SlideShare uma empresa Scribd logo
1 de 38
Baixar para ler offline
NCSP
National Cyber Security Policy 2013
Gopal Ram Choudhary
Trainee at Cyber Octet Pvt. Ltd.
Ahmedabad, Gujrat
Cyber Security
 National Cyber Security Policy is a proposed law by
Department of Electronics and Information Technology(DeitY),
Ministry of Communication and Information Technology,
Government of India which is due to be passed by parliament,
aimed at protecting the public and private infrastructure from
cyber attacks.
 The policy also intends to safeguard "information, such as
personal information (of web users), financial and banking
information and sovereign data".
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Tuesday, July 15, 2014
Cyber Security
 Computer security (also known as cyber security or IT security)
is information security as applied to computing devices such
as computers and smartphones, as well as computer
networks such as private and public networks, including the
Internet.
 The field covers all the processes and mechanisms by which
computer-based equipment, information and services are
protected from unintended or unauthorized access, change
or destruction, and is of growing importance in line with the
increasing reliance on computer systems of most societies
worldwide
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Tuesday, July 15, 2014
Cyber Security
 This was particularly relevant in the wake of US National
Security Agency (NSA) leaks that suggested the US
government agencies are spying on Indian users, who have
no legal or technical safeguards against it. Ministry of
Communications and Information Technology (India) defines
Cyberspace is a complex environment consisting of
interactions between people, software services supported by
worldwide distribution of information and communication
technology.
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Tuesday, July 15, 2014
National Cyber Security
Policy 2013
 “The legalization of digital signature would bring a new
revolution and adoption of digital signature was still at a
nascent stage in India. It will also have a significant impact on
green policies as we are moving towards paperless
documentation or e-documentation,” Ms. Ghosh explained.
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Tuesday, July 15, 2014
Vision
 To build a secure and resilient cyberspace for citizens,
businesses and Government
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Mission
 To protect information and information infrastructure in
cyberspace, build capabilities to prevent and respond to
cyber threats, reduce vulnerabilities and minimize damage
from cyber incidents through a combination of institutional
structures, people, processes, technology and co-operation.
Objective
 To create a secure cyber ecosystem in the country, generate
adequate trust and confidence in IT system and transactions
in cyberspace and thereby enhance adoption of IT in all
sectors of the economy.
 To create an assurance framework for design of security
policies and promotion and enabling actions for compliance
to global security standards and best practices by way of
conformity assessment (Product, process, technology &
people).
 To strengthen the Regulatory Framework for ensuring a SECURE
CYBERSPACE ECOSYSTEM.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To enhance and create National and Sectorial level 24X7
mechanism for obtaining strategic information regarding
threats to ICT infrastructure, creating scenarios for response,
resolution and crisis management through effective
predictive, preventive, protective response and recovery
actions.
 To improve visibility of integrity of ICT products and services by
establishing infrastructure for testing & validation of security of
such product.
 To create workforce for 5,00,000 professionals skilled in next 5
years through capacity building skill development and
training.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To provide fiscal benefit to businesses for adoption of standard
security practices and processes.
 To enable Protection of information while in process, handling,
storage & transit so as to safeguard privacy of citizen's data
and reducing economic losses due to cyber crime or data
theft.
 To enable effective prevention, investigation and prosecution
of cybercrime and enhancement of low enforcement
capabilities through appropriate legislative intervention.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Cyber Security Issues
 Security Policy Formulation and Implementation
 Governance Risk and Compliance
 Information Security Compliance, Regulations and Legislation
 Cloud Computing and Security
 Government Cyber Security Strategy
 Cyber Security Trends
 National Approaches and Policies in Cyber Security
 Cyber conflicts: Models and Deterrence Mechanisms
 Deep Understanding of and Practical Skills in Software Security
 Infusing Information Security into the Software-Development
Life Cycle
 Web Application Security Solutions and Best Practices
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 Mobile Applications and Security
 Security Threats and Vulnerabilities
 The Nature of Web Application Hacking and New Security
Trends
 Computer Network Security
 Mobile Smart Phone and Tablet Security
 Secure Software Development
 High Performance Cryptography
 Visualizing Large Scale Security Data
 Privacy Preserving Big Data Collection/Analytics
 Web/Internet Security
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Strategies
 Creating a secure Ecosystem.
 Creating an assurance framework.
 Encouraging Open Standards.
 Strengthening The regulatory Framework.
 Creating mechanism for Security Threats Early Warning,
Vulnerability management and response to security threat.
 Securing E-Governance services.
 Protection and resilience of Critical Information Infrastructure.
 Promotion of Research and Development in cyber security.
 Reducing supply chain risks
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 Human Resource Development (fostering
education and training programs both in formal
and informal sectors to support Nation's cyber
security needs and build capacity.
 Creating cyber security awareness.
 Developing effective Public Private Partnership.
 To develop bilateral and multilateral relationship in
the area of cyber security with other country.
(Information sharing and cooperation)
 Prioritized approach for implementation.
 Operationalization of Policy.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Creating a Secure Cyber
Ecosystem
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To designate a National nodal agency to co-ordinate all
matters related to cyber security in the country, with clearly
defined roles and responsibilities.
 To encourage all organizations, private and public to
designate a member of senior management, as Chief
Information Security Officer (CISO), responsible for cyber
security efforts and initiatives.
 To encourage all organizations to develop information security
policies duly integrated with their business plans and
implement such policies as per international best practices.
Such policies should include establishing standards and
mechanisms for secure information flow (while in process,
handling, storage and transit), crisis management plan,
proactive security posture assessment and forensically
enabled information infrastructure.
 To ensure that all organizations eamark a specific budget for
implementing cyber security initiatives and for meeting
emergency response arising out of cyber incidents.
 To provide fiscal schemes and incentives to encourage
entities to install, strengthen and upgrade information
infrastructure with respect to cyber security.
 To prevent occurrence and recurrence of cyber incidents by
way of incentives for technology development, cyber security
compliance and proactive actions.
 To establish a mechanism for sharing information and for
identifying and responding to cyber security incidents and for
co-operation in restoration efforts.
 To encourage entities to adopt gridlines for procurement of
trustworthy ICT products and provide for procurement of
indigenously manufactured ICT that have security
implications.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Creating an Assurance
Framework
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To promote adoption of global practices in information
security and compliance and thereby enhance cyber
security posture.
 To create infrastructure for conformity assessment and
certification of compliance and thereby enhance cyber
security posture.
 To enable implementation of global security best
practices in formal risk assessment and risk management
processes, business continuity management and cyber
crisis management plan by all entities within
Government and in Critical sectors, to reduce the risk of
disruption and improve the security posture.
 To identify and classify information infrastructure facilities
and assets at entity level with respect to risk perception
for undertaking commensurate security protection
measures.
 To encourage secure application / software
development processes based on global best practices.
 To create conformity assessment framework for periodic
verification of compliance to best practices, standards
and guidelines on cyber security.
 To encourage all entities to periodically test and
evaluate the adequacy and effectiveness of technical
and operational security control measures implemented
in IT systems and in networks.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Encouraging Open
Standards
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To encourage use of open standards to
facilitate interoperability and data exchange
among different products or services.
 To promate a consortium of Goverment and
private sector to enhance the availability of tested
and certified IT products based on open standards.
Strengthening the
Regulatory Framework
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To develop a dynamic legal framework and its periodic
review to address the cyber security challenges arising
out of technological developments in cyber space (such
as cloud computing, mobile computing, encrypted
services and social media) and its harmonization with
international frameworks including those related to
Internet governance.
 To mandate periodic audit and evaluation of the
adequacy and effectiveness of security of information
infrastructure as may be appropriate, with respect to
regulatory framework.
 To enable, educate and facilitate awareness of the
regulatory framework.
Creating mechanism for
Security Threats Early
Warning, Vulnerability
Management and
Response to Security
Threats
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To create National Level systems, processes, structures and
mechanisms to generate necessary situational scenario of
existing and potential cyber security threats and enable timely
information sharing for proactive, preventive and protective
actions by individual entities.
 To operate a 24x7 National Level Computer Emergency
Response Team (CERT-In) to function as a Nodal Agency for
co-ordination of all efforts for cyber security emergency
response and crisis management. CERT-In will function as an
umbrella organization in enabling creation and
operationalization of sectoral CERTs as well as facilitating
communication and co-ordination actions in dealing with
cyber crisis situations.
 To operationalize 24x7 sectoral CERTs for all co-ordination and
communication actions within the respective sectors for
effective incidence response and resolution and cyber crisis
management.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To implement Cyber Crisis Management Plan for dealing with
cyber related incidents impacting critical national processes
or endangering public safety and security of the Nation, by
way of well co-ordinated, multi disciplinary approach at the
National, Sectoral as well as entity Levels.
 To conduct and facilitate regular cyber security drills and
exercises at National, sectoral and entity levels to enable
assessment of the security posture and level of emergency
preparedness in resisting and dealing with cyber security
incidents.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Securing E-Governance
Services
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To mandate implementation of global security best practices,
business continuity management and cyber crisis
management plan for all E-Governance initiatives in the
country, to reduce the risk of disruption and improve the
security posture.
 To encourage wider usages of Public Key Infrastructure (PKI)
within Government for trusted communication and
transactions.
 To engage information security professionals / organizations to
assist e-Governance initiatives and ensure conformance to
security best practices.
Protection and resilience
of Critical Information
Infrastructure
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To develop a plan for protection of Critical Information
Infrastructure and its integration with business plan at the entity
level and implement such plan. The plans shall include
establishing mechanisms for secure information flow (While in
process, handling, storage and transit), guidelines and
standards, crisis management plan, proactive security posture
assessment and forensically enabled information
infrastructure.
 To operate a 24x7 National Critical Information Infrastructure
Protection Center (NCIIPC) to function as the nodal agency
for critical information infrastructure protection in the country.
 To facilitate identification, prioritization, assessment, remediation
and protection of critical infrastructure and key resources based
on the plan for protection of critical information infrastructure.
 To mandate implementation of global security best practices,
business continuity management and cyber crisis management
plan by all critical sector entities, to reduce the risk of disruption
and improve the security posture.
 To encourage and mandate as appropriate, the use of validated
and certified IT products.
 To mandate security audit of critical information infrastructure on
a periodic basis.
 To mandate certification for all security roles right from CISO /
CSO to those involved in operation of critical information
infrastructure.
 To mandate secure application / software development process
(from design through retirement) based on global best practices.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Promotion of Research
and Development in cyber
security
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To undertake Research and Development programs for
addressing all aspects of development aimed at short term,
medium term and long term goals. The research and
Development programs shall address all aspects including
development of trustworthy systems, their testing, deployment
and maintenance throughout the life cycle and include R&D
on cutting edge security technologies.
 To encourage Research and Development to produce cost-
effective, tailor-made indigenous security solutions meeting a
wider range of cyber security challenges and target for
exploits markets.
 To facilitate transition, diffusion and commercialization of the
outputs of Research & Development into commercial
products and services for use in public and private sectors.
 To set up Centers of Excellence in areas of strategic
importance for the point of security of space.
 To collaborate in joint Research and Development projects
with industry and academia in frontline technologies and
solution oriented research.
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Reducing Supply Chain
Risk
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To create and maintain testing infrastructure and facilities for IT
security product evaluation and compliance verification as
per global standards and practices.
 To build trusted relationships with product / system vendors
and services providers for improving end-to-end supply chain
security visibility.
 To create awareness of the threats, vulnerabilities and
consequences of breach of security among entities for
managing supply chain risks related to IT (products, system or
services) procurement.
Human Resource
Development
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To foster education and training programs both in formal and
informal sectors to support the Nation's Cyber security needs
and build capacity.
 To establish cyber security training infrastructure across the
country by way of public private partnership arrangements.
 To establish cyber security concept labs for awareness and skill
development in key areas.
 To establish institutional mechanisms for capacity building for
Law Enforcement Agencies.
Creating Cyber Security
Awareness
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To promote and launch a comprehensive national awareness
program on security of cyber space.
 To sustain security literacy awareness and publicity campaign
through electronic media to help citizens to be aware of the
challenges of cyber security.
 To conduct, support and enable cyber security workshops /
seminars and certifications.
Developing Effective
Public Private
Partnerships
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To facilitate collaboration and co-operation among
stakeholder entities including private sector, in the area of
cyber security in general and protection of critical information
infrastructure in particular for actions related to cyber threats,
vulnerabilities, breaches, potential protective measures and
adoption of best practices.
 To create models for collaborations and engagement with all
relevant stack holders.
 To create a think tank for cyber security policy inputs,
discussion and deliberations.
Information Sharing and
Co-operation
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To develop bilateral and multi-lateral relationships in the area
of cyber security with other countries.
 To enhance National and global co-operation among security
agencies, CERTs, Defense agencies and forces, Law
Enforcement Agencies and the judicial system.
 To create mechanism for dialogue related to technical and
operational aspects with industry in order to facilitate efforts in
recovery and resilience of system including critical information
infrastructure.
Prioritized Approach for
Implementation
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 To adopt a prioritized approach to implement the policy
so as to address the most critical areas in the first instance.
Operationalization of the
Policy
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
This policy shall be operationalized by way of detailed guidelines
and plans of action at various levels such as national, sectoral,
state, ministry, department and enterprise, as may be
appropriate, to address the challenging requirements of security
of the cyberspace.
References
 "Amid spying saga, India unveils cyber security policy". Times of
India. INDIA. 3 July 2013. Retrieved 24 September 2013.
 "National Cyber Security Policy 2013: An Assessment". Institute
for Defense Studies and Analyses. August 26, 2013. Retrieved
2013-09-24.
 "For a unified cyber and telecom security policy". The
Economic Times. 24 Sep 2013. Retrieved 2013-09-24.
 http://en.wikipedia.org/wiki/National_Cyber_Security_Policy_2
013
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
 "National Cyber Security Policy 2013". Department of
Information Technology, Ministry of Communications and
Information Technology.
 http://aict.info/2013/?page=callfor#sthash.CrcGO9Hd.dpbs
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad
Tuesday, July 15, 2014
Gopal Ram Choudhary Trainee at
Cyber Octet Pvt. Ltd. Ahmedabad

Mais conteúdo relacionado

Mais procurados

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 

Mais procurados (20)

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Information security
Information securityInformation security
Information security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Destaque

INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policyNextBigWhat
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policysuhlingse
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document LeAnn Rhodes
 
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)Pankaj Bhambhani
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policybarbeejl
 
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09Dr D.C. Misra
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Teamisc2-hellenic
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Role of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanRole of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanShravan Bhumkar
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush AgrawalAnkush Agrawal
 
Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...
Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...
Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...Maurice Dawson
 

Destaque (20)

INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Cyber security
Cyber securityCyber security
Cyber security
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Group Q
Group QGroup Q
Group Q
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)E mail security using Certified Electronic Mail (CEM)
E mail security using Certified Electronic Mail (CEM)
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
 
it act
it act it act
it act
 
Netiquette
NetiquetteNetiquette
Netiquette
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Role of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanRole of E-Governance In Bharat Nirman
Role of E-Governance In Bharat Nirman
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...
Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...
Cyber Security Research: Exploring Opportunities with Open Source Tools, Indu...
 

Semelhante a National Cyber Security Policy 2013 (NCSP)

Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability reportSayali Sawant
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMicrosoft India
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15DSCI_Connect
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...Shawn Tuma
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaperdigitalinasia
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 

Semelhante a National Cyber Security Policy 2013 (NCSP) (20)

Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15
 
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Mana...
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 

Último

John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 

Último (20)

John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 

National Cyber Security Policy 2013 (NCSP)

  • 1. NCSP National Cyber Security Policy 2013 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad, Gujrat
  • 2. Cyber Security  National Cyber Security Policy is a proposed law by Department of Electronics and Information Technology(DeitY), Ministry of Communication and Information Technology, Government of India which is due to be passed by parliament, aimed at protecting the public and private infrastructure from cyber attacks.  The policy also intends to safeguard "information, such as personal information (of web users), financial and banking information and sovereign data". Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad Tuesday, July 15, 2014
  • 3. Cyber Security  Computer security (also known as cyber security or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet.  The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance in line with the increasing reliance on computer systems of most societies worldwide Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad Tuesday, July 15, 2014
  • 4. Cyber Security  This was particularly relevant in the wake of US National Security Agency (NSA) leaks that suggested the US government agencies are spying on Indian users, who have no legal or technical safeguards against it. Ministry of Communications and Information Technology (India) defines Cyberspace is a complex environment consisting of interactions between people, software services supported by worldwide distribution of information and communication technology. Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad Tuesday, July 15, 2014
  • 5. Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad Tuesday, July 15, 2014 National Cyber Security Policy 2013
  • 6.  “The legalization of digital signature would bring a new revolution and adoption of digital signature was still at a nascent stage in India. It will also have a significant impact on green policies as we are moving towards paperless documentation or e-documentation,” Ms. Ghosh explained. Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad Tuesday, July 15, 2014
  • 7. Vision  To build a secure and resilient cyberspace for citizens, businesses and Government Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad Mission  To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology and co-operation.
  • 8. Objective  To create a secure cyber ecosystem in the country, generate adequate trust and confidence in IT system and transactions in cyberspace and thereby enhance adoption of IT in all sectors of the economy.  To create an assurance framework for design of security policies and promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment (Product, process, technology & people).  To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE ECOSYSTEM. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 9.  To enhance and create National and Sectorial level 24X7 mechanism for obtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution and crisis management through effective predictive, preventive, protective response and recovery actions.  To improve visibility of integrity of ICT products and services by establishing infrastructure for testing & validation of security of such product.  To create workforce for 5,00,000 professionals skilled in next 5 years through capacity building skill development and training. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 10.  To provide fiscal benefit to businesses for adoption of standard security practices and processes.  To enable Protection of information while in process, handling, storage & transit so as to safeguard privacy of citizen's data and reducing economic losses due to cyber crime or data theft.  To enable effective prevention, investigation and prosecution of cybercrime and enhancement of low enforcement capabilities through appropriate legislative intervention. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 11. Cyber Security Issues  Security Policy Formulation and Implementation  Governance Risk and Compliance  Information Security Compliance, Regulations and Legislation  Cloud Computing and Security  Government Cyber Security Strategy  Cyber Security Trends  National Approaches and Policies in Cyber Security  Cyber conflicts: Models and Deterrence Mechanisms  Deep Understanding of and Practical Skills in Software Security  Infusing Information Security into the Software-Development Life Cycle  Web Application Security Solutions and Best Practices Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 12.  Mobile Applications and Security  Security Threats and Vulnerabilities  The Nature of Web Application Hacking and New Security Trends  Computer Network Security  Mobile Smart Phone and Tablet Security  Secure Software Development  High Performance Cryptography  Visualizing Large Scale Security Data  Privacy Preserving Big Data Collection/Analytics  Web/Internet Security Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 13. Strategies  Creating a secure Ecosystem.  Creating an assurance framework.  Encouraging Open Standards.  Strengthening The regulatory Framework.  Creating mechanism for Security Threats Early Warning, Vulnerability management and response to security threat.  Securing E-Governance services.  Protection and resilience of Critical Information Infrastructure.  Promotion of Research and Development in cyber security.  Reducing supply chain risks Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 14.  Human Resource Development (fostering education and training programs both in formal and informal sectors to support Nation's cyber security needs and build capacity.  Creating cyber security awareness.  Developing effective Public Private Partnership.  To develop bilateral and multilateral relationship in the area of cyber security with other country. (Information sharing and cooperation)  Prioritized approach for implementation.  Operationalization of Policy. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 15. Creating a Secure Cyber Ecosystem Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To designate a National nodal agency to co-ordinate all matters related to cyber security in the country, with clearly defined roles and responsibilities.  To encourage all organizations, private and public to designate a member of senior management, as Chief Information Security Officer (CISO), responsible for cyber security efforts and initiatives.  To encourage all organizations to develop information security policies duly integrated with their business plans and implement such policies as per international best practices. Such policies should include establishing standards and mechanisms for secure information flow (while in process, handling, storage and transit), crisis management plan, proactive security posture assessment and forensically enabled information infrastructure.
  • 16.  To ensure that all organizations eamark a specific budget for implementing cyber security initiatives and for meeting emergency response arising out of cyber incidents.  To provide fiscal schemes and incentives to encourage entities to install, strengthen and upgrade information infrastructure with respect to cyber security.  To prevent occurrence and recurrence of cyber incidents by way of incentives for technology development, cyber security compliance and proactive actions.  To establish a mechanism for sharing information and for identifying and responding to cyber security incidents and for co-operation in restoration efforts.  To encourage entities to adopt gridlines for procurement of trustworthy ICT products and provide for procurement of indigenously manufactured ICT that have security implications. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 17. Creating an Assurance Framework Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To promote adoption of global practices in information security and compliance and thereby enhance cyber security posture.  To create infrastructure for conformity assessment and certification of compliance and thereby enhance cyber security posture.  To enable implementation of global security best practices in formal risk assessment and risk management processes, business continuity management and cyber crisis management plan by all entities within Government and in Critical sectors, to reduce the risk of disruption and improve the security posture.
  • 18.  To identify and classify information infrastructure facilities and assets at entity level with respect to risk perception for undertaking commensurate security protection measures.  To encourage secure application / software development processes based on global best practices.  To create conformity assessment framework for periodic verification of compliance to best practices, standards and guidelines on cyber security.  To encourage all entities to periodically test and evaluate the adequacy and effectiveness of technical and operational security control measures implemented in IT systems and in networks. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 19. Encouraging Open Standards Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To encourage use of open standards to facilitate interoperability and data exchange among different products or services.  To promate a consortium of Goverment and private sector to enhance the availability of tested and certified IT products based on open standards.
  • 20. Strengthening the Regulatory Framework Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To develop a dynamic legal framework and its periodic review to address the cyber security challenges arising out of technological developments in cyber space (such as cloud computing, mobile computing, encrypted services and social media) and its harmonization with international frameworks including those related to Internet governance.  To mandate periodic audit and evaluation of the adequacy and effectiveness of security of information infrastructure as may be appropriate, with respect to regulatory framework.  To enable, educate and facilitate awareness of the regulatory framework.
  • 21. Creating mechanism for Security Threats Early Warning, Vulnerability Management and Response to Security Threats Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 22.  To create National Level systems, processes, structures and mechanisms to generate necessary situational scenario of existing and potential cyber security threats and enable timely information sharing for proactive, preventive and protective actions by individual entities.  To operate a 24x7 National Level Computer Emergency Response Team (CERT-In) to function as a Nodal Agency for co-ordination of all efforts for cyber security emergency response and crisis management. CERT-In will function as an umbrella organization in enabling creation and operationalization of sectoral CERTs as well as facilitating communication and co-ordination actions in dealing with cyber crisis situations.  To operationalize 24x7 sectoral CERTs for all co-ordination and communication actions within the respective sectors for effective incidence response and resolution and cyber crisis management. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 23.  To implement Cyber Crisis Management Plan for dealing with cyber related incidents impacting critical national processes or endangering public safety and security of the Nation, by way of well co-ordinated, multi disciplinary approach at the National, Sectoral as well as entity Levels.  To conduct and facilitate regular cyber security drills and exercises at National, sectoral and entity levels to enable assessment of the security posture and level of emergency preparedness in resisting and dealing with cyber security incidents. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 24. Securing E-Governance Services Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To mandate implementation of global security best practices, business continuity management and cyber crisis management plan for all E-Governance initiatives in the country, to reduce the risk of disruption and improve the security posture.  To encourage wider usages of Public Key Infrastructure (PKI) within Government for trusted communication and transactions.  To engage information security professionals / organizations to assist e-Governance initiatives and ensure conformance to security best practices.
  • 25. Protection and resilience of Critical Information Infrastructure Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To develop a plan for protection of Critical Information Infrastructure and its integration with business plan at the entity level and implement such plan. The plans shall include establishing mechanisms for secure information flow (While in process, handling, storage and transit), guidelines and standards, crisis management plan, proactive security posture assessment and forensically enabled information infrastructure.  To operate a 24x7 National Critical Information Infrastructure Protection Center (NCIIPC) to function as the nodal agency for critical information infrastructure protection in the country.
  • 26.  To facilitate identification, prioritization, assessment, remediation and protection of critical infrastructure and key resources based on the plan for protection of critical information infrastructure.  To mandate implementation of global security best practices, business continuity management and cyber crisis management plan by all critical sector entities, to reduce the risk of disruption and improve the security posture.  To encourage and mandate as appropriate, the use of validated and certified IT products.  To mandate security audit of critical information infrastructure on a periodic basis.  To mandate certification for all security roles right from CISO / CSO to those involved in operation of critical information infrastructure.  To mandate secure application / software development process (from design through retirement) based on global best practices. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 27. Promotion of Research and Development in cyber security Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To undertake Research and Development programs for addressing all aspects of development aimed at short term, medium term and long term goals. The research and Development programs shall address all aspects including development of trustworthy systems, their testing, deployment and maintenance throughout the life cycle and include R&D on cutting edge security technologies.  To encourage Research and Development to produce cost- effective, tailor-made indigenous security solutions meeting a wider range of cyber security challenges and target for exploits markets.
  • 28.  To facilitate transition, diffusion and commercialization of the outputs of Research & Development into commercial products and services for use in public and private sectors.  To set up Centers of Excellence in areas of strategic importance for the point of security of space.  To collaborate in joint Research and Development projects with industry and academia in frontline technologies and solution oriented research. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 29. Reducing Supply Chain Risk Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To create and maintain testing infrastructure and facilities for IT security product evaluation and compliance verification as per global standards and practices.  To build trusted relationships with product / system vendors and services providers for improving end-to-end supply chain security visibility.  To create awareness of the threats, vulnerabilities and consequences of breach of security among entities for managing supply chain risks related to IT (products, system or services) procurement.
  • 30. Human Resource Development Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To foster education and training programs both in formal and informal sectors to support the Nation's Cyber security needs and build capacity.  To establish cyber security training infrastructure across the country by way of public private partnership arrangements.  To establish cyber security concept labs for awareness and skill development in key areas.  To establish institutional mechanisms for capacity building for Law Enforcement Agencies.
  • 31. Creating Cyber Security Awareness Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To promote and launch a comprehensive national awareness program on security of cyber space.  To sustain security literacy awareness and publicity campaign through electronic media to help citizens to be aware of the challenges of cyber security.  To conduct, support and enable cyber security workshops / seminars and certifications.
  • 32. Developing Effective Public Private Partnerships Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To facilitate collaboration and co-operation among stakeholder entities including private sector, in the area of cyber security in general and protection of critical information infrastructure in particular for actions related to cyber threats, vulnerabilities, breaches, potential protective measures and adoption of best practices.  To create models for collaborations and engagement with all relevant stack holders.  To create a think tank for cyber security policy inputs, discussion and deliberations.
  • 33. Information Sharing and Co-operation Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To develop bilateral and multi-lateral relationships in the area of cyber security with other countries.  To enhance National and global co-operation among security agencies, CERTs, Defense agencies and forces, Law Enforcement Agencies and the judicial system.  To create mechanism for dialogue related to technical and operational aspects with industry in order to facilitate efforts in recovery and resilience of system including critical information infrastructure.
  • 34. Prioritized Approach for Implementation Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad  To adopt a prioritized approach to implement the policy so as to address the most critical areas in the first instance.
  • 35. Operationalization of the Policy Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad This policy shall be operationalized by way of detailed guidelines and plans of action at various levels such as national, sectoral, state, ministry, department and enterprise, as may be appropriate, to address the challenging requirements of security of the cyberspace.
  • 36. References  "Amid spying saga, India unveils cyber security policy". Times of India. INDIA. 3 July 2013. Retrieved 24 September 2013.  "National Cyber Security Policy 2013: An Assessment". Institute for Defense Studies and Analyses. August 26, 2013. Retrieved 2013-09-24.  "For a unified cyber and telecom security policy". The Economic Times. 24 Sep 2013. Retrieved 2013-09-24.  http://en.wikipedia.org/wiki/National_Cyber_Security_Policy_2 013 Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 37.  "National Cyber Security Policy 2013". Department of Information Technology, Ministry of Communications and Information Technology.  http://aict.info/2013/?page=callfor#sthash.CrcGO9Hd.dpbs Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad
  • 38. Tuesday, July 15, 2014 Gopal Ram Choudhary Trainee at Cyber Octet Pvt. Ltd. Ahmedabad