{"id":3189,"date":"2022-12-16T00:00:00","date_gmt":"2022-12-16T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/16-12-2022\/draft-cybersecurity-strategy\/"},"modified":"2022-12-16T00:00:00","modified_gmt":"2022-12-16T00:00:00","slug":"draft-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/16-12-2022\/draft-cybersecurity-strategy","title":{"rendered":"Draft Cybersecurity Strategy"},"content":{"rendered":"<p><span style=\"font-size:13pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>In News<\/strong><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">The <\/span><span style=\"font-size:12pt\"><strong>National Security Council Secretariat (NSCS)<\/strong><\/span><span style=\"font-size:12pt\"> has formulated a draft <\/span><span style=\"font-size:12pt\"><strong>National Cyber Security Strategy<\/strong><\/span><span style=\"font-size:12pt\"> which looks at addressing the issue of security of national cyberspace.\u00a0<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">The timeline for its implementation and other details are <\/span><span style=\"font-size:12pt\">not yet mentioned.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>About National Cyber Security Strategy<\/strong><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Headed by<\/strong><\/span><span style=\"font-size:12pt\">: Lt General Rajesh Pant.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Aim<\/strong><\/span><span style=\"font-size:12pt\">: It proposes a <\/span><span style=\"font-size:12pt\"><strong>separate legislative framework <\/strong><\/span><span style=\"font-size:12pt\">for cyberspace and the creation of an apex body to address threats, responses and complaints.<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">The policy will focus on both <\/span><span style=\"font-size:12pt\"><strong>threat assessment and response<\/strong><\/span><span style=\"font-size:12pt\">.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Need<\/strong><\/span><span style=\"font-size:12pt\">: The existing legal and regulatory frameworks <\/span><span style=\"font-size:12pt\"><strong>do not address the evolving threat scenarios or processes to combat the cyber incidents<\/strong><\/span><span style=\"font-size:12pt\">.<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">There is <\/span><span style=\"font-size:12pt\"><strong>no dedicated body<\/strong><\/span><span style=\"font-size:12pt\"> to look after cyber security at present and no one that you can <\/span><span style=\"font-size:12pt\"><strong>hold accountable.<\/strong><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Currently, the response to cyber security threats can be taken under the <\/span><span style=\"font-size:12pt\"><strong>information technology act and the Indian Penal Code<\/strong><\/span><span style=\"font-size:12pt\">.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Other provisions:<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">It aims to c<\/span><span style=\"font-size:12pt\"><strong>reate a comprehensive system <\/strong><\/span><span style=\"font-size:12pt\">with both <\/span><span style=\"font-size:12pt\"><strong>state-owned and private companies<\/strong><\/span><span style=\"font-size:12pt\"> having to <\/span><span style=\"font-size:12pt\"><strong>comply with cybersecurity standards<\/strong><\/span><span style=\"font-size:12pt\">.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">It provides for a <\/span><span style=\"font-size:12pt\"><strong>periodic cyber audit <\/strong><\/span><span style=\"font-size:12pt\">and recommends <\/span><span style=\"font-size:12pt\"><strong>annual reviews <\/strong><\/span><span style=\"font-size:12pt\">by the apex body that will be created.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>A centre of excellence will also be set up in Bangalore<\/strong><\/span><span style=\"font-size:12pt\"> to further innovations in the area.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div>\n<table cellspacing=\"0\" style=\"border-collapse:collapse; border:none; width:601px\">\n<tbody>\n<tr>\n<td style=\"background-color:#d9e2f3; border-bottom:1px solid #000000; border-left:1px solid #000000; border-right:1px solid #000000; border-top:1px solid #000000; vertical-align:top; width:601px\">\n<p><span style=\"font-size:13pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>Data\/ Facts<\/strong><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Till November 2022, a total of <\/span><span style=\"font-size:12pt\">12,67,564 cyber security incidents were reported.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>In 2021<\/strong><\/span><span style=\"font-size:12pt\">, the authorities had recorded 14,02,809 such events compared to 11,58,208 in 2020 and 3,94,499 in 2019.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Ransomware attacks<\/strong><\/span><span style=\"font-size:12pt\"> jumped 51% in 2022. <\/span><span style=\"font-size:12pt\"><strong>Maharashtra<\/strong><\/span><span style=\"font-size:12pt\"> was the most targeted state in India facing 42% of all ransomware attacks.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Cyber thieves<\/strong><\/span><span style=\"font-size:12pt\"> also exploited legitimate tools like <\/span><span style=\"font-size:12pt\"><strong>\u201cAnyDesk\u201d <\/strong><\/span><span style=\"font-size:12pt\">used for remote administration.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>Reasons for increasing Cyber Attacks<\/strong><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Adverse relations with China<\/strong><\/span><span style=\"font-size:12pt\">:\u00a0<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">China is considered one of the world leaders in information technology.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Therefore, it is expected to have capabilities to disable or partially interrupt the information technology services in another country.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Combined with the recent border standoff and violent incidents between the armies of the two countries, the adversity in relations is expected to spill over to attacking each other\u2019s critical information infrastructure.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Asymmetric and covert warfare<\/strong><\/span><span style=\"font-size:12pt\">:\u00a0<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Unlike conventional warfare with loss of lives and eyeball to eyeball situations, cyber warfare is covert warfare with the scope of plausible deniability, i.e., the governments can deny their involvement even when they are caught.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">Similarly, even a small nation with advanced systems and skilled resources can launch an attack on a bigger power, without the fear of heavy losses.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Increasing dependency on technology<\/strong><\/span><span style=\"font-size:12pt\">:\u00a0<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">As we grow faster, more and more systems are being shifted to virtual space to promote access and ease of use.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">However, the downside to this trend is the increased vulnerability of such systems to cyber-attacks.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>Issues with Cyber Security<\/strong><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Low digital literacy among the public<\/strong><\/span><span style=\"font-size:12pt\">: While India is considered the world leader in the technology industry, the general level of awareness in India about internet etiquette is low.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>Vulnerable points in the system: <\/strong><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:\"Book Antiqua\",serif\">sometimes the third-party apps have built-in back door entry or may have malware attached to their installation file. Such issues can be addressed by effective user account control and careful monitoring of the system.<\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>State-sponsored Cyber Attacks<\/strong><\/span><span style=\"font-size:12pt\">: The problem with such state-sponsored attacks is the unlimited funding received by the hackers to break into the foreign systems.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>It is a continuous process: <\/strong><\/span><span style=\"font-size:12pt\">Cyber-attacks, by their very nature, are innovative and creative. They continue to evolve, and the next attack is more advanced than its previous version.\u00a0<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Novel issues:<\/strong><\/span><span style=\"font-size:12pt\"> Because of the ever-changing and fast evolving nature of technology, new issues keep creeping up in the IT sector.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><strong>Way Forward\/ Steps taken by the Government\u00a0<\/strong><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">The government aims at ensuring an <\/span><span style=\"font-size:12pt\">open, safe, trusted and accountable Internet for the users.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>The Indian Computer Emergency Response Team (CERT-In)<\/strong><\/span><span style=\"font-size:12pt\"> issues alerts and advisories regarding latest cyber threats\/vulnerabilities and countermeasures to protect computers and networks on an ongoing basis.\u00a0<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\">CERT-In operates the <\/span><span style=\"font-size:12pt\"><strong>Cyber Swachhta Kendra <\/strong><\/span><span style=\"font-size:12pt\">(Botnet Cleaning and Malware Analysis Centre) to detect malicious programmes and free tools to remove the same, and to provide cyber security tips and best practices for citizens and organisations.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Security tips have been published<\/strong><\/span><span style=\"font-size:12pt\"> for users to secure their desktops and mobile phones and to prevent phishing attacks.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>CERT-In and the Reserve Bank of India [RBI]<\/strong><\/span><span style=\"font-size:12pt\"> jointly carry out a cyber security awareness campaign on \u2018<\/span><span style=\"font-size:12pt\"><strong>Beware and be aware of financial frauds<\/strong><\/span><span style=\"font-size:12pt\">\u2019 through the <\/span><span style=\"font-size:12pt\"><strong>Digital India Platform<\/strong><\/span><span style=\"font-size:12pt\">.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>The Indian Cyber Crime Coordination Centre (I4C)<\/strong><\/span><span style=\"font-size:12pt\"> under the Ministry of Home Affairs (MHA) has been designated as the nodal point in the fight against cybercrime.<\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>Pursuant to the United Nations General Assembly resolution 75\/282: <\/strong><\/span><span style=\"font-size:12pt\">an ad-hoc committee to elaborate a \u2018Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes\u2019 was established with all the member states.\u00a0<\/span>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>India being the member of the committee<\/strong><\/span><span style=\"font-size:12pt\"> has proposed criminalisation of cyber terrorism under the said Convention.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><strong>The MHA has issued National Information Security Policy and Guidelines<\/strong><\/span><span style=\"font-size:12pt\"> to the Central Ministries as well as State governments and Union Territories with the aim of preventing information security breaches and cyber intrusions in the information and communication technology infrastructure.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:12pt\"><span style=\"font-family:\"Book Antiqua\",serif\">Source: <\/span><\/span><a href=\"https:\/\/www.thehindu.com\/news\/national\/national-security-council-secretariat-formulated-draft-national-cyber-security-strategy-centre\/article66262515.ece\" style=\"text-decoration-line:none\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size:12pt\"><span style=\"font-family:\"Book Antiqua\",serif\"><span style=\"color:#1155cc\">TH<\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News The National Security Council Secretariat (NSCS) has formulated a draft National Cyber Security Strategy which looks at addressing the issue of security of national cyberspace.\u00a0 The timeline for its implementation and other details are not yet mentioned. About National Cyber Security Strategy Headed by: Lt General Rajesh Pant. Aim: It proposes a separate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3190,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[30],"class_list":["post-3189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-gs-2"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/39250002962218D1C2BEA-B42D-44CA-AC90-12BFBC61D8CC.png","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/3189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=3189"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/3189\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/3190"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=3189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=3189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=3189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}