SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
BE SMART & CREATIVE IN CYBER WORLD
TOPIC
 CYBER SECURITY
 INDIAN GOVERNMENT INITIATIVE
 CYBER CRIME
 CYBER TERRORISM
------------------------------------------------------------------------------
CYBER SECURITY
Computer security, also known as cyber security or IT security, is the protection of computer
systems from the theft or damage to their hardware, software or information, as well as from
disruption or misdirection of the services they provide.
Cyber security protects the data and integrity of computing assets belonging to or
connecting to an organization’s network. Its purpose is to defend those assets against all
threat actors throughout the entire life cycle of a cyber-attack.
CYBER SECURITY INITIATIVES BY THE GOVERNMENT OF INDIA
The number of cyber security incidents has gradually increased in India over the last few
years. As per the information collected by India’s Computer Emergency Response Team
(CERT-in), 44,679, 49,455 and 50,362 cyber security incidents took place in India during the
years 2014, 2015 and 2016, respectively. These incidents include phishing, website intrusions
and defacements, virus and denial of service attacks amongst others.
Additionally, while India is ranked a high 23rd out of 165 nations (with a score of 0.683) in a
global index that measures the commitment of nations across the world to cybersecurity, it
is still classified under the "maturing" category, and not the “leading” category that includes
countries like Singapore. France, United States and Australia.
Thankfully, India hasn’t been completely oblivious to the growing necessity of ensuring cyber
security. It has set up its own ‘cyber security architecture’ that will comprise of the National
Cyber Coordination Centre (NCCC) for threat assessment and information sharing among
stakeholders, the Cyber Operation Centre that will jointly be run by the NTRO and the armed
forces for threat management and mitigation for identified critical sectors, and the National
Critical Information Infrastructure Protection Centre (NCIIPC) under the NTRO for providing
cover to ‘critical information infrastructure’.
National Cyber Security Policy 2013
The Government of India took the first formalized step towards cyber security in 2013, vide
the Ministry of Communication and Information Technology, Department of Electronics and
Information Technology’s National Cyber Security Policy, 2013. The Policy is aimed at building
a secure and resilient cyberspace for citizens, businesses and the Government. Its mission is
to protect cyberspace information and infrastructure, build capabilities to prevent and
BE SMART & CREATIVE IN CYBER WORLD
respond to cyber-attacks, and minimize damages through coordinated efforts of institutional
structures, people, processes, and technology.
Some of the strategies adopted by the Policy include:
 Creating a secure cyber ecosystem through measures such as a national nodal
agency, encouraging organisations to designate a member of senior management
as the Chief Information Security Officer and develop information security policies.
 Creating an assurance framework.
 Encouraging open standards.
 Strengthening the regulatory framework coupled with periodic reviews, harmonization
with international standards, and spreading awareness about the legal framework.
 Creating mechanisms for security threats and responses to the same through national
systems and processes. National Computer Emergency Response Team (CERT-in)
functions as the nodal agency for coordination of all cyber security efforts, emergency
responses, and crisis management.
 Securing e-governance by implementing global best practices, and wider use of
Public Key Infrastructure.
 Protection and resilience of critical information infrastructure with the National Critical
Information Infrastructure Protection Centre operating as the nodal agency.
 To promote cutting edge research and development of cyber security technology.
 Human Resource Development through education and training programs to build
capacity.
Cyber Swachhta Kendra
To combat cyber security violations and prevent their increase, Government of India’s
Computer Emergency Response Team (CERT-in) in February 2017 launched ‘Cyber
Swachhta Kendra’ (Botnet Cleaning and Malware Analysis Centre) a new desktop and
mobile security solution for cyber security in India. The centre is operated by CERT-in under
Section 70B of the Information Technology Act, 2000.
The Centre offers the following security and protective tools
1. USB Pratirodh
2. Samvid
3. M-Kavach
4. Browser JSGuard
Collaboration with industry partners
Development of Public Private Partnerships is an important strategy under the National Cyber
Security Policy 2013. To combat the ever-evolving techniques of cyber intrusions, MoU
between Cisco and CERT-In. And another Cyber Swachhta Kendra initiative, antivirus
company Quick Heal is providing a free bot removal Tool.
BE SMART & CREATIVE IN CYBER WORLD
International Cooperation Initiatives
The Indian government has entered into cyber security collaborations with countries such as
the USA, European Union and Malaysia.
Future Initiatives
Experts have suggested the setting up of a National Cyber Security Agency (NCSA) to
address cyber security issues and improve implementation at a national level.
Another proposed measure is setting up of a National Cyber Coordination Centre (NCCC)
as a cyber security and e-surveillance agency, to screen communication metadata and co-
ordinate the intelligence gathering activities of other agencies.
---------------------------------------------------------------------------------------------------------
CYBER CRIME
Types of Cyber Crime
 Hacking
 Data Theft
 Identity Theft
 Cyber Stalking
 Malware
 Spamming Phishing
 Piracy
 Internet Scams
 Child soliciting and Abuse
 Computer vandalism
 Online gambling
 Cyberterrorism
BE SMART & CREATIVE IN CYBER WORLD
BE SMART & CREATIVE IN CYBER WORLD
BE SMART & CREATIVE IN CYBER WORLD
 For complete slide: https://www.slideshare.net/Deepakniit14/c3-11-sep
 CYBER SECURITY: https://d3pakblog.wordpress.com/category/cyber-security/
 CYBER TIPS: https://d3pakblog.wordpress.com/category/cyber-tips/
References
[1] Government of India launches ‘Cyber Swachhta Kendra’; a new mobile and desktop security solution, Tech 2, February 21,
2017, http://tech.firstpost.com/news-analysis/government-of-india-launches-cyber-swachhta-kendra-a-new-mobile-and-
desktop-security-solution-363415.html
[2] As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying, Security Intelligence, August
2016, https://securityintelligence.com/as-india-gears-up-for-cybersecurity-challenges-threats-are-multiplying/
[3] National Cyber Security Policy,
2013, http://meity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20%281%29.pdf
[4] IT Minister orders measures to strengthen India’s cyber security, The Economic Times, 13 December
2016, http://economictimes.indiatimes.com/articleshow/55963728.cms?utm_source=contentofinterest&utm_medium=text&utm
_campaign=cppst
[5] http://www.cyberswachhtakendra.gov.in/about.html
[6] Ibid
[7] Government of India launches ‘Cyber Swachhta Kendra’; a new mobile and desktop security solution, Tech 2, February 21,
2017, http://tech.firstpost.com/news-analysis/government-of-india-launches-cyber-swachhta-kendra-a-new-mobile-and-
desktop-security-solution-363415.html
[8] Cisco India unveils three cyber security initiatives, The Week, 22 December 2016,
http://www.theweek.in/news/sci-tech/cisco-india-unveils-three-cyber-security-initiatives.html
[9] FACT SHEET: Framework for the U.S.-India Cyber Relationship, The White House, Office of the Press Secretary,
https://obamawhitehouse.archives.gov/the-press-office/2016/06/07/fact-sheet-framework-us-india-cyber-relationship
[10] Upgrading India’s cyber security architecture, The Hindu, 9 March
2016, http://www.thehindu.com/opinion/columns/upgrading-indias-cyber-security-architecture/article8327987.ece
[11] India’s Cyber Protection body pushes Ahead, Hindustan Times. 29 January 2014
http://www.hindustantimes.com/india/india-s-cyber-protection-body-pushes-ahead/story-4xa9tjaz6ycfDpVg95YqPL.html
[12] Rs 1,000 crore set aside for Cyber Shield, Business Standard, 5 November 2014, http://www.business-
standard.com/article/economy-policy/rs-1-000-cr-set-aside-for-cyber-shield-114110401377_1.html
DEEPAK KUMAR
Digital Forensics | Cyber Intelligence
Skype: D3pakKumar
D3pak@Protonmail.com
www.D3pakblog.wordpress.com

Mais conteúdo relacionado

Mais procurados

Cyber crime and cyber ethics ppt
Cyber crime and cyber ethics pptCyber crime and cyber ethics ppt
Cyber crime and cyber ethics ppt
Suresh Babu
 

Mais procurados (20)

Cyber crime and cyber ethics ppt
Cyber crime and cyber ethics pptCyber crime and cyber ethics ppt
Cyber crime and cyber ethics ppt
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
メルカリにおけるブロックチェーン技術の活用について | 伏見慎剛(株式会社メルカリ 執行役員 NFT担当 / 株式会社メルコイン 取締役)
メルカリにおけるブロックチェーン技術の活用について | 伏見慎剛(株式会社メルカリ 執行役員 NFT担当 / 株式会社メルコイン 取締役)メルカリにおけるブロックチェーン技術の活用について | 伏見慎剛(株式会社メルカリ 執行役員 NFT担当 / 株式会社メルコイン 取締役)
メルカリにおけるブロックチェーン技術の活用について | 伏見慎剛(株式会社メルカリ 執行役員 NFT担当 / 株式会社メルコイン 取締役)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ウェブデザインに応用する4つの基本原則
ウェブデザインに応用する4つの基本原則ウェブデザインに応用する4つの基本原則
ウェブデザインに応用する4つの基本原則
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
 
デザイン思考入門クラス【2016年1月30日】
デザイン思考入門クラス【2016年1月30日】デザイン思考入門クラス【2016年1月30日】
デザイン思考入門クラス【2016年1月30日】
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)のご紹介 ~ ...
 
Evidence Act 1872 - Bangla [Ain Kanun Academy]
Evidence Act 1872 - Bangla [Ain Kanun Academy] Evidence Act 1872 - Bangla [Ain Kanun Academy]
Evidence Act 1872 - Bangla [Ain Kanun Academy]
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Privacy on Mobile Apps
Privacy on Mobile AppsPrivacy on Mobile Apps
Privacy on Mobile Apps
 
CYBER CRIME [ HINDI ]
CYBER CRIME [ HINDI ]CYBER CRIME [ HINDI ]
CYBER CRIME [ HINDI ]
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack6 strategies to protect yourself from cyber attack
6 strategies to protect yourself from cyber attack
 

Semelhante a Cyber Security India & Cyber Crime

An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
ijtsrd
 

Semelhante a Cyber Security India & Cyber Crime (20)

An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 

Mais de Deepak Kumar (D3)

Mais de Deepak Kumar (D3) (20)

Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
Phishing
PhishingPhishing
Phishing
 
IoT
IoTIoT
IoT
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Ransomware
Ransomware Ransomware
Ransomware
 
Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
DDOS
DDOS DDOS
DDOS
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Cyber Security India & Cyber Crime

  • 1. BE SMART & CREATIVE IN CYBER WORLD TOPIC  CYBER SECURITY  INDIAN GOVERNMENT INITIATIVE  CYBER CRIME  CYBER TERRORISM ------------------------------------------------------------------------------ CYBER SECURITY Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network. Its purpose is to defend those assets against all threat actors throughout the entire life cycle of a cyber-attack. CYBER SECURITY INITIATIVES BY THE GOVERNMENT OF INDIA The number of cyber security incidents has gradually increased in India over the last few years. As per the information collected by India’s Computer Emergency Response Team (CERT-in), 44,679, 49,455 and 50,362 cyber security incidents took place in India during the years 2014, 2015 and 2016, respectively. These incidents include phishing, website intrusions and defacements, virus and denial of service attacks amongst others. Additionally, while India is ranked a high 23rd out of 165 nations (with a score of 0.683) in a global index that measures the commitment of nations across the world to cybersecurity, it is still classified under the "maturing" category, and not the “leading” category that includes countries like Singapore. France, United States and Australia. Thankfully, India hasn’t been completely oblivious to the growing necessity of ensuring cyber security. It has set up its own ‘cyber security architecture’ that will comprise of the National Cyber Coordination Centre (NCCC) for threat assessment and information sharing among stakeholders, the Cyber Operation Centre that will jointly be run by the NTRO and the armed forces for threat management and mitigation for identified critical sectors, and the National Critical Information Infrastructure Protection Centre (NCIIPC) under the NTRO for providing cover to ‘critical information infrastructure’. National Cyber Security Policy 2013 The Government of India took the first formalized step towards cyber security in 2013, vide the Ministry of Communication and Information Technology, Department of Electronics and Information Technology’s National Cyber Security Policy, 2013. The Policy is aimed at building a secure and resilient cyberspace for citizens, businesses and the Government. Its mission is to protect cyberspace information and infrastructure, build capabilities to prevent and
  • 2. BE SMART & CREATIVE IN CYBER WORLD respond to cyber-attacks, and minimize damages through coordinated efforts of institutional structures, people, processes, and technology. Some of the strategies adopted by the Policy include:  Creating a secure cyber ecosystem through measures such as a national nodal agency, encouraging organisations to designate a member of senior management as the Chief Information Security Officer and develop information security policies.  Creating an assurance framework.  Encouraging open standards.  Strengthening the regulatory framework coupled with periodic reviews, harmonization with international standards, and spreading awareness about the legal framework.  Creating mechanisms for security threats and responses to the same through national systems and processes. National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.  Securing e-governance by implementing global best practices, and wider use of Public Key Infrastructure.  Protection and resilience of critical information infrastructure with the National Critical Information Infrastructure Protection Centre operating as the nodal agency.  To promote cutting edge research and development of cyber security technology.  Human Resource Development through education and training programs to build capacity. Cyber Swachhta Kendra To combat cyber security violations and prevent their increase, Government of India’s Computer Emergency Response Team (CERT-in) in February 2017 launched ‘Cyber Swachhta Kendra’ (Botnet Cleaning and Malware Analysis Centre) a new desktop and mobile security solution for cyber security in India. The centre is operated by CERT-in under Section 70B of the Information Technology Act, 2000. The Centre offers the following security and protective tools 1. USB Pratirodh 2. Samvid 3. M-Kavach 4. Browser JSGuard Collaboration with industry partners Development of Public Private Partnerships is an important strategy under the National Cyber Security Policy 2013. To combat the ever-evolving techniques of cyber intrusions, MoU between Cisco and CERT-In. And another Cyber Swachhta Kendra initiative, antivirus company Quick Heal is providing a free bot removal Tool.
  • 3. BE SMART & CREATIVE IN CYBER WORLD International Cooperation Initiatives The Indian government has entered into cyber security collaborations with countries such as the USA, European Union and Malaysia. Future Initiatives Experts have suggested the setting up of a National Cyber Security Agency (NCSA) to address cyber security issues and improve implementation at a national level. Another proposed measure is setting up of a National Cyber Coordination Centre (NCCC) as a cyber security and e-surveillance agency, to screen communication metadata and co- ordinate the intelligence gathering activities of other agencies. --------------------------------------------------------------------------------------------------------- CYBER CRIME Types of Cyber Crime  Hacking  Data Theft  Identity Theft  Cyber Stalking  Malware  Spamming Phishing  Piracy  Internet Scams  Child soliciting and Abuse  Computer vandalism  Online gambling  Cyberterrorism
  • 4. BE SMART & CREATIVE IN CYBER WORLD
  • 5. BE SMART & CREATIVE IN CYBER WORLD
  • 6. BE SMART & CREATIVE IN CYBER WORLD  For complete slide: https://www.slideshare.net/Deepakniit14/c3-11-sep  CYBER SECURITY: https://d3pakblog.wordpress.com/category/cyber-security/  CYBER TIPS: https://d3pakblog.wordpress.com/category/cyber-tips/ References [1] Government of India launches ‘Cyber Swachhta Kendra’; a new mobile and desktop security solution, Tech 2, February 21, 2017, http://tech.firstpost.com/news-analysis/government-of-india-launches-cyber-swachhta-kendra-a-new-mobile-and- desktop-security-solution-363415.html [2] As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying, Security Intelligence, August 2016, https://securityintelligence.com/as-india-gears-up-for-cybersecurity-challenges-threats-are-multiplying/ [3] National Cyber Security Policy, 2013, http://meity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20%281%29.pdf [4] IT Minister orders measures to strengthen India’s cyber security, The Economic Times, 13 December 2016, http://economictimes.indiatimes.com/articleshow/55963728.cms?utm_source=contentofinterest&utm_medium=text&utm _campaign=cppst [5] http://www.cyberswachhtakendra.gov.in/about.html [6] Ibid [7] Government of India launches ‘Cyber Swachhta Kendra’; a new mobile and desktop security solution, Tech 2, February 21, 2017, http://tech.firstpost.com/news-analysis/government-of-india-launches-cyber-swachhta-kendra-a-new-mobile-and- desktop-security-solution-363415.html [8] Cisco India unveils three cyber security initiatives, The Week, 22 December 2016, http://www.theweek.in/news/sci-tech/cisco-india-unveils-three-cyber-security-initiatives.html [9] FACT SHEET: Framework for the U.S.-India Cyber Relationship, The White House, Office of the Press Secretary, https://obamawhitehouse.archives.gov/the-press-office/2016/06/07/fact-sheet-framework-us-india-cyber-relationship [10] Upgrading India’s cyber security architecture, The Hindu, 9 March 2016, http://www.thehindu.com/opinion/columns/upgrading-indias-cyber-security-architecture/article8327987.ece [11] India’s Cyber Protection body pushes Ahead, Hindustan Times. 29 January 2014 http://www.hindustantimes.com/india/india-s-cyber-protection-body-pushes-ahead/story-4xa9tjaz6ycfDpVg95YqPL.html [12] Rs 1,000 crore set aside for Cyber Shield, Business Standard, 5 November 2014, http://www.business- standard.com/article/economy-policy/rs-1-000-cr-set-aside-for-cyber-shield-114110401377_1.html DEEPAK KUMAR Digital Forensics | Cyber Intelligence Skype: D3pakKumar D3pak@Protonmail.com www.D3pakblog.wordpress.com