Unacademy Plus: Missed earlier deadline for the low price?

Claim your seat at present cost while you still can. Cost increasing again on 25th Feb | Seats going fast | Register Now

Google unveils security campaign to protect users from cyberbullying, fraud

Note4students

Mains Paper 3: Internal Security | Basics of cyber security

From UPSC perspective, the following things are important:

Prelims level: #SecurityCheckKiya campaign

Mains level: India’s growing digital reach and threats posed by it


News

Public safety initiative to protect the netizens

  1. Google has unveiled a public safety initiative in India to create awareness around Internet safety and protect the netizens
  2. The programme called ‘#SecurityCheckKiya‘ is targeted at young and first-time users to protect themselves from account hijacking
  3. It is also aimed at shielding their Android mobile devices from malicious apps and secure all their personal data if they lose them

Threats posed by internet

  1. India has the second largest Internet user base in the world
  2. There is a lot of social engineering abuse, for example, the lottery and job scams
  3. For kids and women, there could be cyberbullying and (internet) trolling

Recommended safety steps

  1. Google has recommended three simple steps that can help everyone start their journey towards internet safety
  2. This includes reviewing security settings and Google account activity with one click for all Android devices and Gmail users
  3. Google Security check helps users to automatically scan for any vulnerability and guides them to keep their account safe in few minutes
  4. ‘Find My Device’ app from Google helps a user to easily locate a lost Android device and keeps the device and information secure

Govt. to set up apex cybercrime coordination centre

Note4students

Mains Paper 3: Internal Security | Challenges to internal security through communication networks, role of media & social networking sites in internal security challenges,

From UPSC perspective, the following things are important:

Prelims level: Indian Cyber Crime Coordination Centre (I4C)

Mains level: Cybersecurity and issues related to it


News

I4C to be set up

  1. Union Home Ministry is planning to set up an apex coordination centre to deal with cyber crimes such as financial frauds, circulation of communal and pornographic contents
  2. The apex centre — Indian Cyber Crime Coordination Centre (I4C) — would be set up in Delhi
  3. The Ministry has already created a new wing — Cyber and Information Security Division — to deal with cyber crimes and related issues

Working of I4C

  1. It would coordinate with State governments and Union Territories, and closely monitor the cyberspace and social media with due emphasis on vernacular content
  2. The centre would also block those websites which flout India’s laws and circulate child porn, and communally and racially sensitive content
  3. The centre would maintain a list of suspects
  4. The leads generated during investigations in cybercrime cases would be shared with law enforcement agencies through a “secured internal network”

Why such move?

  1. The move came in the wake of 1,44,496 cybersecurity attacks observed in the country during 2014-16
  2. Over a period of time, there has been a phenomenal increase in use of computers, smartphones and internet
  3. With this increase, cybercrimes have emerged as a major challenge for law enforcement agencies

WEF launches Global Centre for Cybersecurity

Note4students

Mains Paper 2: IR | Important International institutions, agencies & fora, their structure, mandate

From UPSC perspective, the following things are important:

Prelims level: Global Centre for Cybersecurity, World Economic Forum,  Artificial Intelligence, Internet of Things (IoT)

Mains level: Rising threats from cyber world and measures to minimize risks


News

Global Centre for Cybersecurity

  1. The World Economic Forum (WEF) announced a new Global Centre for Cybersecurity
  2. It will help safeguard the world from hackers and growing data breaches — especially from nation-states

About the center

  1. Headquartered in Geneva, the center will become operational from Marc
  2. It will bring together governments as well as international organizations
  3. WEF will reach out to key industry players and G-20 countries in the beginning

Need for cybersecurity

  1. Cybersecurity is a borderless problem
  2. Urgent action is needed to create a safe operating environment for new technologies like Artificial Intelligence, robotics, drones, self-driving cars and the Internet of Things (IoT)
  3. Criminal abuse of virtual currencies is also happening at a faster rate

Home Ministry pitches for Budapest Convention on cyber security

Note4students

Mains Paper 3: Internal Security | Challenges to internal security through communication networks, role of media & social networking sites in internal security challenges

From UPSC perspective, the following things are important:

Prelims level: Budapest Convention, Indian Cyber Crime Coordination Centre (I4C)

Mains level: Rising rate of cybercrimes and ways to deal with it


News

Need for international cooperation to tackle cyber crime

  1. India was reconsidering its position on becoming a member of the Budapest Convention
  2. This was because of the surge in cybercrime, especially after a push for digital India
  3. The Ministry of Home Affairs has flagged the need for international cooperation to check cyber crime, radicalization and boost data security

Opposition by Intelligence Bureau

  1. The move is being opposed by the Intelligence Bureau
  2. IB argues that sharing data with foreign law enforcement agencies infringes on national sovereignty and may jeopardize the rights of individuals

Deadline set for setting up I4C

  1. Home ministry has set a deadline of February this year to operationalize the Indian Cyber Crime Coordination Centre (I4C)
  2. The Home Minister had announced the setting up of I4C in 2016 to deal with all types of cyber crime at the national level
  3. I4C will be set up under the newly created Cyber and Information Security (CIS) division of the MHA
  4. CIS will have four wings, namely security clearance, cybercrime prevention, cyber security and information security

Back2Basics

Budapest Convention

  1. The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations
  2. It was drawn up by the Council of Europe
  3. It was opened for signature in Budapest, on 23 November 2001 and it entered into force on 1 July 2004
  4. The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography, hate crimes, and violations of network security
  5. It also provides procedural law tools to make investigation of cybercrime and securing of e-evidence in relation to any crime more effective
  6. The convention allows  international police and judicial cooperation on cybercrime and e-evidence
  7. The Convention has 56 members, including the US and the UK

Data protection law on anvil

Note4students

Mains Paper 3: Internal Security | Basics of cyber security

From UPSC perspective, the following things are important:

Prelims level: Data protection law, Justice Srikrishna committee

Mains level: Apprehensions being raised about Aadhar and data security and steps being taken to resolve such issues


News

Government in the process of framing a data protection law

  1. With the country emerging as a big center of data analysis, the government was in the process of framing a data protection law
  2. The government had set up a committee headed by Justice Srikrishna, retired Supreme Court Judge, on the issue

No proposal to make internet a fundamental right

  1. The government was committed to providing Internet connectivity to all citizens
  2. This does not entail that internet availability will be made a fundamental right

For a safe cyberspace

Note4students:

 Mains paper 3:Internal Security| basics of cyber security

From UPSC perspective following things are important:

Prelims level: Ransomware

Mains level: This article deals with Why Cybersecurity in India needs to be integrated in every aspect of policy and planning. Cyber security is a hot topic in mains.Every year UPSC asks a question in it in mains.Even in 2017 mains they asked 1 question on Cybersecurity.


News:

Performance of India with respect to Digital and Knowledge-based economy

  1. India is one of the key players in the digital and knowledge-based economy, holding more than a 50% share of the world’s outsourcing market.
  2. Pioneering and technology-inspired programmes such as Aadhaar, MyGov, Government e-Market, DigiLocker, Bharat Net, Startup India, Skill India and Smart Cities are propelling India towards technological competence and transformation.
  3. India is already the third largest hub for technology-driven startups in the world and its Information and Communications Technology sector is estimated to reach the $225 billion landmark by 2020.

 Vulnerabilities of India with respect to cyberspace

  1. India is the fifth most vulnerable country in the world in terms of cybersecurity breaches.
  2. According to the Internal Security Threat Report of 2017 by Symantec. Till June 2017, 27,482 cybersecurity threats had been reported in the country.

Which Types of Attacks are most common in recent years?

  1. Ransomware attacks have been the most common in the last few years (Ransomware is a type of software that threatens to publish a person’s data or block it unless a ransom is paid).
  2. Apart from WannaCry and Petya, other Ransomware attacks that made news globally were Locky, Cerber, Bucbi, SharkRaaS, CryptXXX and SamSam.
  3. In India, in May 2017, a data breach at the food delivery App, Zomato, led to personal information of about 17 million users being stolen and put for sale on the Darknet. The company had to negotiate with the hacker in order to get it taken down.

Which devices are more vulnerable for attacks?

  1. While Windows operating systems were the most vulnerable to cyberattacks, a number of Android threats have been reported in the last couple of years, including potent crypto-ransomware attacks on Android devices.
  2. The attacks aren’t limited to mobile phones and e-Pads. All devices, including televisions that use Android, are also potentially vulnerable.
  3. In 2016, the first known Ransomware, named KeRanger, targeting Mac users was also reported.
  4. The Mirai botnet malware affected 2.5 million home router users and other Internet of Things devices

 

What should India do?

  1. Given the huge number of online users and continued efforts on affordable access, cybersecurity needs to be integrated in every aspect of policy and planning.
  2. India needs to quickly frame an appropriate and updated cybersecurity policy, create adequate infrastructure, and foster closer collaboration between all those involved to ensure a safe cyberspace.
  3. There is a need for a Geneva-like Convention to agree on some high-level recommendations among nations to keep the Internet safe, open, universal and interoperable.

B2B:

Read more about Ransomware: http://www.civilsdaily.com/op-ed-snap-held-to-ransomware/

 

 

[op-ed snap] The rise of the bots

Image source

Note4students

Mains Paper 3: Science & Technology | Awareness in the fields of IT, Space, Computers, robotics, nano-technology, bio-technology

From UPSC perspective, the following things are important:

Prelims level: Web crawlers, Malicious bot, Artificial intelligence, Siri, Alexa, Cortana

Mains level: Rising level of automation and its effects on jobs as well as overall economy


Context

What are bots?

  1. A bot is a computer programme designed to work automatically
  2. It is mainly used to gather information on the Internet or perform repetitive jobs

Are they good or bad?

Like for every technology, there are two sides to bots as well

  • Positives
  1. Gathering information- Bots in such guises are called web crawlers
  2. Another good use is automatic interaction using instant messaging, instant relay chat or other web interfaces
  3. Dynamic interaction with websites is yet another way bots are used for positive purposes
  • Negatives
  1. Malicious bot- Self-propagating malware that infects its host and connects back to a central server(s)
  2. Malicious bots can gather passwords, log keystrokes, obtain financial information, relay spam, and exploit back doors opened by viruses and worms, among other things
  3. Bots have also come under scrutiny in relation to automated accounts on Twitter and Facebook

Use of ‘Good’ bots

  1. Artificial intelligence-based bots are increasingly being used by organizations and entities to provide customer care, and sales and marketing services
  2. Some popular examples of bots are Apple’s Siri, the Google Assistant, Amazon’s Alexa and Microsoft’s Cortana

How do you know your computer is infected?

Symptoms mentioned below may indicate that your system is infected

  1. Slow Internet
  2. Crashing of computer for no apparent reason
  3. Pop-up windows and advertisements appearing even when a web browser is not being used
  4. Friends and family receiving emails you did not send
  5. A fan going into “overdrive” when the device is idle

Legal steps to guard digital payments

Note4students

Mains Paper 3: Basics of cyber-security

The following things are important from UPSC perspective:

Prelims: CERT-In.

Mains: This article discusses the trend of rise in the financial frauds post demonetization.


News

Context

  1. The Home Ministry has asked banks and e-wallet firms to furnish details of the extent of financial fraud reported in the past one year as digital transactions picked up post demonetization.
  2. The use of mobile wallets and online transactions has spiked since then.
  3. The Ministry convened a high-level committee to understand the extent of technological misuse and financial frauds committed through digital means.
  4. The Centre is planning to bring changes to the law to check frauds in the financial sector.

What does the data say?

  1. Representational data available with the RBI show that the value of prepaid payment instruments increased from Rs. 1,320 crore in November 2016 to Rs. 2,760 crore in September 2017.
  2. By an estimate of security agencies, nearly 10,000 fraud transactions are being reported every month through e-wallet platforms.
  3. Pre-demonetisation, the figure stood at 4,000.
  4. Approximately 45 lakh cybersecurity attacks were observed in the past three years.
  5. Information reported to, and tracked by, the Indian Computer Emergency Response Team (CERT-In) shows an increase in cybersecurity incidents.

Going unnoticed

  1. The extent of fraud is not known because many people do not report it as in some cases it is a small amount.
  2. The banks and e-wallet firms have been asked to furnish the data of the way it was being done.

 

The government has reviewed the preparedness of agencies to check financial cybercrimes, and asked security agencies to strengthen surveillance and legal frameworks to check the menace.


Back2basics

CERT-In( Indian Computer Emergency Response Team)

  1. It is a government mandated security organization.
  2. CERT-In was created by the Indian Department of Information Technology in 2004 and operates under the auspices of that department.
  3. According to the provisions of the Information Technology Amendment Act 2008, CERT-In is responsible for overseeing administration of the Act.
  4. The purpose of CERT-In is to respond to computer security incidents, report on vulnerabilities and promote effective IT security practices throughout the country.
  5. The Indian Computer Emergency Response Team (CERT-In) has signed cooperation pacts with its counterparts in various nations like in Malaysia, Singapore, Japan, UK etc. for cyber security.
  6. The Memoranda of Understanding (MoUs) will promote closer cooperation for exchange of knowledge and experience in detection, resolution and prevention of security-related incidents.                                                                                                                                                   

Centre backs local cybersecurity tech

Note4students

Mains Paper 3: Internal Security | Basics of cyber security

From UPSC perspective, the following things are important:

Prelims level:Read the attached story

Mains level: Important decision taken by the government. Also, the topic is specially mentioned in the syllabus, and is therefore, very important for the exam.


News

New Policy

  1. The government will soon announce a policy that accords preference in official procurement to ‘Made in India’ antivirus and cybersecurity solutions
  2. Why: To promote domestic technology and preventing data theft by foreign entities
  3. Preference for domestic products would also be given for cybersecurity products used by intelligence agencies

Draft notification by the Ministry of Electronics and Information Technology (MeitY)

  1.  MeitY has issued a draft notification which states “preference shall be provided by all procuring entities to domestically manufactured/ produced cybersecurity products
  2. The notification will cover all products and software used for maintaining confidentiality, availability and integrity of information by protecting computing devices from attack, damage, or unauthorized access

Who is ‘local supplier’?(according to the notification)

  1. The draft notification has defined ‘local supplier’ as a company incorporated and registered in India,
  2. Adding that revenue from the product and revenue from Intellectual Property licensing should accrue to the company

Govt plans Bill with more teeth to tackle cyber crimes

Note4Students

Mains Paper 3: Basics of cyber security

The following things are important from UPSC perspective:

Prelims: Inter Ministerial Committee.

Mains level: Steps being taken by the government to tackle rising number of cyber attacks post demonetization.


News

Context

Post-demonetization a spurt in number of cyber crimes has been observed-

  1.  In 2016-17, 998 crore digital transaction were reported as compared to 552 crore in 2015-16 and 369 crore in 2014-15.
  2.  As many as 1,44,496 cyber security attacks have been observed in the country in the past three years.
  3. CBI in December last year registered multiple FIRs after e-wallet company, Paytm filed a complaint, alleging that its customers were cheated to the tune of Rs 9.41 lakh soon after demonestisation.
  4. According to RBI data made available to the MHA, as many as 16,468 complaints related to ATM fraud, debit and credit card misuse and net banking hacking were filed with them in 2015-16 as compared to 13,083 in 2014-15.

So, in order to tackle these problems, the government plans to bring a digital payment Bill to strengthen legal framework and enhance surveillance to check cyber crimes in the financial sector, including frauds targeting cards and e-wallets.

  1. An inter-ministerial committee headed by the home minister will be setup to first study existing laws to deal with cyber crimes and then propose new legislation.
  2. The inter-ministerial panel will have representatives from the RBI, financial services, ministry of electronics and information technology, Delhi police and the National Cyber Security Coordinator.
  3. The proposed legislation will not only deal with punishment and fine but it will also have measures to fix responsibility in cases where digital transactions land in any dispute.
  4. The Home Minister directed all agencies concerned to take required measures in a time-bound manner and emphasized on the coordination of all agencies in this regard.

 Way Forward

To contain the rising number of cyber attacks-

·          Capacity building of various stakeholders — such as police, judicial officers, forensic scientists as well as officials in the banking sector should be focused upon and both legal and technological steps needs to be taken to address the problem.

 

Post data leakage reports: Govt seeks data security details from mobile makers

Image Source

Note4students

Mains Paper 2: Governance | Government policies and interventions for development in various sectors and issues arising out of their design and implementation.

From UPSC perspective, the following things are important:

Prelims level: CERT

Mains level: Strategically important step by government.


News

Direction to prevent leakage of data

  1. The Indian Computer Emergency Response Team (CERT-In) has written to all 21 smartphone manufacturers operating in the country, including Chinese firms
  2. Why: To seek details of safety and security practices, architecture, frameworks, and standards put in place by manufacturers
  3. It is done to prevent leakage of data from handsets used by consumers

Objective of the exercise

  1. Through this exercise the government aims to scrutinise in hardware component as well as preloaded software and apps to find potential loopholes

Why this step?

  1. The step has implemented due to various cases of contacts and text messages being leaked in India as well as abroad
  2. According to government officals, further steps could be taken to contain the overall threat arising from “increasing Chinese business interest” in India
  3. The government is also undertaking a review of import of electronics and other IT products from China on account of fears about security and data leakages

Centre unveils steps to boost cybersecurity

  1. What: In an attempt to strengthen cyber security in India, the government on Friday announced a slew of measures
  2. Measure: All organisations having a significant IT infrastructure will need to appoint cyber security officers
  3. Cert-In is being strengthened
  4. State Certs are being planned by Maharashtra, Tamil Nadu, Telangana, Kerala and Jharkhand
  5. Three sectoral Certs in power sector — generation, transmission and distribution, have been set up, in addition to the banking one
  6. Further,  a National cyber coordination center is being set up to provide near real time situational awareness and rapid response at a cost of Rs 985 crore

Customers must be doubly vigilant: Security experts

  1. Event: India has been hit by one of its biggest financial security breaches compromising hundreds of thousands of debit cards
  2. Who bears the loss: According to experts, all banks are intermediaries under the Income Tax Act
  3. Under Section 79 of the Act they are mandated to do due diligence
  4. In case banks are negligent in doing this, leading to a loss, it is the banks that will have to bear the brunt of the loss
  5. But a bank may not be liable if it asks the customer to change his or her PIN but the customer chooses to ignore the advice

RBI asks banks to replace 17.5 lakh debit cards

  1. The RBI has asked banks to replace debit cards whose security is suspected to have been compromised after being used in some ATM’s
  2. The issue was first suspected by payment gateways such as Visa, Mastercard and Rupay
  3. Cards falling in the suspicious category and needing replacement would number about 17.5 lakh
  4. Debit cards and credit cards face security issues when unauthorised parties access confidential details embedded in the card
  5. Such access could happen even as the card is being used in an ATM

[op-ed snap] Towards a database nation

  1. Theme: An increase in surveillance measures by the government without appropriate public debate.
  2. Surveillance Measures and information databases in question: The Central Monitoring System, The National Intelligence Grid and the Aadhaar.
  3. The Central Monitoring System (CMS) is scanning citizens’ communication in real time in Delhi and Mumbai and its reach will be expanded gradually.
  4. CMS enables law enforcement agencies to get near real-time access to intercepted communication without the involvement of the telecommunications service provider.
  5. This raises concerns of potential surveillance excesses by the government and private information of citizens falling in the wrong hands. But this system has never been discussed meaningfully with the public, and no efforts have been made to explain what safeguards prevent its misuse.
  6. The National Intelligence Grid (NATGRID) which links multiple government databases will be operational next year. NATGRID is classified among the ‘intelligence and security’ organisations and is exempted from the Right to Information Act.
  7. Also, it is not known whether Aadhaar, with its access to citizens’ biometric identification and its connection with various databases like banking, health etc , will be a part of NATGRID.
  8. Additionally, various critical services have been made contingent on Aadhaar numbers.
  9. Also, it does not offer adults a way to withdraw consent and does not offer the next generation the opportunity to reverse their parents’ decisions.
  10. There is no mechanism/obligation on the part of government to inform the concerned citizens when their data is breached.
  11. There is no clarity on security of these databases despite major data breaches having been reported from entities ranging from the U.K. government to Adobe, Sony and Ashley Madison.
  12. Also, there has been no discussion on the consequences of a data breach.

India’s quest for self-reliant communication

  1. In recent months, India has stepped up efforts to become self-reliant in its communication networks
  2. ISRO is soon expected to operationalise the Indian Regional Navigation Satellite System (operational name- NAVIC)
  3. The Indian Air Force had recently teamed up with NPL to improve the accuracy of their time-keeping systems and reduce error to the range of microseconds

Setting computers to IST is just a matter of time

  1. What? CSIR has formally proposed to the Central government that all Indian computers be legally required to synchronise their clocks to the IST
  2. Globally: All countries require their computer infrastructure to synchronise to their local times
  3. Why? The time displayed on laptops or smartphones is derived from multiple American servers & is a few seconds off from the actual Indian time
  4. The frequent mismatches in the time stamps make it harder for Indian cyber security experts to investigate Internet-perpetrated frauds

Discuss: Who defines the Indian Standard Time (IST)?

Cybercrimes have risen 4-fold in 3 years

  1. Study: ‘Protecting Interconnected Systems in the Cyber Era’ by PwC and Assocham
  2. Findings: The number of cybercrime cases registered in India has risen by 350% in the three-year period from 2011 to 2014
  3. Earlier, attacks have been mostly initiated from countries such as the U.S., Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE
  4. However, with the growing adoption of the Internet and smart-phones, India has emerged as one of the favourite countries among cyber criminals
  5. Cyber attacks around the world are occurring at a greater frequency and intensity
  6. A new breed of cyber criminals has now emerged, whose main aim is not just financial gains but also causing disruption and chaos to businesses in particular and the nation at large
  7. Attackers can gain control of vital systems such as nuclear plants, railways, transportation or hospitals that can subsequently lead to dire consequences

Cabinet approves cyber security deal with UAE

  1. News: MoU signed between India and United Arab Emirates (UAE) on Technical Cooperation in Cyber Space and Combating Cyber-Crime
  2. Objective: To cooperate in combating cybercrime in the wake of the serious security threat posed by it to safety of people
  3. Cooperation in: cyber space and combating cyber-crime in all forms, particularly through coordination and exchange of information in relation with cyber crime
  4. Nodal Agency: Ministry of Home Affairs (MHA)
PIB

Learn about Project Shield

  1. Context: Project Shield is free and aims to help independent news organisations to be able to continue their work without the fear of being shut down
  2. Origin: Project Shield came out of Google Ideas (now renamed Jigsaw)
  3. Uses: Was used by about 100 sites focused on topics like human rights, election monitoring and independent political news
  4. Infra: It used Google’s security infrastructure to detect and filter attacks on these websites
  5. It is not just about protecting journalism but also about improving the health of the Internet
  6. How? by mitigating against a significant threat for publishers and people who want to publish content that some might find inconvenient

Project Shield to protect news sites from attacks

  1. Context: Google said it will open its ‘Project Shield’ technology to protect news sites and portals
  2. Aim: Shield portals related to human rights from attacks that threaten free expression and access to information
  3. Debate: The move comes at a time when there is a raging debate globally about freedom of expression for media firms & around privacy and security in the era of social media

U.S. had cyber-attack plans for Iran’s Fordo

  1. Context: In early years, US developed an elaborate plan for a cyber-attack on Iran in case diplomatic effort to limit its nuclear programme failed and led to a military conflict
  2. The Plan: code named Nitro Zeus, was designed to disable Iran’s air defences, communications systems and key parts of its power grid
  3. Relevance: Nitro Zeus was part of an effort to assure President Obama that he had alternatives, short of a full-scale war, if Iran lashed out at the US or its allies in region
  4. Cyber Plan: To disable the Fordo nuclear enrichment site, which Iran built deep inside a mountain near the city of Qum
  5. Importance of Fordo: It has considered one of the hardest targets in Iran, buried too deep for all but the most powerful bunker-buster in U.S. arsenal

Obama launches cyber-security ‘action plan’

  1. The president has called for an overhaul of aging government networks and a high-level commission to boost security awareness
  2. The announcement responds to an epidemic of data breaches and cyber attacks on both government and private networks in recent years
  3. Under this plan, Mr. Obama has asked for $19 billion for cyber-security efforts, a 35% increase from current levels, with $3 billion earmarked
  4. To help modernise the patchwork of computer systems used in government agencies
  5. An executive order for creating a 12-member cyber-security commission to make recommendations to both the public and private sectors has also been issued

CERT-In signs cyber security pacts with 3 nations

  1. CERT-In is the nodal agency responsible for dealing with cyber security threats.
  2. The Indian Computer Emergency Response Team (CERT-In) has signed cooperation pacts with Malaysia, Singapore and Japan for cyber security.
  3. The MoUs will promote closer cooperation for exchange of knowledge and experience in detection, resolution and prevention of security-related incidents.

India to hire US, Israel cyber security firms for terror intel

The aim is to plug the holes in our cyber security apparatus.

  1. India to monitor communication between terror modules, block content meant for radicalising youths.
  2. India and Israel are working on a mechanism to encourage start‐ups from both countries to work on cyber security solutions.
  3. Indian cyber security market is still at a nascent stage – Rs. 1,500 Cr while Israel is the biggest player followed by US.

Lets see dimensions of Cyber Security

  1. The increase in the use of IT has led to threats at cyber space level, manifesting in various forms.
  2. Cyber Crime – It involves use of cyber space for economic crimes or causing serious harm to someone either physically or virtually.
  3. Cyber Terrorism – It involves use of cyber space by a terrorist organisation to spread its propaganda and recruit new members.
  4. Cyber Warfare – In involves a attack on critical information architecture of another country.

Cyber security is no longer just about protection

  1. The nature and scale of threats organisations are facing have changed the dimensions of cyber security.
  2. It’s no longer about protection alone, but also about hunting down new malware.
  3. The industry has moved from protection to threat defence lifecycle, which involves protection, detectionand correction.

Cybercrime hit half of India’s Net users: study

  1. The security services firm Norton says that nearly half of India’s netizens affected by cyber-crime during the past year.
  2. Despite the threat of cybercrime in India, it hasn’t led to widespread adoption of simple protection measures to safeguard information online.
  3. There are only 41% people who use a secure password, despite the concerns towards cybercrime.
  4. Besides the financial loss, there is an emotional impact as well.

India follows global trends in taking on cyber attacks


 

  1. The trend in increase in cyber attacks on Indian computer networks is similar to that worldwide.
  2. Most of these attacks originate from countries such as the U.S., Pakistan, China and Bangladesh.
  3. In case of an attack, CERT-In notifies the organisation concerned regarding the cyber attacks and requests for logs of network devices, servers and other related components for analysing the attacks and identifying sources of attack.
  4. CERT-In (the Indian Computer Emergency Response Team) is a govt. mandated IT security organization to respond to computer security incidents, report on vulnerabilities and promote effective IT security practices throughout the country.

MHA nod for cyber security wing under IB

  1. Creation of “cyber-security architecture” within the Intelligence Bureau (IB) that will work independently of the National Technical Research Organisation (NTRO), which works under the Prime Minister’s Office (PMO).
  2. In the past, it has been seen that cyberspace was used to recruit young people to join terrorist outfits like IS.
  3. The threat emanating from this medium is imminent and we require a dedicated team to crackdown on it.

A Cyber Wing in the National Cadet Corps

  1. The 2014 Annual Security Report reveals that 2013 was a ‘particularly bad year’ with cumulative annual threat alert levels increasing by 14% since 2012.
  2. The writer explores the possibility of creation of a ‘Cyber Wing’ in each the 4 divisions of the NCC in India.
  3. The motto of the NCC is Unity and Discipline.
  4. The cadets must be given encouragement by way of financial rewards, recognition, scholarships for further studies in cyber security.
  5. With programmes like Digital India, National Optical Fibre Network, e-Governance, e-commerce and e-Services, our vulnerability in cyberspace cannot be condoned.

Gulshan Rai takes charge as India’s first cyber security chief

  1. This new post was created in PMO and Rai is its first head.
  2. Prior to this appointment, he was Director-General Computer Emergency Response Team (CERT) at the Department of Electronics and Information Technology (DeitY).
  3. He also heads the E-Security and Cyber Law division in the Union Ministry of Communications and Information Technology.


:( We are working on most probable questions. Do check back this section.







Highest Rated App. Over 3 lakh users. Click to Download!!!