Cyber Security
Cyber Security
CYBER SECURITY
-by Jayant Parikshit
CORE IAS
57/11, 2
nd
Floor, Near Syndicate Bank, Bada Bazar, Old Rajendra Nagar,
8373934419, 8373934439 www.coreias.org [email protected]
Page |2
CONTENT
1. In the News:
a. WanaCry Ransomware b. CERT-In
In and Sectoral CERTs
b. Blue Whale Challenge c. Information Exchange with
2. Cyber Space International CERTs
3. Cyber Security (vi) Security training
4. Cyber Safety (vii) Collaboration International National
5. India’s immediate Concerns 19. Advantages of Cyber Laws
6. Combating Cyber Crime 20. National Cyber Security Policy 2013
7. Nature of Cyber Threats 21. Security Incident – Early Warning and
8. Critical Information Infrastructure (CII) Response
9. 12 sectors identified as CII 22. Cyber Security R&D
10. National Critical Information Infrastructure 23. Capacity Development/Training
Protection Centre" (NCIIPC) 24. Collaboration
11. NCIIPC - Key Responsibilities 25. Current Cyber Crime Scenario in India
12. Cyber Warfare 26. Social Media-The
The Growing Target
13. Special features of Cyber war 27. National Securityty Doctrine
14. Examples of Cyber warfare 28. DIGITAL ARMED FORCE
15. Non-State Actors and Cyber Space: An Vision of Digital India
Overview Army and Digital India
16. What Threat Does India Face from Cyber The vision of Digital India can be the
Non-state Actors? vision for all ranks of the Army too
17. What Could We Do to Counter the Threat 29. Security
of Non-State
State Actors in Cyberspace? 30. Social Media
18. INDIA’S CYBER SECURITY POLICY 31. Some Popular social media platforms in
(i) Legal Framework India
(ii) National Cyber Security Policy
Policy-2013 32. How can social media act as threat to
(iii) Compliance
ance and Assurance internal security?
(iv) Cyber Security R&D Security 33. Social Media’s Impact on Young
(v) Incident – Early Warning and Response Generation
a. National Cyber Alert System 34. Positives of social media
WANACRY RANSOMWARE
the Windows operating system, jumping over a Russian social media site, similar to
What is the problem? week, two other cases (one in Solapur and
the other in Madhya
ya Pradesh, of a teen
The game has been blamed by the Russian
runaway and a student whose suicide bid
media as the reason why 80 to 130
was foiled by a teacher, respectively) have
children committed suicide between
been reportedly linked to the game.
November 2015 and April 2016.
ERA OF DIGITAL REVOLUTION
The challenges are dangerous and sinister
and include tasks like running across the
streets during heavy traffic, not speaking
to anyone at all for an entire day, carving
numbers or pictures of whales on the
body, waking up at ungodly hours,
watching disturbing
rbing videos, and it all ends
on the fiftieth day with the user being Since 2014-15,, there has been a renewed
encouraged to commit suicide as the final thrust upon the digital revolution &
digitalization
tion of every conceivable aspect
task in order to win the game.
of governance and public dealing of
government vis-à-vis
vis public at large.
It is believed that if the user gets cold feet
and wishes to back out, he or she is Programmes like Digtal India, e- e
Governance, e-Marketplace,
Marketplace, e-Outreach
e
threatened by the administr
administrator that they
etc. have been put in place which are
have all personal details of the user, and bringing paradigm shift in every aspect of
failure to complete the task would bring our existence.
harm to them or their loved ones.
But, the pertinent question that must be
India & Blue Whale Challenge Dangers: asked currently is that, “Are we prepared
On 29 July, 2017, India woke up to the enough to embrace these changes. If yes,
year-old
ld boy in Mumbai committed suicide challenges lie ahead?”
Until then, customers who use their cards REASON FOR SUCCESS OF SUCH
at ATMs of infected Banks would be prone ATTACKS BY PAKISTAN
to risk.
The reason Pakistani hackers have been able
to target these websites is because the cyber
CYBER WARFARE BY PAKISTAN
security maturity level of Indian government
MODULE
*ECONOMY
*AGRICULTURE
AGRICULTURE
*INTERNAL SECURITY
*DISASTER MANAGEMENT
*ECONOMIC SURVEY: VOL
VOL-1 & 2
*GS-III
III TEST SERIES
Classes by Author & Economist “JAYANT PARIKSHIT”-
a DELHI SCHOOL OF ECONOMICS alumnus!
A Honeywell Process Solutions study said cyber The National Cyber Coordination Centre was
threat from states and professionals supposed to be the country’s cyber security
sponsored by countries have increased in two- and e-surveillance agency but not much has
thirds of the 30 sectors it tracks. moved on ground.
Yahoo recently announced data of 500 million The National Technical Research Organisation
accounts was compromised in a state- (NTRO) has the infrastructure to review net
sponsored cyber attack. traffic but doesn’t possess operational
capabilities.
And given India’s digitisation push, the spectre
of hackers doing serious damage only CYBER SPACE
increases.
Definition:
Hacking and security are like shadows of Cyberspace is a domain characterized by
digitisation. As our society gets more digital, the use of electronics and the
hacking and security-related incidents are electromagnetic spectrum to store,
bound to rise.
modify, and exchange data via networked
In today’s day and age, there are no cyber systems and associated physical
Non-state actors, such as terrorist was created and placed under the
These tools are used extensively in other security agencies and private
The threats of the future will come from 8. Sensitive Government organisations
GS ECONOMY PT-CUM-MAIN
incidents have not been regarded as acts catastrophic effects:“Computer bugs bring
of warfare thus far because no definition down military e-mail systems; oil refineries
cyberwarfare will depend upon the derail; financial data are scrambled; the
“Attacking a nation’s critical infrastructure Some countries benefit from the technical
allows a hostile state to erode the victim support of its intelligence alliances, in
state’s internal operational viability” and preparing for cyberwar and conducting
consequently also the infrastructure that information operations. In NATO, the
supports military actions. United States has agreed with its alliance
www.coreias.org 57/11,2nd Floor, Old Rajinder Nagar, New Delhi-60
[email protected]
INTERNAL SECURITY MODULE by Jayant Parikshit 8373934419,8373934439
P a g e | 16
partners that an attack in cyberspace can infrastructure on the contrary has been
constitute an armed attack for the purpose created and is owned mostly by private
of invoking mutual response under Article business houses and organisations. Thus,
5 of the treaty. they belong to the first category. They also
are amongst the most targeted elements
EXAMPLES OF CYBERWARFARE
of cyberspace.
Most recently in the year 2010, Iran was 2. The second category is the cyberterrorists
attacked by the Stuxnet worm, thought to who pose a threat in cyberspace. They
specifically target its Natanz nuclear form part of radical organisations such as
enrichment facility. The worm is said to be the Islamic State of Iraq and Syria (ISIS) and
the most advanced piece of malware ever Al-Qaeda. These are the people who
discovered and significantly increases the indulge in the use of the Internet and
profile of cyber warfare. networks against critical national
infrastructures in order to hit or intimidate
These incidents clearly point towards the a society and its peoples causing casualties
gravity of how cyber warfare has become a or injuries for ideological, political or
major threat to every country in the world. religious reasons.
What Threat Does India Face from networking improving, India’s critical
Cyber Non-state Actors? information infrastructure will become
vulnerable to cyberattacks. Cyber non-
Lets us analyse the major threats that
state actors therefore would pose a
India faces from cyber non-state actors
constant threat to our critical information
sabotage. This is especially applicable for can undertake effectively through the
attacker is backed up with full financial and much more by internal subversion than
control system will be a difficult task. of subversive causes and ideas. Because of
While a nation state may undertake cyberspace, subversion has become more
sabotage through the cyber domain in war cause driven, it is seeing higher levels of
production in a way that can later be used would be the main motives behind
Both software and hardware can become many other ways to use them in spreading
This Act aims to provide the legal matter shall be in writing or in the
And the cyber laws have a major impact notwithstanding anything contained in
for e-businesses and the new economy in such law, such requirement shall be
Act, 2000 and what it offers. made available in an electronic form; and
accessible so as to be usable for a
The Information Technology Act, 2000 also subsequent reference.
aims to provide for the legal framework so
that legal sanctity is accorded to all It gives a scheme for Regulation of
electronic records and other activities Certifying Authorities. The Act envisages a
carried out by electronic means. The Act Controller of Certifying Authorities who
states that unless otherwise agreed, an shall perform the function of exercising
The Act talks of appointment of any The said Act also proposes to amend the
officers not below the rank of a Director to Indian Penal Code, 1860, the Indian
the Government of India or an equivalent Evidence Act, 1872, The Bankers' Books
officer of state government as an Evidence Act, 1891, The Reserve Bank of
Adjudicating Officer who shall adjudicate India Act, 1934 to make them in tune with
whether any person has made a the provisions of the IT Act.
contravention of any of the provisions of
the said Act or rules framed there under.
UPCOMING MODULES
COURSE DURATION WORKSHOP & CLASS
GS III MODULE FOR 40-45 DAYS AUGUST 2017
2018 MAIN (contact office for exact dates)
GS III CRASH COURSE 25-30 DAYS AUGUST 2017
FOR 2017 MAIN
GS ECONOMY (PT-CUM- 40 DAYS AUGUST 2017
MAIN)
GS ECONOMY FOR 20-25 DAYS AUGUST 2017
PRELIM
GS ECONOMY FOR 20 DAYS AUGUST 2017
MAIN
INTERNAL SECURITY 7-10 DAYS AUGUST 2017
MODULE
ECONOMIC SURVEY- 10 DAYS AUGUST 2017
VOL. I & II
ECONOMIC SURVEY 7 DAYS AUGUST 2017
VOL.II FOR MAIN 2017
AGRICULTURE FOR GS III 7-10 DAYS AUGUST 2017
ENVIRONMENT & 35-40 DAYS SEPTEMBER 2017
DISASTER
MANAGEMENT
ANSWER WRITING 15 DAYS SEPTEMBER 2017
WWWCOREIAS.ORG
[email protected]
In view of the growth in transactions and The Act now allows Government to issue
communications carried out through notification on the web thus heralding e-
electronic records, the Act seeks to governance.
empower government departments to The Act enables the companies to file any
accept filing, creating and retention of form, application or any other document
official documents in the digital format. with any office, authority, body or agency
The Act has also proposed a legal owned or controlled by the appropriate
framework for the authentication and Government in electronic form by means
origin of electronic records / of such electronic form as may be
communications through digital signature. prescribed by the appropriate
Government.
From the perspective of e-commerce in The IT Act also addresses the important
India, the IT Act 2000 and its provisions issues of security, which are so critical to
contain many positive aspects. Firstly, the the success of electronic transactions. The
implications of these provisions for the e- Act has given a legal definition to the
businesses would be that email would now concept of secure digital signatures that
be a valid and legal form of would be required to have been passed
www.coreias.org 57/11,2nd Floor, Old Rajinder Nagar, New Delhi-60
[email protected]
INTERNAL SECURITY MODULE by Jayant Parikshit 8373934419,8373934439
P a g e | 24
through a system of a security procedure, adoption of IT in all sectors of the
as stipulated by the Government at a later economy.
date. 2. To create an assurance framework for
Under the IT Act, 2000, it shall now be design of security policies and for
possible for corporates to have a statutory promotion and enabling actions for
remedy in case if anyone breaks into their compliance to global security standards
computer systems or network and causes and best practices by way of conformity
damages or copies data. The remedy assessment (product, process, technology
provided by the Act is in the form of & people).
monetary damages, not exceeding Rs. 1 3. To strengthen the Regulatory framework
crore. for ensuring a Secure Cyberspace
ecosystem.
NATIONAL CYBER SECURITY 4. To enhance and create National and
POLICY 2013 Sectoral level 24 x 7 mechanisms for
Vision: To build a secure and resilient obtaining strategic information regarding
been prepared. Training has been conducted Group of Experts as well as in the Council
Karnataka Judicial Officers on Cyber Crime (CSCAP) for enhancing cooperation in the
MoUs were signed with product and CURRENT CYBER CRIME SCENARIO
security vendors for vulnerability IN INDIA
remediation. Several activities were In India, there has been a surge of
undertaken under International approximately 350 per cent cybercrime
Cooperation. International level Cyber cases registered under the Information
security drills were held with Asia –Pacific Technology (IT) Act, 2000 from the year of
CERTs. 2011 to 2014, as per a recent ASSOCHAM-
PwC joint study.
Specific cyber security cooperation
agreements were signed with US, Japan
The Indian Computer Emergency Response
and South Korea. India participated in
Team (CERT-In) has also reported a surge
cyber security drills of US (Cyber Storm III).
in the number of incidents handled by it,
CERT-In experts helped in establishment of
crimes is very less in the country, the worldwide impacts an Indian, the report
transparent manner, to reflect the activities under the Digital India initiative is
complex challenge facing the country, being carefully monitored. All the existing
detail its thresholds, interests that would and ongoing e-Governance initiatives have
be protected at any cost and response been revamped to align them with the
governance to the public through project is a pan India network which will
This would include education, health care, ARPAN 3.0, an automation software for
Army personnel, has been launched by
communications to move away from services (Air Force and Navy) etc to
has to be sent by internet needs to be Digital India in the Army, the biggest
As brought out above, it is highly feasible something which will remain paramount to
to implement the Digital India program the Army and it is here that some
within the Army. To play a lead and a disconnect in its implementation may
Our materials & books have been complied by subject specific experts with utmost care and precision
regarding the content quality. Nevertheless, in case of any query/ comment/suggestion/clarification,
please feel free to write to us at:
[email protected] or call uss at 8373934419/ 8373934439
To advertise with us, plea
please
se call 8373934419 or mail us: [email protected]
coreias.india