security coordinator in 2014
4.national technological research organisation

Other initiatives
1.Asking for details of security features used by mobile manufacturer in India
2.Cyber swatchta kendra



Issue
1.General tendency of ignoring digital security by people
2.lack of trained staff within government organization as well as in general in country wrt cyber security.
3.Internet servers being setup outside the country which contain all the information. therefore making Indian consumer databse vulnerable.
4.Lack of fund assigned specifically for cyber security.
5.No law for manadatory data security by corporates
6.Indeginous tech is not there
7.Government official are not trained in cyber knowledge. As they are regularly using internet service, therefore they should have knowledge of threats and ways to avoid that
8.lack of coordination with other nation on cyber security
9.Ineffective law-IT act,200 is the only act

COmmittee setup
1.S N Krishna committee on data protection


effect of ineffective cyber security
1.Comon people-Financial loss, loss of privacy, misguided by bad people, cyberbuling etc
2.Society-riots, terrorism, loss of businesses to competitor
3.Nation-cyber war vulnerability, terrorist attack, effect on democracy as happened allegedly in US election


Attacks
1.2007-estonia
2.2010-stuxnet



Forward
1.implementation shah committe recommendation of 2012
A-notice
B-consent and choice
C-limited collection
D-limited purpose
E-disclosure of info
F-security
G-acountability
H-openness

No comments:

Post a Comment