Cyber Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

CYBER SECURITY

Science & Technology


INTRODUCTION
It refers to preventing
any unauthorized and
malafide access to
any electronic device.

1% of total
crimes that
It stated that India actually
happened.
recorded 9,622, 11,592
and 12,317 cases of
cybercrime in 2014,
2015 and 2016
respectively.
Why Cyber Security is a challenge?

Absence of any geographical barriers

Rapidly evolving technologies and innovations in the field

Difficulty in locating the attacker because of anonymity that the


cyberspace offers

There are always loopholes in the technologies to be exploited


TYPES OF CYBER CRIME

Computer is Computer is
the target. used as
weapon.
COMPUTER IS THE TARGET

•Hacking
•Virus Attacks
•DOS Attacks
COMPUTER IS THE WEAPON

Cyber Terrorism

IPR Violations
.

Pornography

Credit Card
Frauds
STEPS TAKEN BY GOVERNMENT OF INDIA
.

FRAMEWORKS

Legislative Institutional

Policy
LEGISLATIVE FRAMEWORK

IT act 2000 Specifies the


provides for legal
provisions for
acts which have
cyber security been made
punishable

IPC,1860 has been


Prime objective to amended to take
create an enabling into its purview
environment for cyber crimes
commercial use of
I.T.
POLICY FRAMEWORK
National Cyber
Set up
different
Security Policy 2013
bodies to
tackle
various
levels of Create a
threats. workforce of
Create a National
Critical around 500,000
Information trained in cyber
Infrastructure security
Protection Centre
POLICY FRAMEWORK
Indigenizing technological development in this
regard. National Cyber Security
Policy 2013
Promoting education and awareness in this field

The policy also aims for public-private partnership


for enhancing the security of cyberspace.

To enable effective prevention, investigation and


prosecution of cybercrime and enhancement of law
enforcement capabilities through appropriate
legislative intervention.
INSTITUTIONAL FRAMEWORK
• .

National Critical
information
infrastructure
protection
centre has been
set up to
identify the
critical
information and
take steps for its
protection.
.

CERT-In is the nodal agency for responding to computer


• .
security incidents as and when they occur.

It strengthens security-
related defense of the
Indian Internet domain

Forecasts and
alerts of cyber
security are also
issued by it.
.

• .

I4C (Indian Cyber Crime Coordination


Center) – This is recently established by the
It will assist in
government of India . This will deal with
various cybercrimes. It is set up under cyber security
cyber and information security division of investigations,
ministry of home affairs. prioritize the
development of
response tools

It will also block


websites not in
compliance of
Indian norms
Lacunas

Despite having a scheme of things the goal


remains elusive due to various lacunas like

understaffing of CERT,

Underreporting of cybercrimes in India Ex: only 1% of Cyber


crimes are reported in India according to NCRB.

India’s dependency on imports for various critical defense and information


equipment which can be tampered is also one of the major challenges.
VARIOUS SCHEMES OF THE GOI
• .

Recently launched
Cyber Swachhta Kendra’s: Botnet
Cyber Surakshit
Cleaning and Malware Analysis
Bharat initiative by
Centre
MeitY.

It will work for


Awareness,
Education and
Enablement.
BUDAPEST CONVENTION
First international
treaty seeking to
address Internet
and computer
crime by
harmonizing
national laws,
improving Drawn up by the Council of
Europe in Strasbourg, France,
investigative with the active participation of
techniques, and the Council of Europe's
increasing observer states Canada,
cooperation Japan, South Africa and the
among nations. United States.
.

The following offences


are defined by the India has declined
• Convention: illegal
.
to adopt the
access, illegal Convention on the
interception, data
interference, system grounds that it did
interference, misuse of not participate in its
devices, computer- drafting.
related forgery,
computer-related fraud,
offences related to child
pornography, and
offences related to
copyright and
neighboring rights
Way forward

India may consider accession to Budapest convention.

Enhanced information and education on the subject

Development of offensive capabilities for deterrence in


the field.
Development of human resource in cyber security
• 1. Select the correct statements from the following:
• A. Indian Cyber Crime Coordination Center is set up under MeITY.
• B. It is set up under cyber and information security division.
• Select the correct statements from above.
• a) A only
• b) B only
• c) Both A and B
• d) None of the above
Refer to the following statements regarding Cyber Swacchta Kendra
• A. It is a botnet Cleaning and Malware Analysis Centre.
• B. It facilitates free botnet removal tools under this initiative
• Select the incorrect statements from above.
• a) A only
• b) B only
• c) Both A and B
• d) None of the above
• Budapest convention is related to which of the following
• a) Missile technology control
• b) Space nuclearisation
• c) Women rights
• d) Cybercrime
Mains Question

• 1. Government’s push for Digital India must be complemented with


a robust cyber security regime. Do you agree? Highlight the
government measures in this regard.
• 2. The very nature of cyberspace makes it difficult to handle. What
are the challenges that India faces while ensuring a safe cyberspace.
What can be done to enhance the safety of denizens in India?
• 3. India needs to collaborate internationally in the field of cyber
security to ensure a potentially safe internet to its citizens. Critically
analyse.

You might also like