{"id":11900,"date":"2021-07-01T00:00:00","date_gmt":"2021-07-01T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/01-07-2021\/global-cybersecurity-index-2020\/"},"modified":"2021-07-01T00:00:00","modified_gmt":"2021-07-01T00:00:00","slug":"global-cybersecurity-index-2020","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/01-07-2021\/global-cybersecurity-index-2020","title":{"rendered":"Global Cybersecurity Index 2020"},"content":{"rendered":"<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Recently, Global Cybersecurity Index 2020 (GCI) was released by the International Telecommunications Union (ITU).<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>About<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">GCI is a project of the ITU to rank the cybersecurity capabilities of nations across the globe.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">The ranking is based on four pillars: legal measures, technical measures, capacity building measures and organisational measures.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>ITU: <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Part of the UN, founded in 1865, <\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>HQ:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Geneva, Switzerland.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Cybersecurity:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Practice of protecting systems, networks, and programs from digital attacks.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Key Points<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">The US topped the index, the UK and Saudi Arabia ranked 2nd.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Yemen, Vatican and Micronesia shared the last position.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>India\u2019s Performance: <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">India ranked 10th position, earlier it was at 47; China (33) &#038; Pakistan(79).<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">4th spot in the Asia-Pacific region.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Challenges Ahead for the Countries Worldwide<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Digital gaps amongst nations create an unsustainable environment in the cyber domain.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Growing digital reliance in the post-COVID era has exposed digital disparities which must be bridged through capacity building.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">There\u2019s a sophisticated use of cyberspace by terrorists to broaden their propaganda and incite hatred.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Importance of Cybersecurity<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Increasing dependency on technology<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Prevent Critical attack installation of the country<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Personal Data Leak (Mobikwik data leak, impact on competition.)<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Reasons for increasing Cyber Attacks in India<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Adverse relations with China:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> China is considered one of the world leaders in information technology. Therefore, it is expected to have capabilities to disable or partially interrupt the information technology services in another country.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Combined with the recent border standoff and violent incidents between the armies of the two countries, the adversity in relations is expected to spill over to attacking each other\u2019s critical information infrastructure.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Asymmetric and covert warfare:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Unlike conventional warfare with loss of lives and eyeball to eyeball situations, cyber warfare is covert warfare with the scope of plausible deniability, i.e. the governments can deny their involvement even when they are caught. Similarly, even a small nation with advanced systems and skilled resources can launch an attack on a bigger power, without the fear of heavy losses.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Therefore, cyber warfare has increasingly become the chosen space for conflict between nations.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Increasing dependency on technology:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> As we grow faster, more and more systems are being shifted to virtual space to promote access and ease of use. However, the downside to this trend is the increased vulnerability of such systems to cyber-attacks.\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">For e.g. there is a concern of widespread damage and huge loss if hackers are able to intrude into the nuclear, financial or energy systems of a country. Since almost all sectors of an economy are dependent upon power, the takedown of the power grid can substantially impact the economy.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>International Efforts<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Budapest Convention:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> 1st international treaty to address cybercrime; India not a signatory.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Internet Corporation for Assigned Names and Numbers (ICANN): <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">US-based not-for-profit organisation for coordinating &#038; maintenance of several databases.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Internet Governance Forum: <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">UN forum for multi-stakeholder policy dialogue on Internet governance issues.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>India\u2019s Preparedness to Ensure Cybersecurity<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Well-organised structure:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Agencies including\u00a0 Computer Emergency Response Team \u2013 India (CERT-In) &#038; National Cyber Security Council.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">IT Act, 2000.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Strategies under National Cyber Policy, 2013.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Banning of unsafe apps:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Recently, India had banned apps that posed a threat to security.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Awaited National cybersecurity strategy<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">: Comprehensive plan in preparing &#038; dealing with cyber-attacks (Pre, Post and During the attack).<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Recent initiatives:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">\u00a0 Cyber Surakshit Bharat Initiative, National Cybersecurity Coordination Centre (NCCC), Cyber Swachhta Kendra etc.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Indian Cyber Crime Coordination Centre (I4C): <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Launched in 2018, It is an apex coordination centre to deal with cybercrimes.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>The Cyber Warrior Police Force:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> It was organised on the lines of the Central Armed Police Force in 2018.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Issues with Cyber Security<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Low digital literacy among the general public<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Poor cybersecurity infrastructure<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">State-sponsored cyber attacks<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Increased internet usage and technology advancement like 5G, IoT, crypto etc.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong><u>Way Ahead<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Human Resource Development: <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">The human resource is crucial and there is an urgent need to create an informal Indian team of Cyber Warriors.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Infrastructure Strengthening:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> The critical infrastructure managers should also be well trained in cyber warfare and well equipped with all the technologies for isolating viruses and attacks.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Mock Drills using White Hackers<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">: There should be a reward for white hackers who can highlight the shortcomings.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Awareness:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> The managers and Common mass must be made aware.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Involvement of the Private Sector:<\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"> Often the private sector is seen as a key innovator and their help can be crucial in securing cyberspace.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\"><strong>Separate wing <\/strong><\/span><\/span><\/span><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">under Army or Navy as Cyber Command on lines of US.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:11pt\"><span style=\"font-family:Arial\"><span style=\"color:#000000\">Source: TH<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News Recently, Global Cybersecurity Index 2020 (GCI) was released by the International Telecommunications Union (ITU). About GCI is a project of the ITU to rank the cybersecurity capabilities of nations across the globe. The ranking is based on four pillars: legal measures, technical measures, capacity building measures and organisational measures. ITU: Part of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11901,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[114,26],"class_list":["post-11900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-cyber-crime-security","tag-gs-3"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/4838328current-affairs.jpg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/11900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=11900"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/11900\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/11901"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=11900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=11900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=11900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}