{"id":14260,"date":"2023-05-22T18:11:01","date_gmt":"2023-05-22T12:41:01","guid":{"rendered":"https:\/\/triumphias.com\/blog\/?p=14260"},"modified":"2023-05-22T18:26:01","modified_gmt":"2023-05-22T12:56:01","slug":"unravelling-cybersecurity","status":"publish","type":"post","link":"https:\/\/triumphias.com\/blog\/unravelling-cybersecurity\/","title":{"rendered":"Unravelling Cybersecurity: Concerns and Strategies in India&#8217;s Digital Landscape"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >What's Inside this Blog!<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/triumphias.com\/blog\/unravelling-cybersecurity\/#Cybersecurity_The_Paramount_Challenges_and_the_Imperatives\" title=\"Cybersecurity: The Paramount Challenges and the Imperatives.\">Cybersecurity: The Paramount Challenges and the Imperatives.<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/triumphias.com\/blog\/unravelling-cybersecurity\/#Relevant_for_GS_%E2%80%93_Pre_and_Mains\" title=\"(Relevant for GS &#8211; Pre and Mains)\">(Relevant for GS &#8211; Pre and Mains)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/triumphias.com\/blog\/unravelling-cybersecurity\/#Find_More_Blogs\" title=\"Find More Blogs\">Find More Blogs<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Cybersecurity_The_Paramount_Challenges_and_the_Imperatives\"><\/span><span style=\"color: #ff0000;\">Cybersecurity: The Paramount Challenges and the Imperatives.<\/span><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Relevant_for_GS_%E2%80%93_Pre_and_Mains\"><\/span>(Relevant for GS &#8211; Pre and Mains)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-14263\" src=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM-300x160.jpeg\" alt=\"\" width=\"878\" height=\"468\" srcset=\"https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM-300x160.jpeg 300w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM-1024x545.jpeg 1024w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM-150x80.jpeg 150w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM-768x409.jpeg 768w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM-1536x818.jpeg 1536w, https:\/\/triumphias.com\/blog\/wp-content\/uploads\/2023\/05\/WhatsApp-Image-2023-05-22-at-6.06.37-PM.jpeg 1600w\" sizes=\"auto, (max-width: 878px) 100vw, 878px\" \/><\/p>\n<p style=\"text-align: justify;\">As outlined in India&#8217;s Cyber Security Policy 2013, cyberspace is a multifaceted domain, encompassing human elements, software applications, and services, buttressed by a vast, worldwide array of information and communication technology apparatus and networks.<\/p>\n<p style=\"text-align: justify;\">Historically, the interpretation of cyberspace was confined to three dimensions: the tangible\/hardware, the cerebral\/software, and the ethereal\/data.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #000000;\">Cybersecurity:\u00a0 <\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">Cybersecurity, synonymous with information technology security, refers to the arsenal of strategies deployed to safeguard computers, networks, programs, and data from unauthorized access or assaults aimed at exploiting cyber-physical systems and the pivotal information infrastructure.<\/p>\n<p style=\"text-align: justify;\">Cyber-physical systems seamlessly amalgamate sensing, computation, control, and networking into physical assets and infrastructure, tethering them to the internet and facilitating intercommunication.<\/p>\n<p style=\"text-align: justify;\">Exemplars of this include industrial control systems, water management systems, robotic systems, and the smart grid, among others.<\/p>\n<p style=\"text-align: justify;\">As per the Information Technology Act of 2000, Critical Information Infrastructure is defined as a computer resource, the incapacitation or obliteration of which could inflict a crippling blow to national security, economic stability, public health, or safety.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #000000;\">Concerns Pivotal to Cybersecurity in India:\u00a0<\/span><\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li>Profit-Driven Infrastructure Mentality: Following liberalisation, sectors such as Information Technology (IT), electricity, and telecommunications have seen an influx of private sector investment. Yet, their lack of emphasis on readiness and recovery from cyber-attacks in their regulatory schemas is alarming.<\/li>\n<li>All operators prioritize profit, exhibiting reluctance to allocate resources to infrastructure that lacks profit-generating potential.<\/li>\n<li>The absence of a distinct procedural code for investigating cyber or computer-related offences is glaring.<\/li>\n<li>A majority of cybercrimes possess an international dimension. Gathering evidence from overseas jurisdictions is a complex and often protracted endeavour.<\/li>\n<li>Over the past few years, India has embarked on a journey of digital transformation, etching its mark prominently on the global stage.<\/li>\n<li>Cutting-edge technologies such as 5G and the Internet of Things (IoT) will augment the reach of the internet-connected ecosystem.<\/li>\n<li>As digitalisation continues to proliferate, a surge of invaluable consumer and citizen data will be digitised and transactions will likely transition online, thereby establishing India as fertile territory for potential hackers and cyber malefactors.<\/li>\n<li>Offences relating to cryptocurrency often go unreported as the capability to resolve such crimes remains insufficient.<\/li>\n<li>While most State cyber labs are adept at analysing hard disks and mobile phones, they await official recognition as &#8216;Examiners of Electronic Evidence&#8217; by the central government. Until such accreditation is received, they cannot proffer expert insight on electronic data.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #000000;\">Strategies to Mitigate Cybersecurity Threats:<\/span><\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li>\u00a0The Centre and States must act in unison, architecting statutory guidelines to aid cybercrime investigations, while also allocating substantial funds to the creation of the much-needed cyber infrastructure.<\/li>\n<li>Establishing robust capacity to counteract cybercrime is paramount.<\/li>\n<li>This could be accomplished either by the establishment of an exclusive cyber police station in each district or range, or by ensuring the presence of technically proficient staff in every existing police station.<\/li>\n<li>A comprehensive approach to cyber conflict is crucial, be it in conducting cyber surveillance operations or in enhancing the countermeasures against cyber-attacks.<\/li>\n<li>Given that cyberspace has ascended to be the fourth policy domain for India, fortifying cybersecurity is a matter of utmost urgency.<\/li>\n<\/ul>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"react-scroll-to-bottom--css-rctxh-1n7m0yu\">\n<div class=\"group w-full text-gray-800 dark:text-gray-100 border-b border-black\/10 dark:border-gray-900\/50 bg-gray-50 dark:bg-[#444654]\" style=\"text-align: justify;\">\n<div class=\"text-base gap-4 md:gap-6 md:max-w-2xl lg:max-w-xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0 m-auto\">\n<div class=\"relative flex w-[calc(100%-50px)] flex-col gap-1 md:gap-3 lg:w-[calc(100%-115px)]\" style=\"text-align: justify;\">\n<div class=\"flex flex-grow flex-col gap-3\">\n<div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap\">\n<div class=\"markdown prose w-full break-words dark:prose-invert dark\">\n<p>Follow us :<\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.instagram.com\/triumphias\/\" target=\"_blank\" rel=\"noopener\">\ud83d\udd0e https:\/\/www.instagram.com\/triumphias<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"\ud83d\udd0e www.triumphias.com\" target=\"_blank\" rel=\"noopener\">\ud83d\udd0e www.triumphias.com<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.youtube.com\/c\/TriumphIAS\" target=\"_blank\" rel=\"noopener\">\ud83d\udd0ehttps:\/\/www.youtube.com\/c\/TriumphIAS<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/t.me\/VikashRanjanSociology\" target=\"_blank\" rel=\"noopener\">https:\/\/t.me\/VikashRanjanSociology<\/a><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Find_More_Blogs\"><\/span><span style=\"color: #808000;\">Find More Blogs<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table style=\"border-collapse: collapse; width: 102.717%; height: 506px;\">\n<tbody>\n<tr>\n<td style=\"width: 207.75px;\">\n<p class=\"entry-title\"><span style=\"color: #ff6600;\"><a style=\"color: #ff6600;\" href=\"https:\/\/triumphias.com\/blog\/compare-and-contrast-karl-marxs-and-max-webers-analysis-of-the-modern-phenomena-of-capitalism\/\" target=\"_blank\" rel=\"noopener\">Compare and contrast Karl Marx\u2019s and Max weber\u2019s<\/a><\/span><\/p>\n<\/td>\n<td style=\"width: 207.75px;\">\n<p class=\"entry-title\"><span style=\"color: #ff6600;\"><a style=\"color: #ff6600;\" href=\"https:\/\/triumphias.com\/blog\/karl-marx-historical-materialism\/\" target=\"_blank\" rel=\"noopener\">Karl Marx- Historical Materialism<\/a><\/span><\/p>\n<\/td>\n<td style=\"width: 207.75px;\">\n<p class=\"entry-title\"><a href=\"https:\/\/triumphias.com\/blog\/talcott-parsons-social-system\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff6600;\">Talcott Parsons : Social system<\/span><\/a><\/p>\n<\/td>\n<td style=\"width: 207.75px;\">\n<p class=\"entry-title\"><a href=\"https:\/\/triumphias.com\/blog\/scope-of-the-subject-and-comparison-with-other-social-sciences\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff6600;\">Scope of the subject and comparison with other social sciences<\/span><\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 207.75px;\">\n<header class=\"entry-header\">\n<p class=\"entry-title\"><a href=\"https:\/\/triumphias.com\/blog\/position-of-women-in-the-modern-indian-society-2\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff6600;\">Position of Women In the Modern Indian Society<\/span><\/a><\/p>\n<\/header>\n<\/td>\n<td style=\"width: 207.75px;\">\n<header class=\"entry-header\">\n<p class=\"entry-title\"><a href=\"https:\/\/triumphias.com\/blog\/sociology-social-system-and-pattern-variables\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff6600;\">Sociology: Social system and pattern variables<\/span><\/a><\/p>\n<\/header>\n<div class=\"entry-content clearfix\"><\/div>\n<\/td>\n<td style=\"width: 207.75px;\">\n<header class=\"entry-header\"><a href=\"https:\/\/triumphias.com\/blog\/changing-family-structure-in-india\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ff6600;\">Changing family structure in India<\/span><\/a><\/header>\n<\/td>\n<td style=\"width: 207.75px;\">\n<p class=\"entry-title\"><span style=\"color: #ff6600;\">Modernity and social changes in Europe<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"react-scroll-to-bottom--css-rctxh-79elbk h-full dark:bg-gray-800\">\n<div class=\"react-scroll-to-bottom--css-rctxh-1n7m0yu\">\n<div class=\"flex flex-col items-center text-sm dark:bg-gray-800\">\n<div class=\"group w-full text-gray-800 dark:text-gray-100 border-b border-black\/10 dark:border-gray-900\/50 bg-gray-50 dark:bg-[#444654]\">\n<div class=\"text-base gap-4 md:gap-6 md:max-w-2xl lg:max-w-xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0 m-auto\">\n<div class=\"relative flex w-[calc(100%-50px)] flex-col gap-1 md:gap-3 lg:w-[calc(100%-115px)]\">\n<div class=\"flex flex-grow flex-col gap-3\">\n<div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap\">\n<div class=\"markdown prose w-full break-words dark:prose-invert dark\">marriage types, monogamy, polygamy, polygyny, polyandry, group marriage, serial monogamy, non-serial monogamy, sororal polygyny, non-sororal polygyny, fraternal polyandry, non-fraternal polyandry, social institutions<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"text-align: left;\">#Sociologyforupsc #sociologyforupscinhindi #sociologyforupscgs1 #sociologyforupscprelims #sociologyforupscinenglish #sociologyforupscmainsinhindi #sociologyforupscoptionalinhindi #sociologyforupscmains #sociologyforupscplaylist #sociologyforupsclecture1 #sociologyforupsccse #sociologyforupscoptional #syllabusofsociologyforupscoptional #bestbookforsociologyforupsc #sociologyoptionalforupscanswerwriting #sociologyoptionalforupscanukumari #sociologyoptionalforupscabhijeet #sociologyoptionalforupscanalysis #sociologyoptionalforupscalllectures #sociologysyllabusforupscanalysis<\/p>\n<p style=\"text-align: justify;\">\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\">\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity: The Paramount Challenges and the Imperatives. (Relevant for GS &#8211; Pre and Mains) As outlined in India&#8217;s Cyber Security<\/p>\n","protected":false},"author":1,"featured_media":14261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[5361,389,5359,5362,5360,5357,5358,5354,376,5355,5356,3563],"class_list":["post-14260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-miscellaneous","tag-5g","tag-cryptocurrency","tag-cyber-infrastructure","tag-cyber-labs","tag-cyber-surveillance","tag-cyber-physical-systems","tag-cybercrime","tag-cybersecurity","tag-digital-transformation","tag-indias-cyber-security-policy-2013","tag-information-technology-act-2000","tag-internet-of-things"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/14260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/comments?post=14260"}],"version-history":[{"count":3,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/14260\/revisions"}],"predecessor-version":[{"id":14266,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/14260\/revisions\/14266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media\/14261"}],"wp:attachment":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media?parent=14260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/categories?post=14260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/tags?post=14260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}