National Cyber Security Challenges Before Policy, 2013
India is the most affected country in terms of cyber crime, Bangalore has the highest number of cyber crimes in India followed by Visakhapatnam and Delhi where cyber crimes have doubled in 2016 as compared to 2015 (NCRB). Despite Internet penetration increasing by about 28%, cyber crimes have increased 107% annually, indicating that despite the implementation of the National Cyber Security Policy, cyber crimes have increased significantly.Lack of regulatory infrastructure and coordination among officers especially in the state police leads to delays in action leading to poor implementation of this policy, lack of digital literacy among citizens as seen in the recent Wannacry incident. was seen in the case.
• The NCSP, 2013 has adopted a comprehensive approach, it does not provide any specific details and does not provide any mechanism to deal with the increasing digital threats like banking frauds in the recent past. Similarly, neither has it been defined which areas will be covered under critical infrastructure.
• The nature of the Internet is so vast and complex that it involves anonymous suspects sitting at different places and cross-border transactions.
These crimes are not detected and these crimes are committed at a very high speed at low cost. The technology related to the security system changes very quickly, making it out of date. This requires prompt action and innovative planning and this cannot be done by NCSP.
India's legal system needs to be upgraded with respect to better cyber laws as its current Information Technology Act, 2000 does not cover the adverse issues in view of the rapid development in cyber space. A National Cyber Registry should be created in which data of talents of private information technology sector should be compiled which can be effectively used in empowering the government cyber machinery like cyber audit, cyber physic, e-discovery investigation etc.which will lead to the creation of are silient, strong and open cyber space.• Recommendations of Gulshan Rai Committee with respect to cyber security should be implemented, such as developing an advanced application for social media analytics to monitor the activities of social media platforms belonging to government organizations, reducing the dependence of the government on foreign servers To establish a separate agency for online registration and monitoring of cyber crimes and to integrate data from the Crime and Criminal Tracking Network System (MoCTNS) to ensure a separate secure gateway for all forms of government communications.Note: (The objective of CCTNS is to interconnect all police stations in the country to facilitate collection, storage, receipt,analysis, transfer and sharing of data between a police's tation, between police stations, state headquarters and central police organizations. )
Important Strategies as prescribed by the National Cyber Security Policy, 2013
A. Creating a Safe Cyber Environment To encourage all private and government organizations to appoint cyber information securityofficers and formulate information security policies whowill be responsible for taking cyber security relatedmeasures in the organisation. This includes secure flowof information, training of employees, crisis managementPrecise on the topics of General StudiesFund Allocation for Scheme Cyber SecurityTimelycoordination between various departments of theorganization will be involved.B. Preparation of Assurance Framework• Creating infrastructure to certify compliancewith cyber security bestpractices and global standards.• Implementing the world's best securitypractices in risk assessment and cybercrisis management by all governmententities and critical sectors to reduce therisk of disruption.8. Encouraging open standardsEncouraging the use of open standards tofacilitate the mutual exchange and use ofdata related to products and servicesbetween the government and the private sector.D. Tweaking the faruree frameworkKeeping in view the rapid technological developmentsin cyberspace, creating a proactive legal frameworkfor capacity building in this area andconducting periodic audits and evaluations.E. Developing an early warning mechanism• To operate Computer Emergency ResponseTeam-CERT-In at national levelon 24×7 basis to act as a nodalagency for coordinating all cybersecurity related efforts inthe country and To operate separateCERTs for different sectors anddifferent states for emergencyassistance and crisis managementin the regions.• Implementing a cyber crisis management planto deal with cyber incidentsaffecting critical national processesand endangering public safety.F. Securing the e-governanceservices of the governmentTrusted government transactions, processes andcommunications with citizens and private enterprisesTo encourage the widespreaduse of Public Key Infrastructure(PKI) forG. Protecting criticalinformation infrastructureTo operate the National CriticalInformation Infrastructure ProtectionCenter (NCIIPC) on 24×7 basis as anodal agency for safeguardingthe critical infrastructure of the countryfrom the most serious digital threatsto public safety and national security.will work.
Creating a secure and resilient cyberspace for citizens, businesses and the government.
The National Cyber Security Policy, 2013 (NCSP) envisages extensive cooperation and capacity building to create a resilient, secure cyberspace environment and reduce the risk of potential cyber attacks by strengthening defense systems. In the global village, free, speedy and widespread exchange of information is in line with the demands of the information age.
• Information Technology (1.T.) is an important sector based on cyberspace which has not only emerged as an important center in the development of Indian economy but has also emerged as a factor of social change.
• The sector has been a provider of employment and quality professional services. It has enhanced the image of India at the global level. People's living standards have improved in world-renowned cities like Bangalore and companies have supported cultural diversity which is the life line of Indian ethos.In addition, in view of the ambitious goals of rapid social change and inclusive growth, it is important to create a sound secure computing environment that can instill confidence in the public about digital transaction processes, services,networks and software etc.• National security, social security and economic,social and political well being of individuals
are facing immense cyber threats,e.g. cyber phishing, cyber virus like the recent flume virus WannaCry
Ransomware), cyber forgery/ piracy of movie/software, which has recently been recognized as part of a fundamental right by the Supreme Court, global powers like the US have been involved in controversial espionage projects like (PRISM) in the past.Similarly in recent yahoo data theft incident,business/business related confidential information theft (ICICI online banking espionage incident Children and vulnerable sections are faced with cyberbullying, hacking incidents,especially on social media Why is cyber security policy necessary for women? There have been incidents of stalking and trolling against opponents.For example, targeting of minorities by cow vigilantes is a matter of concern as it may affect our traditional democratic and inclusive Lifestyle isat risk.Other online threats include defamation,obscenity, cyber terrorism with the view of online recruitment from around the world by ISIS, the development of the fifth aspect of cyber warfare between countries. For example, Iran's nuclear installations are being targeted bythe Stuxnet virus.Cyber warfare also threatens our sovereignty as hackers sitting in neighboring enemy countries secretly pose a threat to India's critical infrastructure, especially when it comes to India's digital India initiative, demonetisation campaign, e-governance plan 4. New concepts such as the digital currency bitcoin are being adopted. E-commerce is growing. In sucha situation, this threat is further increased due to lack of a secure cryptographic policy,sound infrastructure and digital literacy among citizens.
• All these problems related to the cyberspace world can be reduced due tothe wrong activities of the cyberspace world only after immediate detection,information exchange, investigation and coordinated action. Apart from this, only by adopting measures like stability,confidentiality, integrity and data compatibility of servers, networks and critical infrastructure, confidence among citizens to actively adopt online processes and products can be instilled and national interest can be protected.• About 66% of the world's Internet users have faced cyber threats at some point.About 33% of the people in India use the Internet and due to several initiatives of the government, such as Aadhar,Digital India campaign etc. Internet usage is increasing very fast.• India is already the second most affected country in terms of cyber crimes happening globally. Not only this, India is likely to suffer more due to cyber attacks in the future, because its digital infrastructure is mostly insecure.For example, the Government of India has recently decided to provide separate phone sets and secure e-mail channels to defense personnel to ensure confidentiality and integrity of data.