send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
Cyber Security In India - On October 28, The Nuclear Power Corporation of India Ltd (NPCIL) confirmed the breach by the malware. WhatsApp sued the Israel-based NSO Group for the use of its ‘Pegasus’ spyware on thousands of WhatsApp users in the lead-up to the general elections in India.
Universally, there are broadly four kinds of cyber threats:
The IT Act defines “critical information infrastructure” to be “the computer resource, incapacitation or destruction of which, shall have a debilitating impact on national security, economy, public health or safety” like power and energy, telecom sector etc.
The National Cyber Security Policy, 2013 (NCSP): The objective of this policy in broad terms is to create a secure cyberspace ecosystem and strengthen the regulatory framework.
The B.N. Srikrishna Committee has recommended creating a data protection framework for India.
RBI Meena Hemchandra Expert Panel on Information Technology and Cyber Security: The RBI has instructed banks to mandate cyber security preparedness for addressing all cyber risks at their end as well.
National Strategy for Artificial Intelligence by Niti Aayog: NITI Aayog provided over 30 policy recommendations to invest in scientific research, by encouraging reskilling
and training, accelerating the adoption of AI across the value c
hain, and promoting ethics, privacy, and security in AI.
‘Framework for enhancing security in cyberspace’ for cyber security in the Indian cyberspace, with the National Security Council Secretariat as nodal agency.
Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre) has been launched for providing detection of malicious programmes and free tools to remove such programmes.
Cyber-Crime Prevention against Women & Children’ Scheme: Implemented by Ministry of Home Affairs, the scheme aims to prevent and reduce cyber crimes against women and children.
TechSagar: The National Cyber Security Coordinator’s office in partnership with Data Security Council (DSCI) of India launched TechSagar –a consolidated and comprehensive repository of India’s cyber tech capabilities.
Cert-In’s secureurpc.com: People can download scanners and run it on their computers to clean them of any malware.
Future govt. initiatives:
Tri-service agency for cyber warfare.
Changing purview of data privacy, security, cybercrime and related issues: These are currently under the purview of the IT ministry which may soon be overseen by the Telecom Regulatory Authority of India (TRAI) and the Telecom Commission (TC) because 93 percent of all such data is consumed on the telecom networks, like e-commerce.
India does not have a dedicated cyber security law. The Information Technology Act, 2000, is not a cyber security law, which is why, breaches of cyber security continue to go unreported and there is no statutory elaboration of rights, duties, and responsibilities of stakeholders in this regard.
Cybersecurity standards and regulations for mobile applications and devices to tackle ransomware: The MEITY has not formulated a policy.
Proposed cyber command Vs. Tri-Service Agency: Indian Armed forces are in the process of establishing a cyber command for strengthening the cyber security of defence installations. It will be a parallel hierarchical structure which can result in the jurisdiction issues with the Tri-service agency.
Offshore cybersecurity Threats: Over the years, Indians have been subject to several forms of cyber threats from overseas. However, India has not acceded to the Budapest Convention on Cybercrime.
The Convention on Cybercrime of the Council of Europe (CETS No.185), known as the Budapest Convention, is the only binding international instrument on this issue. It serves as a guideline for any country developing comprehensive national legislation against Cybercrime and as a framework for international cooperation between State Parties to this treaty.
The Budapest Convention is supplemented by a Protocol on Xenophobia and Racism committed through computer systems.
Technology & Fundamental Rights:
Data deprivation:
Policy challenges in ascribing responsibility in cases of financial breaches due to multiple stakeholders: Cyber security encompasses banks, telecom companies, financial service providers, technology platforms, social media platforms, e-commerce companies, and the government, so there is difficulty in role assignment.
Untrained police: the conviction rate is low because policemen are not trained.
Lack of people's awareness: People do not understand the ramifications of cybersecurity breaches and India lacks the culture of cybersecurity.
Contracts awarded to Chinese companies for installation of supervisory control and data acquisition systems (SCADA) for power distribution: Cyberattacks on the electricity grid could have a debilitating impact on national security, governance, economy and social well-being of the nation.
SCADA is a computer-based industrial automation control system that practically makes factories and utilities run on their own. In an electrical system, SCADA maintains a balance between demand and supply.
Chinese Mobiles: Chinese handset brands command more than half of India’s smartphone market share, and are often pre-loaded with bundled apps. In 2014, the Indian Air Force red-flagged the use of Chinese origin smartphones by its personnel and their family members due unencrypted transfer of user data to servers located in China.
“Black Box Phenomenon” in AI: It is related to very little or no understanding of what happens in between AI and only the input data and results being the known factors due to developer’s emphasis being less on ethics.
The ‘Internet of Things’ is a weak link : Often the IoT devices lack basic security features and rely upon default passwords that can give attackers easy access giving rise to botnets threats.
Skills shortage: The dearth of skilled cybersecurity professionals continues to be a major problem for many organizations. There is inadequate research in academia.
An understanding of the legal challenges unique to cyberspace: Crimes committed on the internet, throw up complex jurisdictional questions requiring cross-border cooperation between law enforcement agencies. Current solutions operate in silos.
CCTNS aims to connect the police stations of the country to facilitate collection, storage, retrieval, analysis, transfer and sharing of data and information at the police station and between the police station and the State Headquarters and the Central Police Organizations.
By: Shashank Shekhar ProfileResourcesReport error
Access to prime resources
New Courses