cyber security
India's prospects in Cyber Space:
- Internet and Mobile Association of India - internet users expected to grow upto 314m by the end of 2017. Growth rate of 28% bw 2013-17.
- 3rd largest hub for tech startups
- Networked devices expected to grow over 2bn.
- India ranked 23/165 in Global Cyber Security Index
Cyber Security relates to preventing any unauthorised and malafide access to computers or ICT infrastructure. After land, sea, air and space, cyberspace has been officially declared as the 5th dimension of warfare.
Challenges in cybersecurity:
- geographical barriers
- difficult to locate perpetrator, anonymity
- evoloving technology
- diffcult to apply traditional security concepts like deterrence and retaliation
Use of cyber space by non state actors:
- 32 lakh debit cards in India were compromised in 2016; 500m Yahoo accounts were breached
- Mirai Botnet cyber attack in 2016 that brought down much of America's internet is one of the biggest so far
- Wanna Cry Ransomware hit 150 countries, including US and Russia
CYBER CRIMES IN INDIA
- According to ASSOCHAM, surge of ~350% in cybercrime cases registered bw 2011-14
- cyber-attacks on government sector doubled from 7% in 2015 from 14% in 2016
- Legion attack - hacker group broke into Twitter accounts of Congress party, its Vice President and other popular people. Claim to be in possession of servers of Apollo hospitals.
Critical Information Infrastructure: IT Act 2000 defines CII as the computer resource - the incapacitation or destruction of which shall have debilitating impact on national security, economy, public health or safety. Such as telecommunication networks, online payment gateways, electronic stock trading.
Factors which render CII as preferred targets:
- Adversary nations: due to concealed origin and lack of conventional restrictions of being in proximity. Ex. cyber-attacks by Russia on Georgia, use of Stuxnet malware to damage Iran’s nuclear facility.
- Embedded systems: since components of electronic devices are procured via global supply chains, possibility of tampering, insertion of malicious software.
- Insider Threat: of disgruntled/compromised employee, unintentional hiring of a hacker. Ex Edward Snowden.
- Lack of training: accidents
Financial Sector:
- Attacks 3% in 2015 to 14% in 2016.
- Biggest debit card fraud in Indian history - 32lakh debit cards compromised across 19 banks due to malware induced in Hitachi Payment Systems that provide ATMs and PoS machines.
Issues in India's Cyber Sec:
- Appointment of National Cyber Security Coordinator in 2014 has not been supplemented by creating liaison officers in the States.
- Computer Emergency Response Team (CERT-In) is understaffed.
- Electronic fraud is notoriously underreported in India. According to Interpol, less than 10% reported.
- Lack of voluntary, sector-specific standards for reporting data breaches nor industry backchannels for sharing confidential security information.
- Attitudinal factor - The continued perception has been that cyber security is “optional”. Most Indian companies don't make 2 factor authentication mandatory while using services such as Gmail.
- International threat of cyber war to the functionality of our defence services.
- Lot of equipment is imported, danger of tampering or malafide programming. Need vigorous testing.
- National Critical Information Infrastructure Protection Centre yet to be fully functional.
STEPS TAKEN BY GOVERNMENT OF INDIA
- Indian Common Criteria Certification Scheme (IC3S) by DEITY to evaluate and certify IT Security Products and Protection Profiles
- National Cyber Coordination Centre to scan the country’s web traffic to detect cyber security threats made operational
- Information Security Education and Awareness (ISEA) project with the aim to develop human resource
- Cyber Swachhta Kendra - Botnet Cleaning and Malware Analysis Centre
- Ground Zero Summit: Theme ‘Securing Digital India’
- National Critical Information Infrastructure Protection Centre (NCIIPC): nodal agency, 24×7 centre to take care of strategic areas such as air control, nuclear and space. Placed under National Technical Research Org.
- Sectoral CERTs for Defence and Finance.
- Establishment of Defence Information Assurance and Research Agency (DIARA) for cyber security issues of the tri services and Defence Ministry.
- Maharashtra - cyber-police station in each district and 51 cyber-crime labs with trained manpower and modern equipment.
- Measures by RBI:
- directed banks to implement a security policy containing strategy for dealing with cyber threats and cyber hygiene measures.
- notified the Cyber Security Framework
- created a specialised cell (C-SITE) to conduct detailed IT examination of banks’ cyber security preparedness and identify the gaps
Information Technology (IT) Act 2000:
- Provides a legal framework for transactions carried out by means of electronic data interchange and communication.
- Amended in 2008 to deal with new forms of cyber-crimes like publicizing sexually explicit material in electronic form, video voyeurism, cyber terrorism, breach of confidentiality and leakage of data by intermediary and ecommerce frauds.
- Provides for the Controller of Certifying Authorities - to license and regulate the working of Certifying Authorities which issues digital signature certificates for electronic authentication of users.
- Cyber Appellate Tribunal
Indian Computer Emergency Response Team (CERT-in):
- National Watch and Alert System where CERT-in scans cyber space in country 24x7
- Functions according to IT Act, 2000:
- Collection, analysis and dissemination of information on cyber incidents
- Forecast and alerts
- Emergency measures
- Coordination efforts
- Implementing National Information Security Assurance Programme (NISAP) to create awareness in government and critical sector organizations and adopt best practices.
National Cyber Security Policy 2013
- Set up different bodies to tackle various levels of threats
- Create a National Critical Information Infrastructure Protection Centre (NCIIPC)
- Create a workforce of around 500,000 trained in cyber security
- Provide fiscal benefits to businesses to adopt best security practices.
- Create testing labs to check safety of imported equipment.
- Cyber ecosystem and PPP
- Indigenous security technologies through research.
WAY FORWARD
- India can adopt suitable best practices from Budapest Convention (it is the only multilateral treaty on cyber security - but developing countries like India refused to join it becuase it was drafted wo consuting them)
- Implement a Cyber Crisis Management Plan.
- Cyber Security mock drills
- Currently, the only source of international guidelines on “cyber warfare” is the Tallinn Manual, a document that was put together by Western experts under the aegis of NATO. Need a more inclusive document.
- Concept of air gapping - ie isolate the critical infrastructures from the internet.
- International data protection law that facilitates quick information sharing with multinational companies which do not host domestic servers.
- Sensitise people
- Develop offensive capabilites
- China's cyber sec law has provisions of 'data localization' - requiring data to be hosted in local servers and 'security certification’ for important network equipment. Also specific requirements for ‘key industries’ like energy, transportation, finance etc. to maintain web logs of at least six months
*Section 79 of the Information Technology Act, 2000 acknowledges the limited role that internet intermediaries can play in filtering the flow of information by conferring on them immunity from liability with respect to third party information. In the landmark case on internet freedom, Shreya Singhal v Union of India, the Supreme Court held that an intermediary (like Google) becomes liable only if it violates a court order directing it to take down offensive material.
Comments
Post a Comment