{"id":9706,"date":"2020-09-19T23:39:08","date_gmt":"2020-09-19T18:09:08","guid":{"rendered":"https:\/\/triumphias.com\/blog\/?p=9706"},"modified":"2020-09-19T23:39:08","modified_gmt":"2020-09-19T18:09:08","slug":"cyber-security-in-india","status":"publish","type":"post","link":"https:\/\/triumphias.com\/blog\/cyber-security-in-india\/","title":{"rendered":"Cyber Security In India"},"content":{"rendered":"<h2><span style=\"color: #0000ff;\">Relevance: Prelims\/Mains: G.S paper III: Cyber security<\/span><\/h2>\n<p>Recently, the cyber security attack on Australia\u2019s communication system has brought the governance to a stand still. In India, too, cyber attacks have been occurring with increasing frequency. For example, leak of personal information of 3.2 million debit cards in 2016 and the Data Theft At Zomato (2017), Wannacry Ransomware (2017), PETYA Ransomware (2017) etc.<\/p>\n<p>Further, Cyber security has become an integral aspect of national security. Moreover, its area of influence extends far beyond military domains to cover all aspects of a nation\u2019s governance, economy and welfare.<\/p>\n<p>Although India was one of the few countries to launch a cybersecurity policy in 2013, not much has transpired in terms of a coordinated cyber approach. Thus, there is a need for a comprehensive cyber security policy in India.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/image.slidesharecdn.com\/indianperspectiveofcybersecurity-101106094718-phpapp02\/95\/indian-perspective-of-cyber-security-23-638.jpg?cb=1422639760\" alt=\"Indian perspective of cyber security\" \/><\/p>\n<h3><span style=\"color: #ff0000;\">Need For Cyber Security Framework<\/span><\/h3>\n<ul>\n<li><strong>National Security Imperative:<\/strong>\u00a0The change in military doctrines favouring the need to raise cyber commands reflects a shift in strategies, which include building deterrence in cyberspace.<\/li>\n<li>The need for a competent cyber security infrastructure as part of national security was first emphasized by the\u00a0<strong>Kargil Review Committee 1999.<\/strong><\/li>\n<li><strong>Increasing Importance of Digital Economy:<\/strong>\u00a0The digital economy today comprises 14-15% of India\u2019s total economy, and is targeted to reach 20% by 2024.<\/li>\n<li><strong>Added Complexity:<\/strong>\u00a0With more inclusion of\u00a0<strong>artificial intelligence (AI), machine learning (ML), data analytics, cloud computing and Internet of Things (IoT)<\/strong>, cyberspace will become a complex domain, giving rise to issues of a techno-legal nature.<\/li>\n<li><strong>Securing Data:<\/strong>\u00a0Data is referred to as the currency of the 21st century and due to its bulk creation owing to India\u2019s population, several international companies (Google, Amazon etc.) are trying to have access to it.<\/li>\n<li>Given this there are issues related to data sovereignty, data localisation, internet governance, etc.\n<ul>\n<li>Thus, there is a need to build strong cyber security architecture.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/iasexamportal.com\/sites\/default\/files\/cyber-security-img.jpg\" alt=\"Cyber Security : Important Topics for UPSC Exams | IAS EXAM PORTAL - India's  Largest Community for UPSC Exam Aspirants.\" \/><\/p>\n<h3><span style=\"color: #ff0000;\">Challenges in India&#8217;s Cyber Security Approach<\/span><\/h3>\n<ul>\n<li><strong>Lack of Cybersecurity WorkForce:<\/strong>\u00a0The Indian military, central police organizations, law enforcement agencies and others are deficient in manpower, for software and hardware aspects integral to this field.\n<ul>\n<li>Moreover, there is a growing demand for professionals in Artificial Intelligence (AI), BlockChain Technology (BCT), Internet of Things (IoT) and Machine Learning (ML).<\/li>\n<li>According to several estimates there is a need for at least three million cybersecurity professionals today.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Lack of Active Cyber Defence:<\/strong>\u00a0India doesn\u2019t have the \u2018active cyber defence\u2019 like the EU&#8217;s\u00a0<strong>General Data Protection Regulation (GDPR)<\/strong>\u00a0or US\u2019 Clarifying Lawful Overseas Use of Data (CLOUD) Act.<\/li>\n<\/ul>\n<div class=\"border-bg\">\n<p><img decoding=\"async\" src=\"https:\/\/www.drishtiias.com\/images\/uploads\/1593085085_image1.jpg\" alt=\"Cyber Security Framework In India\" \/><\/p>\n<p><strong>Note:<\/strong><\/p>\n<ul>\n<li><strong>Active Cyber Defence:<\/strong>\u00a0It is far more than just the enhancement of defensive cybersecurity capabilities for the Government and the Intelligence Community.\n<ul>\n<li>Active Cyber Defence-defined capabilities and processes are employed to support federal, state, and local government agencies and organizations, critical infrastructure segments, and industry.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<ul>\n<li><strong>Overlapping Regulatory Bodies:<\/strong>\u00a0Unlike the US, Singapore, and the UK where there is a single umbrella organisation dealing in cybersecurity, India has several central bodies that deal with cyber issues, and each has a different reporting structure.<\/li>\n<li>Further, each state government has its own\u00a0<strong>Cyber emergency Response Team (CERT).<\/strong><\/li>\n<li><strong>Dependency on Foreign Players For Cyber Security Tools:<\/strong>\u00a0India lacks indigenisation in hardware as well as software cybersecurity tools.<\/li>\n<li>This makes India\u2019s cyberspace vulnerable to cyberattacks motivated by state and non-state actors.<\/li>\n<li><strong>External Challenges:<\/strong>\u00a0Challenges such as growing Chinese influence in Indian telecom space, social media is becoming a powerful tool for dissemination of \u201cinformation\u201d making it difficult to differentiate fact from fake news.<\/li>\n<\/ul>\n<h3><span style=\"color: #ff0000;\">Way Forward<\/span><\/h3>\n<ul>\n<li><strong>Creating Awareness:<\/strong>\u00a0With countries resorting to digital warfare and hackers targeting business organisations and government processes, India has to create awareness that not a single person or institution is immune to it.<\/li>\n<li>While the government and the corporate world are better placed perhaps to create their own programs, it is the civil society who needs to bring into this ambit.<\/li>\n<li><strong>Strengthening of Existing Cyber Security Framework:<\/strong>\u00a0National cybersecurity projects such as the\u00a0<strong>National Cyber Coordination Centre (NCCC), National Critical Information Infrastructure Protection Centre (NCIIPC)<\/strong>\u00a0and the Computer Emergency Response Team (CERT) need to be strengthened manifold and reviewed.<\/li>\n<li><strong>Bringing Cyber Security in Education:<\/strong>\u00a0Educational institutions including central universities, private universities, industry associations, Industrial Training Institutes (ITIs) must incorporate courses on cybersecurity.<\/li>\n<li><strong>Integrated Approach:<\/strong>\u00a0Given increasing dominance of mobile and telecommunication, both National cyber security policy and National Telecom Policy will have to effectively coalesce to make a comprehensive policy for 2030.<\/li>\n<li><strong>Promoting Indigenisation:<\/strong>\u00a0There is a need to create opportunities for developing software to safeguard cyber security and digital communications.\n<ul>\n<li>The Government of India may consider including cybersecurity architecture in its\u00a0<strong>Make In India programme.<\/strong><\/li>\n<li>Also, there is a need to create suitable hardware on a unique Indian pattern that can serve localised needs.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Given the future of technology under Industrial Revolution 4.0, India requires a strong cybersecurity framework based on the 4D principles i.e. Deter, Detect, Destroy and Document so that it can subverse all attempts towards any cyber challenges.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\"><strong>For more such notes, Articles, News &amp; Views Join our Telegram Channel.<\/strong><\/span><\/p>\n<p><a title=\"Telegram Link\" href=\"https:\/\/t.me\/triumphias\" target=\"_blank\"><span style=\"color: #ff0000;\"><strong>https:\/\/t.me\/triumphias<\/strong><\/span><\/a><\/p>\n<p><span style=\"color: #0000ff;\"><strong>Click the link below to see the details about the UPSC \u2013Civils courses offered by Triumph IAS.<\/strong> <\/span><span style=\"color: #ff0000;\"><strong><a style=\"color: #ff0000;\" title=\"Courses available\" href=\"https:\/\/triumphias.com\/pages-all-courses.php\">https:\/\/triumphias.com\/pages-all-courses.php<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Relevance: Prelims\/Mains: G.S paper III: Cyber security Recently, the cyber security attack on Australia\u2019s communication system has brought the governance<\/p>\n","protected":false},"author":1,"featured_media":6714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[123,42],"tags":[392],"class_list":["post-9706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","category-general-studies-iii-technology-economic-development-bio-diversity-environment-security-and-disaster-management","tag-union-public-service-commission-upsc"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/9706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/comments?post=9706"}],"version-history":[{"count":1,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/9706\/revisions"}],"predecessor-version":[{"id":9707,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/posts\/9706\/revisions\/9707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media\/6714"}],"wp:attachment":[{"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/media?parent=9706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/categories?post=9706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triumphias.com\/blog\/wp-json\/wp\/v2\/tags?post=9706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}