Sunteți pe pagina 1din 2

CYBER SECURITY

DEFINITION
 Provide anonymity
 Next generation of warfare
 No human resource loss involved
 Perpetrators can choose their time and place of attack.

TYPES
 Cyber crime
 Cyber war
 Cyber espionage
 Cyber terrorism

SPOOFING
Mimicking the website exactly

PHISHING
Stealing information by projecting oneself in a deceptive manner
The information is usually of a financial nature

MALWARE
Virus and worms

DENIAL OF SERVICE (DOS)


Malicious user causes artificial traffic in a website so that the user goes to a
competitor website

RANSOMWARE
Malicious user locks private devices and demands ransom in return
Bitcoins used for transaction to ensure anonymity
Eg. wannacry

IDENTITY THEFT

MEASURES TAKEN
1. LEGAL
 IT Act (2000)- many crimes remain uncovered; need for
amendments because of the ever-changing aspects of cyber crime

2. Cross-jurisdictional nature of the crime requires international co-


operation. A collaboration with the Internet Corporation for Assigned
Names and Numbers (ICANN) is also required.

3. COMPUTER EMERGENCY RESPONSE TEAM- INDIA (CERT-IN)


 It is the apex cyber security body in India; founded in 2004
 Comes under Ministry of Electronics and Information Technology
 Under-staffed and under0funded
 Specialised manpower is required, along with an allocation of more
funds

4. NATIONAL CYBER SECURITY POLICY OF 2013


 The provisions of this highly comprehensive policy need to be
implemented in letter and in spirit
 Mentions that we need 5 lakh trained professionals to maintain
organisations like CERT-IN, etc.
 Makes it mandatory for corporations to appoint a Chief
Information Security Officer (CISO)

5. NATIONAL TECHNICAL RESEARCH ORGANIZATION (NTRO)


 Works for intelligence gathering
 Set up in 2004

6. NATIONAL CRITICAL INFORMATION INFRASTRUCTURE


PROTECTION CENTRE (NCIIPC)
 Runs 24x7 to safeguard our critical infrastructure like power
plants, dams, banks, stock markets, satellite communications,
etc.
 Founded in 2014

7. INCENTIVIZING PRIVATE PLAYERS


 Since the private sector has much more proficiency in cyber-
security matters, the government needs to incentivize them
immediately

8. INDIGENOUS SERVERS AND SOFTWARES


 To reduce hacking and other related vulnerabilities
 Discouraging use of gmail servers, especially for government
employees

9. NEED TO INCULCATE CYBER AWARENESS, ESPECIALLY CYBER


HYGIENE