send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
The saying that “information is power” has never been more accurate than it is today. For millennia, power was something measured in purely physical terms: Control over landmass and resources, productive population and resource conversion. Another dimension has been added to them today; their electronic information profile. In the information age
Some examples from Indian context are:
Cyber crime is criminal activity using computers and internet. It can involve: computer as target, computer as weapon and computer as an accessory. Cyber crime is generally equated more with individual criminal activities, whereas cyber attacks and cyber terrorism can be institutional in nature. Cyber warfare is associated mainly with state sponsored activities.
User-initiated crime
Botnet - a network of software robots, or bots, that automatically spread malware
Fast Flux - moving data quickly among the computers in a botnet to make it difficult to trace the source of malware or phishing websites
Zombie Computer - a computer that has been hacked into and is used to launch malicious attacks or to become part of a botnet
Social Engineering - using lies and manipulation to trick people into revealing their personal information. Phishing is a form of social engineering
Denial-of-Service attacks - flooding a network or server with traffic in order to make it unavailable to its users
Skimmers - Devices that steal credit card information when the card is swiped through them. This can happen in stores or restaurants when the card is out of the owner's view, and frequently the credit card information is then sold online through a criminal community.
Trojan Attack:The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. The name Trojan Horse is popular. Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the Trojan.
Virus and Worm attack:A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
A distributed denial of service (DoS) attack is accomplished by using the Internet to break into computers and using them to attack a network. Hundreds or thousands of computer systems across the Internet can be turned into “zombies” and used to attack another system or website.
Social engineering is a tactic used by cyber criminals that uses lies and manipulation to trick people into revealing their personal information. Social engineering attacks frequently involve very convincing fake stories to lure victims into their trap. Common social engineering attacks include:
These kinds of activities are politically motivated attacks carried out by sub-national groups with main aim of causing maximum damage to unknown victims. The damage could be in form of economic, social or actual physical harm to the victims. Mains targets are military installations, power plants, air traffic controllers, banking industry to name a few.
Denial of Service attack is predecessor of attacks on critical infrastructure. Once emboldened it may lead to series of cyber attacks targeting sensitive information and installations.
The grey area between the boundaries of the military field and the cyber field is one of the critical connections of defence in the 21st century. Winning wars without information is risky, and the cyber-world contains the information that is needed to win wars. It is well understood that the prosecution of war requires a supply of information to pass through the information chain to reach the physical military chain in order to enable military strategy, tactics and operations. In the absence of this, one fights without the critical input to properly calibrate attack and response.
Superiority of position in the cyber-battlefield has a daunting requirement set, namely, cryptology and applied code-breaking experience applied in complex and mission critical scenarios; investment in high tech fields to build scaled processing capability; sophistication in multiple fields of hardware, software and communications technology; advanced data analytics; national influence over the leading global internet platforms, and; a culture that fosters innovation to find new ways to use digital information in civilian and military applications; and of course, world class mathematical capability.
There are six offensive strategies in a cyber-war, namely
Nation/State-sponsored hackers (hackers either in the military of a nation/state or supported by said state) attack computers and networks that are involved with sensitive resources within a country.
Attack is initiated by indentifying the system flaws and exploiting those flaws to either gain control of that system or destroy it.
Cyber warfare targets sensitive industry like the military and defense, and the national power grid. Cyber warfare could target the most important strategic asset a country has: its population, by terrorizing them to destabilize or dishearten that population from fighting like hitting major financial sectors and causing economic damage to the country’s economy and abruptly terminating public communication
PRISM is an international electronic surveillance programme for the purpose of mass data collection from the internet. The programme collects data and communications through a wide range of consumer internet companies including, Microsoft, Yahoo!, Google, Facebook, Apple and others. Based on these assets and capabilities, America today is the world’s only cyber-superpower. The National Security Agency of USA, responsible for signals intelligence (SIGINT) and the protection of US information systems and security, has an estimated annual budget of US$8-10bn and 40,000 employees. With regards to cyber-espionage, SIGINT is emerging as the most important element of foreign intelligence gathering, and the NSA consumes an estimated 20% of the total US intelligence budget, which funds 16 separate government agencies. In addition to the domestic wiretapping, internet monitoring and data mining, the agency harvests massive amounts of data and intelligence from foreign computers and networks, the total volume of which has been estimated at 2.1m gigabytes per hour, the equivalent of hundreds of millions of pages of text.
China’s cyber-engagement priorities include a significant amount of economic objectives in addition to narrower foreign and domestic security issues. China today has a 30,000 strong domestic “internet police force” monitoring and censoring its citizens’ internet usage. China’s government hackers are alleged to have stolen a variety of US secrets, including gas pipeline control systems and missile technology, as well as commercial secrets from Google and other Silicon Valley companies. While the US today is subject to thousands of cyber-attacks every year, many of them from countries like Brazil and Russia, more attacks originate from China than from any other country.
A unit of the People’s Liberation Army based in Shanghai, Unit 61398, has been identified internationally as the likely base for thousands of attacks on North American corporate and government targets.
Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc.
Cyber terrorism is an attractive option for modern terrorists for several reasons.
Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. Information posted to a bulletin board can be accessed by anyone. This means that anyone can place
Cyber defamation is also called as Cyber smearing.
Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.
The current state of cyber crime
Cybercrime in the past 12 months has been nothing short of epic. Never before have we borne witness to the magnitude or sophistication of online crime as we did in 2015.
In the 2015 Cost of Data Breach Study by IBM and the Ponemon Institute, the average total cost of a data breach increased from $3.52 million in 2014 to $3.79 million. Another study said cybercrime will become a $2.1 trillion problem by 2019. That’s only three years away, and judging by the way things are going, we might get there sooner than we ever imagined.
Earlier in 2015, IBM Security forecasted some trends they included:
These predictions not only materialized, but actually exceeded the forecast.
Many organizations are already looking to biometrics-based solutions to better authenticate customers and provide them with services in a more secure manner. While biometrics is a more advanced identifier, it is still being stored and managed on the same hardware that can be breached by cybercriminals.
Furthermore, biometric data has not yet broadly seen adequate security or safe processing applied to its repositories. For example, the U.S. Office of Personnel Management (OPM) breach resulted in the theft of 5.6 million fingerprints, and the biometrics were stolen alongside extensive data on each person.
Biometric data is also being traded in ways that its owners never intended. For example, DNA data from newborn blood samples in California was sold to third parties. How was that data transferred to the buyers? Did the parents know the data was being sold? How is that data being protected by the third parties who bought it, and who else can they sell it to?
Overall, biometrics requires adequate security and processes in order to materialize its promise as better authentication. One example is voice biometrics. Voice biometrics is the most mature and widespread biometric identification model at this time. To guard its authenticity, security researchers and developers will have to consider mobile malware that can intercept calls, record voices and exfiltrate voice samples to an attacker. The possibility that voice patterns can be stolen means that we cannot trust voice biometrics as the sole authenticator of the genuine customer.
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016, better known as Aadhaar Bill, was introduced in Lok Sabha on March 3. The Bill intends to provide for targeted delivery of subsidies and services to individuals residing in India by assigning them unique identity numbers. Parliament was debating on the certain portions of the Bill, which may need clarification or amendments:
1. Allowing private agencies to use Aadhaar contradicts statement of objects and reasons of the Bill
The Statement of Objects and Reasons of the Bill states that identification of targeted beneficiaries for delivery of various government subsidies and services has become a challenge for the government. At the time of the introduction of the Bill, the government stated that “the Bill confines itself only to governmental expenditure.” However, the Bill also allows private persons to use Aadhaar as a proof of identity for any purpose.
2. Issues with sharing information collected under Aadhaar
The provisions in the Bill with regard to protection of identity information and authentication records may be affected by an ongoing writ petition in the Supreme Court. The petition claims that Aadhaar may be in violation of right to privacy. A five-judge Bench of the court is examining whether right to privacy is a fundamental right.
3. Disclosure of information to intelligence or law enforcement agencies
The provisions regulating disclosure of private information under the Bill differ from guidelines specified under another law — the Indian Telegraph Act, 1885. The Bill differs from the guidelines for phone tapping in two ways. First, the Bill permits sharing in the interest of ‘national security’ rather than for public emergency or public safety. Second, the order can be issued by an officer of the rank of Joint Secretary, instead of a Home Secretary.
4. Potential to profile individuals
The Bill does not specifically prohibit law enforcement and intelligence agencies from using the Aadhaar number as a link (key) across various datasets (such as telephone records, air travel records, etc.) in order to recognise patterns of behaviour.
Techniques such as running computer programmes across datasets for pattern recognition can be used for various purposes such as detecting potential illegal activities. However, these can also lead to harassment of innocent individuals who get identified incorrectly as potential threats.
5. UID authority’s exclusive power to make complaints
A provision says, “Courts cannot take cognizance of any offence punishable under the Act, unless a complaint is made by the UID authority, or a person authorised by it.” This may present a conflict of interest as under the Bill the UID authority is responsible for the security and confidentiality of identity information and authentication records. There may be situations in which members or employees of the UID authority are responsible for a security breach.
6. Discretionary powers of UIDAI
The Bill empowers the UID authority to specify demographic information that may be collected. The only restriction imposed on the authority is that it shall not record information pertaining to race, religion, caste, language, records of entitlements, income or health of the individual. This power will allow the authority to collect additional personal information, without prior approval from Parliament.
7. Collection of personal information
The enrolment form currently being used contains fields for capturing information such as the National Population Register (NPR) receipt number, mobile number, and bank account number. Though these fields are labelled ‘optional’, it is unclear why this additional information is being recorded.
8. Ambiguity in specifying biometric information
The Bill specifies biometric information to include photograph, fingerprints, and iris scans. Further it empowers the UID authority to specify other biological information that may be collected. Therefore, the Bill does not prevent the UID authority from requiring the collection of biometric information such as DNA.
9. Time period for maintaining authentication records
The Bill does not specify the maximum duration for which authentication records may be stored by the UID authority. Instead it allows the UID authority to specify this through regulations. Maintaining authentication records over a long time period may be misused for activities such as profiling an individual’s behaviour.
Late 2015 showed the first signs of mobile malware for Android that was able to materialize the effect web-injections have on users in the PC browser: overlay malware.
Overlay malware apps are one-stop fraud facilitators that steal user credentials and SMS two-factor authentication codes — right on the mobile device and at the same time. It is an account takeover facilitator par excellence, and it is quite effective.
This new type of malicious app, the likes of GM Bot and FakeLogin, are being sold commercially in underground cybercrime venues by a few developers who program special pop-up windows carefully adapted to the look and feel of bank applications, e-commerce apps and payment platforms.
In a sense, the public sale of mobile malware in the underground in 2016 will fill the vacuum left by the banking Trojan marketplace, which has dwindled away in the past five years. Mobile malware will become commoditized in every aspect of operating a mobile botnet. Vendors offer cybercriminals the option to buy the software they need, resources to operate it and technical support they require in order to succeed in their schemes.
The burgeoning overlay malware trend is especially worrying because it enables criminals to take advantage of user trust in bank applications and thus steal credentials on the mobile device when the user is already accessing the relevant app.
Overlay malware is often bundled with spyware and RAT-type apps, making it much more invasive and risky to the infected users because the app exfiltrates more information from the device and allows for remote commands from the attacker.
Some factors driving these threat advancements in the mobile platform include the inherent open-source and decentralized nature of the Android platform and its maturity level. These can make for gaping security holes that are unearthed by researchers on a regular basis. Some argue that the Android OS is simply not a trusted environment for apps to run in — at least not yet, and especially since the responsibility for applying patches and updates is, for the most part, left to users.
It would seem the more prudent approach would be to have security come from within the apps themselves, relying less on the actual platform’s security. Moreover, with Windows 10 planning to converge across all devices, the acceleration of malware crossing over to Windows phones is almost guaranteed.
From ransomware to other kinds of cyber extortion, cybercriminals saw their nefarious ventures soar in 2015. The Cryptolocker gang reportedly managed to gross over $30 million last year, proving that even the simpler malware in the wild can make criminals rich.
Organized cybercrime gangs know ROI when they see it: More advanced groups have stepped into the ransomware arena in 2015, building stronger, virtually unbeatable malware that forces victims to pay up.
In 2016, one can expect to see more ransomware groups and a higher scale of ransom demanded of victims, especially if the infected endpoint belongs to a business.
Aside from using malware to encrypt files, there will also be proliferation of cyber extortion groups and methods. Black-hat attackers may demand ransoms to halt DDoS attacks or approach businesses with demands for cash after hijacking critical data from company networks.
In 2016, cybercrime may leverage the significant rise of bitcoin since it is the currency that criminals prefer, trusting the anonymity it affords them in ransom situations.
The Dark Web is no longer the sort of venue that attracts the most advanced cybercriminal crowd. As curious, unskilled users flock to learn about the Dark Web, it will become even more devalued for the more experienced cybercriminals, driving them further underground.
Card fraud is a global problem that keeps escalating. This statement remains true even as chip-and-PIN technology is being rolled out in almost every first-world country. Chip-and-PIN, or the Europay-Mastercard-Visa (EMV) standard, is designed to protect cards from counterfeiting and fraud in physical scenarios. Yet this security measure is under constant attack and is also leading actors to intensify fraud in the digital channels.
Since counterfeiting is that much harder with chip-enabled cards, the result is a dollar-for-dollar displacement from counterfeiting fraud to card-not-present (CNP) fraud — transactions processed online, over the phone and via mobile payments.
In 2015, EMV was attacked in some creative ways. Tools for EMV replay attacks were for sale in underground boards and designed to facilitate cloning chip-protected cards issued by banks that were not checking all the relevant EMV transaction parameters.
Criminals also preyed on the chip technology itself to break trust and the security embedded into payment cards. In late October 2015, a team of French researchers completed their analysis of the techniques of a criminal ring that, in 2011, managed to steal $680,000 using modified EMV cards. The researchers were amazed at the sophistication of the man-in-the-middle (MitM) attack. We expect to see more crafty attacks on EMV technology in 2016 as criminals continue to push for a way to exploit this payment method.
Point-of-sale (POS) malware is also expected to push for more modularity and sophistication. This escalation will result from well-funded gangs investing in the development of POS malware. After seeing the proven success of POS malware in the past few years, organized cybercrime will not hesitate to invest in building this sort of malware, and we forecast seeing more persistent, stealthy and highly modular POS malware in 2016.
On the more physical side of carding fraud, we expect to see the use of skimmers die down. Instead, be prepared for a rise in the use of shimmer-type devices that can record the card’s magnetic stripe and its chip data.
Although one can safely say that we see escalation in cybercrime every year, 2015 was definitely a year that stands out with respect to the scale of crime observed. While it has been a gradual process, 2015 was the first year that saw organized cybercrime really exert its power in the digital realms. These mobs are headed by crime bosses that have troops on computers and on the streets, collecting money from mules and wiping the digital traces of their ill-begotten profits.
It’s important to keep in mind that when one talks about organized cybercrime today, it is not fighting lone attackers or small factions of fraudsters anymore. Rather, one now faces full-blown organizations that are organized like startup companies. They are not manned by youngsters; they employ highly experienced developers with deep knowledge that allows them to bring constant innovation into malware and attack tactics. Thus, it is no surprise that, according to CSO Online, the average age of a cybercriminal is 35 years old. Additionally, 80 percent of black-hat hackers are affiliated with organized crime, working as part of closed groups.
These organizations also employ criminals other than attackers to help with the collection and moving of stolen funds, mobilizing it on the streets and laundering it along the way.
Based on research that exposed the likes of Carbanak, Dyre Wolf or the Shifu Trojan, it seems that cybercriminals have never been more brazen and bold in their attacks. They are stealing millions of dollars at a time compared with a five-figure magnitude in the years prior.
The top offenders in the corporate fraud arena are Dyre, Dridex, Rovnix and Shifu. In 2016,it is expected to see that trend persist, intensify and spread to more organized malware gangs. One also expects to see these gangs venture into new territories, as they had been doing throughout 2015.
More on the malware front, malware adjusting attack scenarios and methods in order to circumvent the security that banks have in place are predicted. One example is the use of remote admin tools (RAT) in conjunction with a banking Trojan in order to access devices attached to the endpoint. In 2015, the Dridex Trojan used that method in some of its attacks.
2015 also saw non-malware device takeover, where Trojans downloaded and deployed legitimate remote assistance software and then leveraged it in fraudulent activity from the victim’s device. Dridex tested this method in September 2015.
Financial cybercrime will also intensify on the targeted attacks front. In this case, we are not looking at botmasters that amass an army of zombie PCs but rather financially motivated black-hat groups that make it a top priority to target the financial institution as a high-value enterprise. Groups like Anunak are made up of cybercriminals who take on digital crime projects that can generate hundreds of millions of dollars at a time. This group was reportedly behind the Carbanak heist and similar attack sprees before it.
Advanced adversaries are already carrying out sporadic integrity attacks. These are cases where sophisticated attackers breach the systems of enterprises and corporations with the purpose of altering data that the organization relies on. Changing the data can make the organization base decisions on incorrect information or automatically pay out invoices into the wrong accounts — those that belong to the criminals! In 2016, one can expect to see more integrity attacks and see these cases cause heavy losses to the victim organizations.
Ransomware Attacks: Petya
Petya is a ransomware, similar to the Wannacry attack. It is part of a new wave of cyberattacks that has hit computer servers all across Europe, locking up computer data and crippling enterprise services in the corporate sector.
The ransomware locks up a computer‘s files and demands $300 Bitcoins as ransom to unlock the data.
All data on a computer, network gets encrypted.
Once the malware infects the computer, it will wait for an hour and then reboots the system.
After the rebooting, the files are encrypted and the user gets a ransom note on their PC asking them to pay up.
Users are also warned against switching off their PC during the rebooting process, because it could make them lose their files.
In 2015, we started seeing the emergence of targeted attack tools and methods in the realms of financially motivated cybercrime. Phenomena like signed malware, which was first discovered when the Stuxnet worm was exposed, became an everyday occurrence with banking Trojans, POS malware and even ransomware.
Cybercriminals picked up concepts used by threat-actor groups such as leveraging a poisoned remote assistance tool for remote-controlling infected endpoints and using them against businesses. The Hacking Team leak potentially catalyzed black-hat capabilities in the cybercrime arena in 2015, allowing criminals to obtain rare and effective exploits to use in their everyday schemes. The leak reportedly facilitated the work of Chinese cybercriminals who targeted a financial firm in the U.S. by using exploits leaked from that same breach.
72% of Indian companies faced cyber-attacks in 2015.
There has been an exponential rise in Ransomware cases in the last one year. In 2016, security codes of around 32 lakh debit cards were breached. Several users reported unauthorised transactions from locations in China. There are increasing number of data thefts among the civilians.
Recent Attacks
The recent attack created cyber security threats to major Indian companies RJio, Airtel and NSE RJio - Personal data such as Aadhaar details of the telecom users has been published in a website. Airtel - The Radio Access Network went down for more than an hour in and around Delhi. There was a network outage in Delhi/NCR and one of the network nodes had been corrupted.
Since the dependence of economies is increasing on IT and IT enabled infrastructure, they have assumed strategic importance. Miscreants, criminals, extremists and terrorist organization are increasingly targeting these services. Cyber Security today has become an important aspect in National Security.
Cyber security [1]is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.
Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following:
India is steadily building capabilities to take care of its security concerns largely on its own, but some concerns have international dimensions. In this, diplomacy and strategic partnerships would play an important role, but Intelligence cooperation with major powers and countries is also required, particularly in combating international terrorism.
In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000.
Cyber laws are contained in the IT Act, 2000.This Act aims to provide the legal infrastructure for e-commerce in India.
The Information Technology Act, 2000 also aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means. The Act states that unless otherwise agreed, an acceptance of contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability.
The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes.
The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records.
In view of the growth in transactions and communications carried out through electronic records, the Act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. The Act has also proposed a legal framework for the authentication and origin of electronic records / communications through digital signature.
The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date.
Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.
The "National Cyber Security Policy" has been prepared in consultation with all relevant stakeholders, user entities and public.
This policy aims at facilitating creation of secure computing environment and enabling adequate trust and confidence in electronic transactions and also guiding stakeholders actions for protection of cyber space.
The National Cyber Security Policy document outlines a road-map to create a framework for comprehensive, collaborative and collective response to deal with the issue of cyber security at all levels within the country.
The policy recognises the need for objectives and strategies that need to be adopted both at the national level as well as international level.
The objectives and strategies outlined in the National Cyber Security Policy together serve as a means to:
i. Articulate our concerns, understanding, priorities for action as well as directed efforts.
ii. Provide confidence and reasonable assurance to all stakeholders in the country (Government, business, industry and general public) and global community, about the safety, resiliency and security of cyber space.
iii. Adopt a suitable posturing that can signal our resolve to make determined efforts to effectively monitor, deter & deal with cyber crime and cyber attacks.
Salient features of the policy
In brief, the National Cyber Security Policy covers the following aspects:
A vision and mission statement aimed at building a secure and resilience cyber space for citizens, businesses and Government.
Enabling goals aimed at reducing national vulnerability to cyber attacks, preventing cyber attacks & cyber crimes, minimising response & recover time and effective cyber crime investigation and prosecution.
Focused actions at the level of Govt., public-private partnership arrangements, cyber security related technology actions, protection of critical information infrastructure and national alerts and advice mechanism, awareness & capacity building and promoting information sharing and cooperation.
Enhancing cooperation and coordination between all the stakeholder entities within the country.
Objectives and strategies in support of the National cyber security vision and mission.
Framework and initiatives that can be pursued at the Govt. level, sectoral levels as well as in public private partnership mode.
Facilitating monitoring key trends at the national level such as trends in cyber security compliance, cyber attacks, cyber crime and cyber infrastructure growth.
The National Cyber Coordination Centre (NCCC)
NCCC is a multi-stakeholder cyber-security and e-surveillance agency implemented by Indian Computer Emergency Response Team (CERT-In), Union Ministry of Electronics and Information Technology. It derives its powers as per provisions of section 69B of the Information Technology Act, 2000 and the Rules notified there under.
It will collect, integrate and scan [Internet] traffic data from different gateway routers of major ISPs at a centralized location for analysis, international gateway traffic and domestic traffic will be aggregated separately. The NCCC will facilitate real-time assessment of cyber security threats in the country and generate actionable reports/alerts for proactive actions by the concerned (law enforcement) agencies. Though the government won’t say that they would be able to look into your Facebook or Twitter accounts as and when required, the fact remains that the setting up of the federal Internet scanning agency will give law enforcement agencies direct access to all Internet accounts, be it your e-mails, blogs or social networking data. Till now CERT-In was involved partially in this type of work although without intruding into any personal accounts. DG CERT-In is called National cyber coordinator. Now, the government is undecided on whom to appoint national cyber coordinator - the head of the NCCC. So far, CERT-IN has been the lead agency in signing agreements for better coordination with the international community.
The CERT-In (Cyber Emergency Response Team - India)
The CERT-In (Cyber Emergency Response Team - India) Established in 2004, CERT-In function under DIT CERT-In is India’s response to cyber threats and has following charter, mission and constituency. Charter: "The purpose of the CERT-In is, to become the nation's most trusted referral agency of the Indian Community for responding to computer security incidents as and when they occur” Mission “To enhance the security of India's Communications and Information Infrastructure through proactive action and effective collaboration." Constituency: The CERT-In's constituency is the Indian Cyber-community. is mandated under the IT Amendment Act, 2008 to serve as the national agency in charge of cyber security.
NIC- CERT setup
National Technical Research Organisation (NTRO)
[1](Definition as per International Telecommunication Union)
By: Abhipedia ProfileResourcesReport error
Access to prime resources
New Courses