SlideShare uma empresa Scribd logo
1 de 27
NATIONAL CYBER
SECURITY POLICY - 2013
SANTOSH KAHDASRE
PREAMBLE
SANTOSH KHADSARE 2
Complex environment of integrations between people,
software and services
Common pool used by citizens, businesses , critical
information infrastructure ,military and groups
Vulnerable to a wide range of incidents, whether intentional
or accidental, manmade or natural, and the info can be
exploited by both nation states and non state actors
SANTOSH KHADSARE 3
CYBERSPACE IS…..
Caters to the whole spectrum of ICT users and
providers and is an evolving process
IT SERVES AS AN UMBRELLA FRAMEWORK FOR
DEFINING AND GUIDING THE ACTIONS RELATED
TO SECURITY OF CYBER SPACE
It also enables the individual sectors and org in
designing appropriate cyber security polices to suit
their needs
SANTOSH KHADSARE 4
CYBER SECURITY POLICY
TO BUILD A SECURE AND RESILIENT
CYBERSPACE FOR CITIZENS,
BUSINESSES AND GOVERNMENT
SANTOSH KHADSARE 5
VISION
SANTOSH KHADSARE 6
MISSION
SANTOSH KHADSARE 7
OBJECTIVES
Create a secure
cyber ecosystem
Create an assurance
framework
Strengthen the
regulatory
framework
Enhance and create
national and
sectorial level 24x7
mechanisms for
info gathering
Enhance protection
and resilience of CII
by operating 24x7
NCIIPC
Develop indigenous
security
technologies
SANTOSH KHADSARE 8
OBJECTIVES
Est infrastructure
for testing &
validation of
security of such
products
Create workforce of
500,000
professionals in
next five years
Fiscal benefits to
businesses for
adoption of std
security practices
and processes
Enable effective
prevention ,
investigation and
prosecution of
cyber crime
Create culture of
cyber security
Develop public pvt
partnerships and
enhance global
cooperation
Designate a national nodal agency to coordinate matters(cyber
security) with clearly defined roles and responsibilities
designate CISO in every org who will be responsible for cyber
security efforts and initiatives
Org to devp info security policies and implement them as per
international best practices
Org to earmark a specific budget for cyber security
SANTOSH KHADSARE 9
STRATEGIES : CREATING A SECURE
CYBER ECO SYSTEM
Provide fiscal schemes and initiatives to encourage entities to
install and upgrade info infrastructure fro cyber security
Prevent occurrence and recurrence of cyber incidents
(proactive actions)
Est mechanism for sharing info
Procurement of trustworthy indigenously manufactured ICT
products
SANTOSH KHADSARE 10
STRATEGIES : CREATING A SECURE
CYBER ECO SYSTEM
Promote adoption of global best practices in info security and
compliance.
Create infrastructure for conformity assessment and
certification of compliance to cyber security best practices, std
and guidelines (e.g ISO 27001 ISMS certification).
Enable implementation of global security best practices for risk
management.
Identify and classify info infrastructure facilities and assets.
SANTOSH KHADSARE 11
STRATEGIES : CREATING A
ASSURANCE FRAMEWORK
Encourage secure appln/software devp processes.
Create conformity assessment framework for periodic
verification of compliance to best practices, std and guidelines
on cyber security.
Encourage all entities tom periodically test and evaluate the
adequacy and effectiveness of tech and op security measures
implemented in IT sys and networks .
SANTOSH KHADSARE 12
STRATEGIES : CREATING A
ASSURANCE FRAMEWORK
Encourage use of open standards to facilitate interoperability
and data exchange among different products and services.
Promote a consortium of Govt and private sector to enhance
availability of tested and certified IT products on open
standards.
SANTOSH KHADSARE 13
STRATEGIES : ENCOURAGING OPEN
STANDARDS
Devp dynamic and legal framework and its periodic review to
address Cyber security challenges.
To mandate periodic audit and evaluation.
To enable, educate and facilitate awareness of the regulatory
framework.
SANTOSH KHADSARE 14
STRATEGIES : STRENGTHENING
THE REGULATORY FRAMEWORK
To create National lvl sys , processes, structures and
mechanisms to generate situational scenario of
existing and potential threats and enable timely info
sharing for proactive, preventive and protective
actions.
To operate 24x7 CERT-in to function as a Nodal
Agency for coordination of all efforts for cyber
security emergency response and crisis mgt
(Umbrella org).
SANTOSH KHADSARE 15
STRATEGIES : CREATING MECHANISMS FOR EARLY
WARNING , VULNERABILITY MGT & RESPONSE
Operationalise 24x7 sectorial CERTs.
Implement Crisis Mgt plan for dealing with incidents impacting
critical national processes or endangering public safety and
security of the nation.
To conduct and facilitate regular cyber security drills and
exercises at National, sectorial and entity levels.
SANTOSH KHADSARE 16
STRATEGIES : CREATING MECHANISMS FOR EARLY
WARNING , VULNERABILITY MGT & RESPONSE
To mandate implementation of global security best practices,
business continuity mgt and cyber crisis mgt plan for all e-
Governance initiatives .
To encourage wider usage of PKI within Govt. for trusted
communication and transactions.
To engage info security professionals / org to assist .
SANTOSH KHADSARE 17
STRATEGIES : SECURING E-
GOVERNANCE SERVICES
To devp plan for protection of CII.
To operate 24x7 National Critical Information Infrastructure
Protection Centre(NCIIPC) to function as Nodal agency for CII
protection.
To facilitate identification, prioritisation, assessment,
remediation and protection of CII and key recourses.
To encourage and mandate as appropriate, the use of validated
and certified IT products.
SANTOSH KHADSARE 18
STRATEGIES : PROTECTION AND RESILIENCE
OF CRITICAL INFO INFRASTRUCTURE
To mandate security audit of CII on periodic basis.
To mandate certification of all security roles right from CISO
/CSO to those involved in operation of CII.
To mandate secure appl /software devp process.
SANTOSH KHADSARE 19
STRATEGIES : PROTECTION AND RESILIENCE
OF CRITICAL INFO INFRASTRUCTURE
To undertake R&D programs aimed at short term, medium term
and long term goals.
To encourage R&D to produce cost effective, tailor-made and
indigenous security solutions .
To facilitate transition, diffusion. And commercialisation of
outputs of R&D into commercial products and services for use
in public and private sectors.
SANTOSH KHADSARE 20
STRATEGIES : PROMOTION OF R&D
IN CYBER SECURITY
To set up Centre of Excellence in areas of strategic importance
for the point of security of cyber space .
To collaborate in joint R&D projects with industry and academia
in frontline technologies and solution oriented research.
SANTOSH KHADSARE 21
STRATEGIES : PROMOTION OF R&D
IN CYBER SECURITY
To create and maintain testing infrastructure and facilities of IT
security product evaluation and compliance verification.
To build trust relationships with product / system vendors and
service providers for improving end-to-end supply chain
security visibility.
To create awareness of the threats, vulnerabilities and
consequences of breach of security related to IT procurement.
SANTOSH KHADSARE 22
STRATEGIES : REDUCIN SUPPLY
CHAIN RISKS
To foster education and trg programs both in formal and
informal sectors to support the nation’s cyber security needs
and build capacity.
To est cyber security trg infrastructure across the country by
way of public private partnership arrangements.
To est cyber security concept labs for awareness and skill devp
in key areas.
To est institutional mechanisms for capacity building for Law
Enforcement Agencies.
SANTOSH KHADSARE 23
STRATEGIES : HRD
To promote and launch a comprehensive national awareness
program on security of cyber space.
To sustain security literacy awareness and publicity campaign
through electronic media.
To conduct, support and enable cyber security workshops /
seminars and certifications.
SANTOSH KHADSARE 24
STRATEGIES : CREATING CYBER
SECURITY AWARENESS
To facilitate collaboration and cooperation among stakeholder
entities.
To create models of collaborations and engagement with all
relevant stakeholders.
To create a think tank for cyber security inputs, discussion and
deliberations.
SANTOSH KHADSARE 25
STRATEGIES : DEVP EFFECTIVE
PUBLIC PVT PARTNERSHIPS
INFO SHARING AND COOPERATION (among security agencies,
CERTs, defence agencies, Law enforcement agencies and judicail
systems).
PRIORTIZED APPROACH FOR IMPLEMENTATION.
SANTOSH KHADSARE 26
OTHER STRATEGIES
THANK YOU
SANTOSH KHADSARE 27

Mais conteúdo relacionado

Mais procurados

Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 

Mais procurados (20)

Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 

Semelhante a INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)

Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxfalknoor56
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemWilliam Roberts
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014vikawotar
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 

Semelhante a INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013) (20)

Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 

Mais de Santosh Khadsare (20)

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Smart card
Smart cardSmart card
Smart card
 
Guassvirus
GuassvirusGuassvirus
Guassvirus
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Webmail
WebmailWebmail
Webmail
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Web server
Web serverWeb server
Web server
 
Samba server
Samba serverSamba server
Samba server
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
 
New internet
New internetNew internet
New internet
 

Último

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Último (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)

  • 1. NATIONAL CYBER SECURITY POLICY - 2013 SANTOSH KAHDASRE
  • 3. Complex environment of integrations between people, software and services Common pool used by citizens, businesses , critical information infrastructure ,military and groups Vulnerable to a wide range of incidents, whether intentional or accidental, manmade or natural, and the info can be exploited by both nation states and non state actors SANTOSH KHADSARE 3 CYBERSPACE IS…..
  • 4. Caters to the whole spectrum of ICT users and providers and is an evolving process IT SERVES AS AN UMBRELLA FRAMEWORK FOR DEFINING AND GUIDING THE ACTIONS RELATED TO SECURITY OF CYBER SPACE It also enables the individual sectors and org in designing appropriate cyber security polices to suit their needs SANTOSH KHADSARE 4 CYBER SECURITY POLICY
  • 5. TO BUILD A SECURE AND RESILIENT CYBERSPACE FOR CITIZENS, BUSINESSES AND GOVERNMENT SANTOSH KHADSARE 5 VISION
  • 7. SANTOSH KHADSARE 7 OBJECTIVES Create a secure cyber ecosystem Create an assurance framework Strengthen the regulatory framework Enhance and create national and sectorial level 24x7 mechanisms for info gathering Enhance protection and resilience of CII by operating 24x7 NCIIPC Develop indigenous security technologies
  • 8. SANTOSH KHADSARE 8 OBJECTIVES Est infrastructure for testing & validation of security of such products Create workforce of 500,000 professionals in next five years Fiscal benefits to businesses for adoption of std security practices and processes Enable effective prevention , investigation and prosecution of cyber crime Create culture of cyber security Develop public pvt partnerships and enhance global cooperation
  • 9. Designate a national nodal agency to coordinate matters(cyber security) with clearly defined roles and responsibilities designate CISO in every org who will be responsible for cyber security efforts and initiatives Org to devp info security policies and implement them as per international best practices Org to earmark a specific budget for cyber security SANTOSH KHADSARE 9 STRATEGIES : CREATING A SECURE CYBER ECO SYSTEM
  • 10. Provide fiscal schemes and initiatives to encourage entities to install and upgrade info infrastructure fro cyber security Prevent occurrence and recurrence of cyber incidents (proactive actions) Est mechanism for sharing info Procurement of trustworthy indigenously manufactured ICT products SANTOSH KHADSARE 10 STRATEGIES : CREATING A SECURE CYBER ECO SYSTEM
  • 11. Promote adoption of global best practices in info security and compliance. Create infrastructure for conformity assessment and certification of compliance to cyber security best practices, std and guidelines (e.g ISO 27001 ISMS certification). Enable implementation of global security best practices for risk management. Identify and classify info infrastructure facilities and assets. SANTOSH KHADSARE 11 STRATEGIES : CREATING A ASSURANCE FRAMEWORK
  • 12. Encourage secure appln/software devp processes. Create conformity assessment framework for periodic verification of compliance to best practices, std and guidelines on cyber security. Encourage all entities tom periodically test and evaluate the adequacy and effectiveness of tech and op security measures implemented in IT sys and networks . SANTOSH KHADSARE 12 STRATEGIES : CREATING A ASSURANCE FRAMEWORK
  • 13. Encourage use of open standards to facilitate interoperability and data exchange among different products and services. Promote a consortium of Govt and private sector to enhance availability of tested and certified IT products on open standards. SANTOSH KHADSARE 13 STRATEGIES : ENCOURAGING OPEN STANDARDS
  • 14. Devp dynamic and legal framework and its periodic review to address Cyber security challenges. To mandate periodic audit and evaluation. To enable, educate and facilitate awareness of the regulatory framework. SANTOSH KHADSARE 14 STRATEGIES : STRENGTHENING THE REGULATORY FRAMEWORK
  • 15. To create National lvl sys , processes, structures and mechanisms to generate situational scenario of existing and potential threats and enable timely info sharing for proactive, preventive and protective actions. To operate 24x7 CERT-in to function as a Nodal Agency for coordination of all efforts for cyber security emergency response and crisis mgt (Umbrella org). SANTOSH KHADSARE 15 STRATEGIES : CREATING MECHANISMS FOR EARLY WARNING , VULNERABILITY MGT & RESPONSE
  • 16. Operationalise 24x7 sectorial CERTs. Implement Crisis Mgt plan for dealing with incidents impacting critical national processes or endangering public safety and security of the nation. To conduct and facilitate regular cyber security drills and exercises at National, sectorial and entity levels. SANTOSH KHADSARE 16 STRATEGIES : CREATING MECHANISMS FOR EARLY WARNING , VULNERABILITY MGT & RESPONSE
  • 17. To mandate implementation of global security best practices, business continuity mgt and cyber crisis mgt plan for all e- Governance initiatives . To encourage wider usage of PKI within Govt. for trusted communication and transactions. To engage info security professionals / org to assist . SANTOSH KHADSARE 17 STRATEGIES : SECURING E- GOVERNANCE SERVICES
  • 18. To devp plan for protection of CII. To operate 24x7 National Critical Information Infrastructure Protection Centre(NCIIPC) to function as Nodal agency for CII protection. To facilitate identification, prioritisation, assessment, remediation and protection of CII and key recourses. To encourage and mandate as appropriate, the use of validated and certified IT products. SANTOSH KHADSARE 18 STRATEGIES : PROTECTION AND RESILIENCE OF CRITICAL INFO INFRASTRUCTURE
  • 19. To mandate security audit of CII on periodic basis. To mandate certification of all security roles right from CISO /CSO to those involved in operation of CII. To mandate secure appl /software devp process. SANTOSH KHADSARE 19 STRATEGIES : PROTECTION AND RESILIENCE OF CRITICAL INFO INFRASTRUCTURE
  • 20. To undertake R&D programs aimed at short term, medium term and long term goals. To encourage R&D to produce cost effective, tailor-made and indigenous security solutions . To facilitate transition, diffusion. And commercialisation of outputs of R&D into commercial products and services for use in public and private sectors. SANTOSH KHADSARE 20 STRATEGIES : PROMOTION OF R&D IN CYBER SECURITY
  • 21. To set up Centre of Excellence in areas of strategic importance for the point of security of cyber space . To collaborate in joint R&D projects with industry and academia in frontline technologies and solution oriented research. SANTOSH KHADSARE 21 STRATEGIES : PROMOTION OF R&D IN CYBER SECURITY
  • 22. To create and maintain testing infrastructure and facilities of IT security product evaluation and compliance verification. To build trust relationships with product / system vendors and service providers for improving end-to-end supply chain security visibility. To create awareness of the threats, vulnerabilities and consequences of breach of security related to IT procurement. SANTOSH KHADSARE 22 STRATEGIES : REDUCIN SUPPLY CHAIN RISKS
  • 23. To foster education and trg programs both in formal and informal sectors to support the nation’s cyber security needs and build capacity. To est cyber security trg infrastructure across the country by way of public private partnership arrangements. To est cyber security concept labs for awareness and skill devp in key areas. To est institutional mechanisms for capacity building for Law Enforcement Agencies. SANTOSH KHADSARE 23 STRATEGIES : HRD
  • 24. To promote and launch a comprehensive national awareness program on security of cyber space. To sustain security literacy awareness and publicity campaign through electronic media. To conduct, support and enable cyber security workshops / seminars and certifications. SANTOSH KHADSARE 24 STRATEGIES : CREATING CYBER SECURITY AWARENESS
  • 25. To facilitate collaboration and cooperation among stakeholder entities. To create models of collaborations and engagement with all relevant stakeholders. To create a think tank for cyber security inputs, discussion and deliberations. SANTOSH KHADSARE 25 STRATEGIES : DEVP EFFECTIVE PUBLIC PVT PARTNERSHIPS
  • 26. INFO SHARING AND COOPERATION (among security agencies, CERTs, defence agencies, Law enforcement agencies and judicail systems). PRIORTIZED APPROACH FOR IMPLEMENTATION. SANTOSH KHADSARE 26 OTHER STRATEGIES