{"id":15380,"date":"2021-05-25T00:00:00","date_gmt":"2021-05-25T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/25-05-2021\/air-india-data-breach\/"},"modified":"2024-05-06T18:10:24","modified_gmt":"2024-05-06T12:40:24","slug":"air-india-data-breach","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/25-05-2021\/air-india-data-breach","title":{"rendered":"Air India Data Breach"},"content":{"rendered":"<p><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Recently, in a <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/www.nextias.com\/news\/cyber-security\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #1155cc;\"><strong><u>cyber-attack<\/u><\/strong><\/span><\/span><\/span><\/a><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong> on Air India&#8217;s data processor<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">, 10 years worth of the national carrier&#8217;s customer data have been leaked.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>About the Data Breach<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">The incident<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong> affected around 45 lakh data subjects<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> in the world and pertained to personal data registered between August 2011 and February 2021.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Air India\u2019s passenger service system provider, SITA<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">, faced a sophisticated cyberattack in February 2021.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">The attack was on <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>SITA\u2019s servers at its data centre in Atlanta<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">, US.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">The <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>details include<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> name, date of birth, contact information, passport information, ticket information, Star Alliance and Air India frequent flyer data and credit card data.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Air India assured its passengers that there was <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>no evidence of any misuse of the data <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">and even though <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>no passwords data were affected<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Implications<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">The breach may <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>pose litigation risks for the airline<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> that could<\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong> further delay the privatisation process<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">The current process of privatisation may go slow as there will be <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>fear of unquantified litigation risks<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> and the incident provides for a new issue for a discussion with potential bidders.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>Remedial Measures<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Investigation of the data security incident.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Advised customers to change their passwords.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Securing the compromised servers.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Engaging external data security specialists.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Notifying the credit card issuers.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Resetting the passwords of Air India frequent flyer programmes.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Prioritise efforts to contain the damage and prevent further frauds.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>About SITA\u00a0<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It is a <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Switzerland-based technology company<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> specialising in air transport communications and information technology.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It was <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>started by 11 member airlines<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> and now has <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>over 2,500 customers<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> in more than 200 countries.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It offers <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>services <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">such as passenger processing, reservation systems, etc.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Air India had entered into a deal with SITA in 2017<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> to upgrade its IT infrastructure to enable it to join <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Star Alliance<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Star Alliance is the <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>world&#8217;s largest global airline alliance<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">. It was founded in <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>May 1997<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> and its headquarters is located in <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Frankfurt am Main<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">, Germany.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>SITA Passenger Service System<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> is responsible for storing and processing of personal information of the passengers.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">At Air India, <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>SITA also implemented <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">an online booking engine, departure control system, check-in and automated boarding control, baggage reconciliation system and the frequent flyer programme.<\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table style=\"border-collapse: collapse; border: none; table-layout: fixed; width: 624px;\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #fff2cc; vertical-align: top; border: 1px solid #000000;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>Cyber Attack<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It is an <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>assault launched by cybercriminals<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> using one or more computers against a single or multiple computers or networks.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It can <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>maliciously disable computers, steal data, or use a breached computer as a launch point<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> for other attacks.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>targets <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">computer information systems, infrastructures, and computer networks.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #1155cc;\"><strong><u>Cyberwarfare<\/u><\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It is the use of digital attacks or computer- or network-based conflict to attack a nation, causing harm to actual warfare and\/or disrupting the vital computer systems, infrastructure, etc.<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">In these types of attacks, nation-state actors attempt to disrupt the activities of organizations or nation-states, especially for strategic or military purposes and cyberespionage.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Tools of Cyber Attacks<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Malware:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It is a malicious software to disrupt computers and can include Virus, Spyware, <\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #1155cc;\"><u>Trojans<\/u><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">, etc.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Phishing:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It is the method of trying to gather personal information using deceptive e-mails and websites.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Denial-of-Service (DoS) Attack: <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It shuts down a machine or network, making it inaccessible to its intended users.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Hacktivism: <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It is misuse of a computer system or network for a socially or politically motivated reason.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Social Engineering:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It is the term used for a broad range of malicious activities accomplished through human interactions enticing users to provide confidential information.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Impact of Cyber Attacks<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Economic Costs:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> This involves theft of intellectual property, corporate information, disruption in trading and the cost of repairing damaged systems.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Reputational Costs: <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">This includes loss of consumer trust and loss of future customers to competitors due to poor media coverages.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Regulatory Costs:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> GDPR and other data breach laws can impact an organization to suffer from regulatory fines or sanctions due to these cybercrimes.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><img decoding=\"async\" style=\"height: 626px; width: 548px;\" src=\"https:\/\/lh3.googleusercontent.com\/vAAb3MlRQj4R0b9GMQ9aPpQI1ZwhFnnBJA7pF2W-DFrwR_tRZgiG9s9b49DLGNugag3UYVLFXSVQqpQQMv8fBZTj8LrahsZg_UUPtEG8E_v07Kr7BEiT2qDfKQP5XLhMXuK5RZJj\" \/><\/span><\/span><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">(Image Courtesy: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/www.mygreatlearning.com\/blog\/types-of-cyber-attacks-and-why-cybersecurity-is-important\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #1155cc;\"><u>GL<\/u><\/span><\/span><\/span><\/a><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">)<\/span><\/span><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><img decoding=\"async\" style=\"height: 343px; width: 610px;\" src=\"https:\/\/lh4.googleusercontent.com\/opS_r5gjVZznlxUIwiniyceoK3nfNDRWYWLXJFWXlZfMAJqSkQ9jCT_DmBFUIlgz50qume_doUIRcqWr7BH2Xi87ngeaewJ7p-pAbLp2BboT2FfnX62o3i6VGdYgxadJBrBR05of\" \/><\/span><\/span><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">(Image Courtesy: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/www.compunettechnologies.com\/network-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #1155cc;\"><u>CT<\/u><\/span><\/span><\/span><\/a><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">)<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong><u>Safeguards Available In India Against Cyber Threats<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Information Technology Act, 2000 (Amended in 2008): <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It is the main law for dealing with cybercrime and digital commerce in India.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>National Critical Information Infrastructure Protection Centre:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It was created under Section 70A of IT Act 2000 to protect cyber-infrastructure.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Cyber Emergency Response Team, India (CERT-In):<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It is the national nodal agency for Cyber Security and is Operational since 2004.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>National Cyber Security Policy, 2013:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> The policy provides the vision and strategic direction to protect the national cyberspace.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Cyber Swachhta Kendra:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> Cyber Swachhta Kendra helps users to analyse and keep their systems free of various viruses, bots\/ malware, Trojans, etc.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Indian Cyber Crime Coordination Centre (I4C): <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Launched in 2018, It is an apex coordination centre to deal with cybercrimes.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Cyber Surakshit Bharat: <\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">It was launched by the Ministry of Electronics and Information Technology (MEITy) in 2018 with the aim to spread awareness about cybercrime and building capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"><strong>Cyber Warrior Police Force:<\/strong><\/span><\/span><\/span><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\"> It was organised on the lines of the Central Armed Police Force (CAPF) in 2018.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #000000;\">Source: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/www.thehindu.com\/news\/national\/air-india-reports-data-breach-affecting-45-lakh-passengers\/article34617628.ece\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 11pt;\"><span style=\"font-family: Arial;\"><span style=\"color: #1155cc;\"><u>TH<\/u><\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News In News Recently, in a cyber-attack on Air India&#8217;s data processor, 10 years worth of the national carrier&#8217;s customer data have been leaked. About the Data Breach The incident affected around 45 lakh data subjects in the world and pertained to personal data registered between August 2011 and February 2021. Air India\u2019s passenger [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15381,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[75,103,114,31,30,26,28,102],"class_list":["post-15380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-challenges-to-internal-security","tag-computers","tag-cyber-crime-security","tag-government-policies-interventions","tag-gs-2","tag-gs-3","tag-indian-express","tag-information-technology"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/4827790current-affairs.jpg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/15380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=15380"}],"version-history":[{"count":2,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/15380\/revisions"}],"predecessor-version":[{"id":24351,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/15380\/revisions\/24351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/15381"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=15380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=15380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=15380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}