India Internal Security | Basics of cyber security

Cyberspace is being used for a variety of malicious activities, from crime to state-sponsored attacks on critical infrastructure.

The interconnectedness of cyber networks means that even the most basic responses end up having a ripple effect or unintended consequences.

India has been at the receiving end of various forms of cyber threats; from attacks on critical infrastructure to cybercrime and the latest manifestation of the misuse of social media.

While threats have existed right from the early days of cyberspace, the sporadic nature of the attacks and their targets suggested that they were largely the handiwork of hackers and low-level criminal elements.

The major delivery vehicles were spam mails containing viruses and malware. These were however manageable and up-to-date antivirus programmes and firewalls were deemed sufficient for keeping such risks at bay.

Subsequently, new forms of malware such as Worms and Trojans, which exploited the vulnerabilities of buggy software, also began to make their appearance. Phishing and Denial of Service (DoS) attacks also entered the lexicon. Whilst the former was a technique for gaining personal information for purposes of identity theft or access to e-mails or bank accounts, the latter consisted of malevolent attacks on websites with the intention of making them inaccessible.

The rise of an international criminal economy on the Internet with its tentacles in a variety of areas and with close linkages to a hacking community for which it provides the monetary resources and direction insofar as the kind of malware to be created and the networks to be penetrated goes, is a key component of the cyber threat.

Civil Functions of Cyber Security

Civil functions over the cyber-space have four denominators :-

  • Public Services (health, education, civil-supplies, social security schemes, essential services),
  • Financial Services (banking, subsidy funding),
  • Industry (manufacturing, service sector, R&D, trade),
  • Governance (policy, procedure, statistics, survey, records, administration).

Accordingly, civil functions of cybersecurity aim at securing the cyberspace in a manner as to prevent inimical acts of the following kinds:

  • Sabotage of ‘National Information Infrastructure’ (NII) through intrusion into electromagnetic spectrum,
  • Inducing collapse, corruption or diversion of the nation’s Information Technology (IT) driven public service, administrative, economic, technical and infrastructure.
  • Psychological subversion of the society to manipulate public opinion.

Cyber Security Mechanisms

Considering India’s policy orientations, protection of the cyber-space from manipulations and intrusions from inimical parties would mostly be sought to be passive measures; execution of pro-active disabling actions seems to be rather farfetched in our context. Accordingly, the civil functions of cybersecurity in involve the following mechanisms:-

  • Warning and response to cyber-attacks,
  • Retrieval of cyber-assets – primary, secondary and tertiary data, protocols and processes, and,
  • Restoration of the compromised cyber driven systems – economic, industrial, technological, societal systems.

Cyber Warfare in the Military Domain

In the military domain, operations that are undertaken to gain information superiority fall under the ambit of ‘Information Warfare’ (IW). Within that ambit, defensive ‘Information Operations’ (IO) are waged by means of weaponized intervention, electronic warfare etc., ‘cyber warfare’ being one such mean that is cyber-space.

Cyberwarfare, therefore, is truly a ‘military operations of war’, to be conducted as an element of offensive and defensive IO, and waged in the same measures. It is distinguished by the predominance of offensive content and is to be prosecuted through military-dedicated IT-based satellites, data warehouses, maps, net-works, GPS, UAV, AWACs, PGM etc.

However, while civil functions are to be operational at all times, the military function during peace-time is to prepare and letting go at war-time to disable the opponent’s military, quasi-military and civil infrastructure. Herein lies the distinction between the civil and military functions.

Conversely, there are many commonalities between the two functions with respect to the above discussed civil cybersecurity mechanisms as well as the software and processes.

The Regime of Cyber Security

Most advanced countries have instituted robust mechanisms to protect their cyber domain.

In this respect, USA enjoys overwhelming superiority even if she takes elaborate activities under wraps. Besides passive measures, she secures her cyber-space by a technology driven barrage of highly complex cyber-intrusions and deliberate enticement of cyber-attacks from adversaries and friends alike to break into their algorithm. To do so, civil and military functions of cybersecurity enmeshed to produce the best results, cyber- attacks like ‘Gauss’, ‘Stuxnet’, ‘Duqu’, ‘Flame’ etc. being a few known ones.

China, on the other hand, depends upon mass of cyber operatives, reportedly two million strong, to support her cyber security regime, much of which is committed on internal surveillance and the rest intrusive hacking.

The score for the European nations stands even despite many reported hacking attacks from China and Russia, not to speak of their all-weather any case, not being at the centre-stage of a global circus, the European stakes are mainly limited to economic cyber-assets.

India is a novice in comparison, even if there have been some tentative attempts made to venture into the realm of cyber security. These attempts are however, confined just to work-station access-denials, blocks against hacking and back-up storage.

While India was among the first countries to have an Information Technology Act, set up a Computer Emergency Response team (CERT) and even locate responsibility for cybersecurity within the National Security Council, it has subsequently lagged behind other countries in responding to cybersecurity threats.

A Structure for Cyber Security

Having discussed the functions of civil cyber security and military cyber warfare and the differences as well as commonalities between the two, it becomes apparent there would have to be a substantial degree of congruence of resources and efforts in protecting the Indian cyber-space; and Two, when it comes to prosecution it would have to be a purely military venture.

Thus appears the necessity for an apex body to coordinate these primary and secondary functions at the national we may conclude the discussion with a brief look at some of the measures that might afford the desired level of protection to the indigenous cyber-space.

These be:-

  • Establishment of a ‘National Cyber Regulatory, Control and Security Authority’ (NCRCSA), to coordinate between the civil NCSP and the military ‘Cyber Incorporation of a ‘Cyber Research Department’ would also be necessary.
  • Regulation, coordination and strengthening of the civilian cyber activities of the ‘National Information Centre’, ‘National Crisis Management Centre’, Response Centre’, ‘National Information Infrastructure Protection Centre’, ‘Computer Emergency Response Teams’, NDMA, NTRO, Department of IT, DOT, and the private sector under the aegis of the proposed NCRCSA. The responsibility and wherewithal for cyber security is too diffused at present to be cyber-attack, and respond to it quickly and effectively.
  • ‘Cyber Command’ may be formed to plan and prepare prosecution of Cyber Warfare across the service barriers, and in coordination with the national A ‘Cyber Warfare Research Establishment’ must form part of this Command. NCSP and Cyber Warfare must be permanent and continuously performing with permanent set ups and flexible recruitment and training rules, and as stated, function under the overarching management of the proposed command.
User Avatar

By B2B

Revisiting the Basics

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments

JOIN THE COMMUNITY

Join us across Social Media platforms.

💥Mentorship New Batch Launch
💥Mentorship New Batch Launch