- Introduction
- Types of Security Threats
- Conventional cyber crimes
- Cyber warfare and its examples
- Cyber terrorism
- Cyber terror: Some Example
- Why we need to regulate Cyber space
- Tool to protect against Cyber Threats
- Cyber Laws in India
- Ongoing efforts in India
- Stakeholder Agencies in India
- Intergovernmental organizations and
Initiatives
- Conclusion
Introduction :Cyberspace is such
a term, which is not yet completely defined and also has no geographical
limitation. It is a term associated with application of the Internet worldwide.
It is also called as a virtual space as physical existence of cyberspace is not
detectable at all. Cyberspace is “the total interconnectedness of human beings
through computers and telecommunication without regard to physical geography.”
Information through computers is
transferred in the form of Ones (1) and Zeros (0), which do not inherently
carry any separate information along with them for authentication. For
authentication purposes, additional information needs to be carried with
cyberspace transactions for identity purposes.
Providing extra information in
digital communication introduces the possibility for identity theft. Because
nothing prevents the transmission of false identity information, or the
duplication of another’s identity information.
The seriousness of this problem is
highlighted when you consider that future technologies will allow extremely
important identifiers, such as a retinal scan or a fingerprint, to be
represented digitally. These biometrics characteristics are protected in real
space because they are embedded in the physical body of the person. This is
lost in cyberspace. Thus, cyberspace needs a system that allows individuals to verify
their identities to others without revealing to them the digital representation
of their identities.
Types of Security threats :Cyber crimes consist of specific crimes dealing with computers and networks, such as hacking, phishing and the facilitation of traditional crime through the use of computers (child pornography, hate crimes, telemarketing/internet fraud). A brief introduction to some common cyber related violations, or cyber crimes as they are more commonly referred to are discussed below:
Hacking
Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian legal
perspective there is no difference between the term hacking and cracking. Every act
committed towards breaking into a computer and/or network is hacking. Hackers write
or use ready-made computer programs to attack the target computer.
Child Pornography
The Internet is extensively used for
sexual abuse of children. As more homes have access to internet, more children
are accessing it and this enhances their vulnerability of falling victims to
the aggression of paedophiles. Paedophiles (a person who is sexually attracted
to children) lure the children by distributing pornographic material and then
pursue them for sexual exploitation. Sometimes paedophiles contact children in
chat rooms posing as teenagers or a children of similar age, they win the
confidence of these children, then induce them into sexually provocative
discussions. Then begins the actual exploitation of children.
Cyber Stalking
This term is used to refer to the use
of the internet, e-mail, or other electronic communications devices to stalk
another person. Cyber stalking can be defined as the repeated acts of
harassment or threatening behaviour of the cyber-criminal towards the victim by
using internet services.
Denial of Service
This is a technology driven cyber
intrusion, where by the influencer floods the bandwidth or blocks the user’s
mails with spam mails depriving the user, access to the Internet and the
services provided therefrom. A DoS Attack (as it is commonly known) can be
perpetrated in a number of ways.
Dissemination of
Malicious Software (Malware)
Malware is defined as a software
designed to perform an unwanted illegal act via the computer network. It could
be also defined as software with malicious intent. Malware can be classified
based on how they get executed, how they spread, and/or what they do. Some of
them are discussed below.
(a) Virus
A virus is a program that can infect other programs by modifying them to include a possible evolved copy of itself. A virus can spread throughout a computer or network using the authorization of every user using it to infect their program. Every program so infected may also act as a virus and thus the infection grows. Viruses normally affect program files, but in some cases they also affect data files disrupting the use of data and destroying them completely.
A virus is a program that can infect other programs by modifying them to include a possible evolved copy of itself. A virus can spread throughout a computer or network using the authorization of every user using it to infect their program. Every program so infected may also act as a virus and thus the infection grows. Viruses normally affect program files, but in some cases they also affect data files disrupting the use of data and destroying them completely.
(b) Worms
Worms are also disseminated through computer networks, unlike viruses, computer worms are malicious programs that copy themselves from system to system, rather than infiltrating legitimate files. For example, a mass mailing e-mail worm is a worm that sends copies of itself via e-mail. A network worm, on the other hand makes copies of itself throughout a network, thus disrupting an entire network.
Worms are also disseminated through computer networks, unlike viruses, computer worms are malicious programs that copy themselves from system to system, rather than infiltrating legitimate files. For example, a mass mailing e-mail worm is a worm that sends copies of itself via e-mail. A network worm, on the other hand makes copies of itself throughout a network, thus disrupting an entire network.
(c) Trojans
Trojan is another form of Malware, trojans do things other than what is expected by the user. Trojan or trojan horse is a program that generally impairs the security of a system. Trojans are used to create back-doors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network.
Trojan is another form of Malware, trojans do things other than what is expected by the user. Trojan or trojan horse is a program that generally impairs the security of a system. Trojans are used to create back-doors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network.
Unlike viruses, Trojan horses do
not replicate themselves but they can be just as destructive. One of the most
insidious types of Trojan horse is a program that claims to rid your computer
of viruses but instead introduces viruses onto your computer.
(d) HoaxHoax is an e-mail that warns the user of a certain system that is harming the computer. The message thereafter instructs the user to run a procedure (most often in the form of a download) to correct the harming system. When this program is run, it invades the system and deletes an important file.
(e) Spyware
Spyware invades a computer and, as its name implies, monitors a user’s activities without consent. Spywares are usually forwarded through unsuspecting e-mails with bonafide e-mail i.ds. Spyware continues to infect millions of computers globally.
Spyware invades a computer and, as its name implies, monitors a user’s activities without consent. Spywares are usually forwarded through unsuspecting e-mails with bonafide e-mail i.ds. Spyware continues to infect millions of computers globally.
Phishing
Phishers lure users to a phony web
site, usually by sending them an authentic appearing e-mail. Once at the fake
site, users are tricked into divulging a variety of private information, such
as passwords and account numbers
Data Related :
Data
interception –Hijacking e-mails, interference of an intermediary in the network, may
be a prelude to another type of computer crime, typically data modification.
Data
diddling: –Usually done in conjunction with data interception, valid data intended for
a recipient is hijacked or intercepted and then is replaced with an erroneous
one. This could also apply to illegal tapping into database and altering its
contents. Basically, any form of alteration without appropriate authorization
falls under this category.
Data theft -outright
stealing of most commonly classified or proprietary information without
authorization. This could be the result of data interception. It might also be
the unlawful use or possession of copyrighted works such as songs, pictures,
movies or other works of art.
Network Related :
Network
interference -any activity that causes the operation of a computer network to be
temporarily disrupted. Interference implies something momentarily such as
Denial of Service Attacks that causes delays in data transmission by using up
all available bandwidth. Distributed denial of service, ping of death and smurf
attacks also fall under this category.
Data Security
Network sabotage – causing permanent damage to a computer network such as deleting
files or records from storage.
Conventional cyber
crimes :
Cyber Defamation
Defamation comprises of both libel
(defamation by means of writing) and slander (defamation by speaking). After
the popularity of the printing press, one witnessed the increase in libel. With
the advent of information technology and the Internet, libel has become much
more common and of course, easier.
In simple words, it implies
defamation by anything which can be read, seen or heard with the help of
computers/technology. Since the Internet has been described as having some or
all of the characteristics of a newspaper, a television station, a magazine, a
telephone system, an electronic library and a publishing house, there are
certain noticeable differences between online and offline attempt of defamation
which makes the online defamation more vigorous and effective.
Corporate Cyber
Smear
Harmful and defamatory online message
has been termed as corporate cyber smear. It is a false and disparaging rumour
about a company, its management or its stock that is posted on the Internet.
This kind of criminal activity has been a concern especially in stock market
and financial sectors where knowledge and information are the key factors for
businessmen.
Digital Forgery
Forgery is creation of a document
which one knows is not genuine and yet projects the same as if it is genuine.
Digital forgery implies making use of digital technology to forge a document.
Desktop publishing systems, colour laser and ink-jet printers, colour copiers,
and image scanners enable crooks to make fakes, with relative ease, of cheques,
currency, passports, visas, birth certificates, ID cards, etc.
Online Gambling
Gambling is in many countries
illegal. Computer is a medium for the purposes of online gambling. The act of gambling
is categorised as an offence in some countries and has a legal sanctity in
others. The main concern with online gambling is that most virtual casinos are
based offshore making them difficult to regulate.
It is in this situation that the
Internet helps the gamblers to evade the law. Anyone with access to a personal
computer and an Internet connection can purchase lottery tickets or visit
gambling sites anywhere in the world. The world of online gambling, due to its
anonymity, unfortunately has many other hazards like danger of illegal use of
credit card or illegal access to bank account.
Online sale of
illegal articles
There are certain articles like
drugs, guns, pirated software or music that might not be permitted to be sold
under the law of a particular country. However, those who would want to sell
such articles find Internet a safe zone to open up online shops. There are
specific concerns with regard to increase in online sale of drugs.
The sale of illegal articles on the
Internet is also one of those computer crimes where the computer is merely a
tool to commit the crime
E-mail spamming/
e-mail bombing
Spam refers to sending of unsolicited
messages in bulk. Technically, it overflows the limited-sized memory by
excessively large input data. In relation to e-mail accounts, it means bombing
an e-mail account with a large number of messages maybe the same or different
messages
Spam is an unsolicited message
requiring one’s time and effort to get rid off. A regular supply of such spam
messages would naturally result in considerable annoyance. It would also
directly hamper the interest of the user in his electronic mailbox where he
does not expect any interference and encroachment. The result, apart from loss
of Internet working hours and thwarting one’s regular e-mail stream, could be
one of mental agony and distress.
Cyber Warfare and
its example :Cyber warfare is Internet-based conflict involving politically motivated attacks
on information and information systems. Cyber warfare attacks can
disable official websites and networks, disrupt or disable essential services,
steal or alter classified data, and cripple financial systems.
In 2010, Stuxnet, which was designed to attack industrial programmable logic controllers was directed against the Iranian nuclear programme. Since the discovery of the Stuxnet malware, other “cyber weapons” have made their appearance.
The Duqu worm was discovered in
September 2011, followed in quick succession by the Mahdi, Gauss and Flame
malware. Flame,
Duqu and Gauss shared similar digital
DNA with Stuxnet with primary purpose seemed to be espionage (spying), with
their targets ranging from banking to governmental to energy networks.
Flame’s capabilities
ranged from recording Skype conversations and downloading information from
smart phones to more mundane activities such as recording audio, screenshots,
keystroke and network traffic recording.
The Mahdi Trojan
seemed to have spread via phishing
emails even though its purpose was also apparently espionage. Infections were
reported from Iran, Israel, Afghanistan, the United Arab Emirates, Saudi
Arabia, Syria, Lebanon and Egypt.
Wiper, a new virus
was reported in April 2012 that was
much more malicious, and wiped off the data on all computers that it infected.
This virus largely affected networks in Iran.
The Shamoon virus
is reported to have wiped off the
data from 30,000 computers of the Saudi Arabian State oil company, Aramco,
followed a week later by a similar episode on the networks of the second largest
LNG company in the world, Ras Gas of Qatar.
In what has become the norm for such
cyber-attacks, despite intense investigations by anti-virus companies, the
origins of the malware have remained largely in the realm of speculation and
inference.
While ownership of the Stuxnet (and
by inference, its cousins Duqu, Flame and Gauss) malware was claimed by the
Obama Administration for electoral purposes, the Shamoon virus is speculated to
be a reverse-engineered version of the Wipe virus unleashed by hackers loyal to
the Iranian regime. Tit-for-tat attacks look set to become the norm as the
countries of the region secure up their cyber space.
In another incidence, it was reported
that the Chinese Intelligence Agencies may have planted Malware in Computers
and broken into the Headquarters of 33 Corps, Indian Army formation looking
after most of the North-Eastern border with China. The Cyber Intrusion also
planted a Trojan Horse to give Chinese Agencies remote access to the computer
network at the 33 Corps Headquarters in Sukhna, near Siliguri, West Bengal.
Cyber war would not actually be war
because there aren’t loss of human lives, but analyzing these incidents and the
continuous discoveries of malicious state-sponsored malware, it is possible to
understand the great activities in cyberspace and related unpredictable
repercussions on civil and military infrastructures.
Cyber Terrorism :
‘Cyber terrorism is the convergence
of terrorism and cyber space. It is generally understood to mean unlawful
attacks and threats of attacks against computers, networks, and information
stored therein when done to intimidate or coerce a government or its people in
furtherance of political or social objectives.
Further, to qualify as cyber
terrorism, an attack should result in violence against persons or property or
at least cause enough harm to generate fear. Attacks that lead to death or
bodily injury, explosions, plane crashes, water contamination or severe
economic loss would be examples. Serious attacks against critical infrastructures
could be acts of cyber terrorism depending upon their impact. Attacks that
disrupt nonessential services or that are mainly a costly nuisance would not.
Cyber-terrorism can also be
understood as “the use of computer network tools to shut down critical national
infrastructures (such as energy, transportation, government operations) or to
coerce or intimidate a government or civilian population.” A hostile nation or
group could exploit these vulnerabilities to penetrate a poorly secured
computer network and disrupt or even shut down critical functions.
Cyber terror: Some
examples :
Middle East Tension
Sparks Cyber Attacks
With the Middle East Conflict at a
very heated moment between bordering countries Pro-Palestinian and Pro-Israel
Cyber Groups have been launching an offensive against websites and mail
services used by the political sectors the opposing groups show support for.
The attacks had been reported by the NIPC (National Infrastructure Protection
Center) in October of 2000 to U.S. Officials. The attacks were a volley of
email floods, DoS attacks, and ping flooding of such sites as the Israel
Foreign Ministry, Israeli Defense Forces, and in reverse, sites that belonged
to groups such as Hamas and Hezbollah.
Pakistan/India
Conflict
As tensions between the neighboring
regions of India and Pakistan over Kashmir grew over time, Pro-Pakistan
cyber-terrorists and recruited hackers began to target India’s Internet
Community. Just prior to and after the September 11 attacks, it is believed
that the sympathizers of Pakistan (which also included members of the Al Qaeda
Organization) began their spread of propaganda and attacks against Indian
Internet based communities. Groups such as G-Force and Doctor Nuker have
defaced or disrupted service to several major entities in India such as the Zee
TV Network, The India Institue of Science and the Bhabha Atomic Research
Center which all have political ties.
Retaliation in
China
In May 1999 the accidental bombing of
a Chinese embassy in Yugoslavia by U.S. Bombers, led to a massive web site
defacement and e-mail bombardment attack on American companies and agencies.
Pro-Chinese hackers and political groups executed the attacks to gain sympathy
for the Chinese cause.
US Government sites such as the U.S.
Departments of Energy and the Interior, and the National Park Service were all
hit and had web sites defaced along with the White House web site. The site was
downed for three days by continual e-mail bombing. Although the attack was
rather random and brief and affected a small number of U.S. sites, the effects
could have been worse.
Tamil Tiger Attempt
In 1998, with surges of violence
committed in Sri Lankan over several years, attacks in cyber-space were the
next area to target. The group known as the Tamil Tigers, a violent guerrilla
organization, bombarded Sri Lankan embassies with over 800 e-mails a day. This
was carried out over a two week period. The attacked the e-mail message
conveyed the message, “We are the Internet Black Tigers and we’re doing this to
disrupt your communications.” After the messages created such major disruption
the local Intelligence authorities were dispatched to investigate. The
authorities declared the attack as the first known attack on the Sri Lankan by
the terrorists on any computer system in the nation.
ISIS
Recent activities of ISIS in Middle
East and series of videos released by them are potential cyber terrors. They
are using Cyber space for their propaganda and for influencing vulnerable
people to join ISIS. It is threat to the world and the way they are growing
needs global cooperation to check them before they create havoc.
Why we need to
regulate Cyberspace :There has been a rapid increase in the use of the
online environment where millions of users have access to internet resources
and are providing contents on a daily basis.
The use of internet particularly for the distribution of obscene, indecent and pornographic content. The use of internet for child pornography and child sexual abuse and the relative ease with which the same may be accessed calls for strict regulation.
The use of internet particularly for the distribution of obscene, indecent and pornographic content. The use of internet for child pornography and child sexual abuse and the relative ease with which the same may be accessed calls for strict regulation.
The increasing business transaction
from tangible assets to intangible assets like Intellectual Property has
converted Cyberspace from being a mere info space into important commercial
space. The attempt to extend and then protect intellectual property
rights online will drive much of the regulatory agenda and produce
many technical methods of enforcement.
The major area of concern where some
sort of regulation is desirable is data protection and data
privacy so that industry, public administrators, netizens, and
academics can have confidence as on-line user.
Internet has emerged as the ‘media
of the people’ as the internet spreads fast there were changes in the
press environment that was centered on mass media. Unlike as in the established
press, there is no editor in the Internet. People themselves produce and
circulate what they want to say and this direct way of communication on
internet has caused many social debates. Therefore the future of Cyberspace
content demands the reconciliation of the two views of freedom of
expression and concern for community standards.
Another concern is that, money
laundering, be ‘serious crime’ becomes much simpler through the use of
net. The person may use a name and an electronic address, but there are no
mechanisms to prove the association of a person with an identity so that a
person can be restricted to a single identity or identity can be restricted to
a single person. Therefore Cyberspace needs to be regulated to curb this
phenomenon.
Tools to protect against cyber threats :Other than the general use of antivirus, firewalls & gateways, strong passwords, secure wi-fi connection, training to netizen, etc. there are few other practise which keeps our data and network safe from cyber threats. Some of them are mentioned below:
Digital Signatures
A Digital Signature is a technique by
which it is possible to secure electronic information in such a way that the
originator of the information, as well as the integrity of the information, can
be verified. This procedure of guaranteeing the origin and the integrity of the
information is also called Authentication.
The authenticity of many legal,
financial, and other documents is determined by the presence or absence of an
authorized handwritten signature. For a computerised message system to replace
the physical transport of paper and ink documents handwritten signatures have
to be replaced by Digital Signatures.
A digital signature is only a
technique that can be used for different authentication purposes. For an
E-record, it comes functionally very close to the traditional handwritten
signatures. The user himself/ herself can generate key pair by using specific
crypto software. Now Microsoft IE and Netscape, allow the user to create his/
her own key pair. Any person may make an application to the Certifying
Authority for issue of Digital Signature Certificate.
Encryption
One of the most powerful and
important methods for security in computer systems is to encrypt sensitive
records and messages in transit and in storage. Cryptography has a long and
colourful history. Historically, four groups of people have used and
contributed to the art of Cryptography, the military, the diplomatic corps,
diarists, and lovers. The military has had the most sensitive role and has
shaped the field.
At present, information and data
security plays a vital role in the security of the country, the security of the
corporate sector and also of every individual, working for personal benefit.
The message or data to be encrypted, also known as the plaintext, is
transformed by a function that is parameterized by a KEY. The output of the
encryption process, known as the cipher text, is then transmitted through the
insecure communication channel. The art of breaking ciphers is called
cryptanalysis. The art of devising ciphers (cryptography) and breaking them
(cryptanalysis) is collectively known as cryptology. It is done with the help
of algorithms, few of them are- The Secret-Key Algorithm, Data Encryption
Standard (DES, Public Key Algorithms, RSA Algorithm, etc.
Security Audit
A security audit is
a systematic evaluation of the security of a company’s
information system by measuring how well it conforms to a set of established
criteria. It is to find out the vulnerabilities that an organization is facing
with its IT infrastructure. A thorough audit typically assesses the security of
the system’s physical configuration and environment, software, information
handling processes, and user practices.
Cyber Forensics
Cyber Forensics is a very important
ingredient in the investigation of cyber crimes. Cyber forensics is the
discovery, analysis, and reconstruction of evidence extracted from any element
of computer systems, computer networks, computer media, and computer
peripherals that allow investigators to solve a crime.
Principal concerns with computer
forensics involve imaging storage media, recovering deleted files, searching
slack and free space, and preserving the collected information for litigation
purposes.
The other concern is network
forensics, is a more technically challenging aspect of cyber forensics. It
gathers digital evidence that is distributed across large-scale, complex
networks.
E-discovery investigation
includes areas like
money laundering, corruption, financial frauds, cyber crimes, serious frauds
and white collar crimes investigation, etc. Presently e-discovery
services in India are in infancy stage and this is the reason
why many cases of corporate frauds and cyber crimes remain unreported.
Cyber Laws in India :The first
technology based law in India was the Indian Telegraph Act of 1885. This law
was framed with the advent of the telegraph and later covered yet another
advance in technology, the telephone.
In the domain of technology driven law falls the Information Technology Act, 2000.While the Information Technology Act is the most significant Act addressing conduct in cyberspace in India, there are a whole lot of other Acts that would apply to govern and regulate conduct and transactions in cyberspace.
Take for instance online contracts.
Apart from the relevant provisions of the IT Act, the Indian Contract Act, the
Sale of Goods Act, 1930 etc. would be relevant to determine the legality of
such contracts.
Further the provisions of the Competition
Act, 2002 or in case of unfair trade practices, the Consumer Protection Act
1986, would also be relevant.
Protection of intellectual property
available on the Internet is one of the greatest challenges of the day. Be it
books, films, music, computer software, inventions, formulas, recipes,
everything is available on the net. Protection of copyrights trademarks online
would entail the invocation of the Indian Copyright Act and, the Trade Marks
Act.
As far as illegal activities on the
net are concerned, apart from specific provisions in the IT Act that penalizes
them, a whole gamut of other Acts would govern them. For instance in case of an
Internet fraud, based on the nature of the fraud perpetrated, Acts such as the
Companies Act, 1956, the
Thus it can be inferred that while
the IT Act is the quintessential Act regulating conduct on the Internet based
on the facts of a case or the nature of a transaction, several other Acts may
be applicable. Therefore, cyber laws includes the whole set of legislation that
can be applied to determine conduct on the Internet.
Information
Technology Act, 2000 :The Information Technology Act, 2000 intends to
give legal recognition to e-commerce and e-governance and facilitate its
development as an alternate to paper based traditional methods. The Act has
adopted a functional equivalents approach in which paper based requirements
such as documents, records and signatures are replaced with their electronic
counterparts.
The Act seeks to protect this
advancement in technology by defining crimes, prescribing punishments, laying
down procedures for investigation and forming regulatory authorities. Many
electronic crimes have been bought within the definition of traditional crimes
too by means of amendment to the Indian Penal Code, 1860. The Evidence Act,
1872 and the Banker’s Book Evidence Act, 1891 too have been suitably amended in
order to facilitate collection of evidence in fighting electronic crimes.
The IT act has been amended in 2008
and its important provisions can be read
here- http://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008
National Cyber security Policy, 2013
:In light of the growth of IT sector in the country, the National
Cyber Security Policy of India 2013 was announced by Indian Government in
2013 yet its actual implementation is still missing. As a result
fields like e-governance and e-commerce are still risky and may
require cyber insurance in the near future. Its important features
include:
- To build secure and resilient cyber space.
- Creating a secure cyber ecosystem, generate
trust in IT transactions.
- 24 x 7 NATIONAL CRITICAL INFORMATION
INFRASCTRUCTURE PROTECTION CENTER (NCIIPC)
- Indigenous technological solutions (Chinese
products and reliance on foreign software)
- Testing of ICT products and certifying them.
Validated products
- Creating workforce of 500,000 professionals in
the field
- Fiscal Benefits for businessman who accepts
standard IT practices, etc.
Ongoing efforts in
India :
The government has conducted several
awareness and training programmes on cyber crimes for law enforcement agencies
including those on the use of cyber Forensics Software packages and the
associated procedures with it to collect digital evidence from the scene of
crime.
Special training programmes have also
been conducted for the judiciary to train them on the techno-legal aspects of
cyber crimes and on the analysis of digital evidence presented before them.
Both the CBI and many state police organizations are today geared to tackle
cybercrime through specialised cyber crime cells that they have set up.
Cyber security initiatives and
projects in India are very less in numbers. Even if some projects have been
proposed, they have remained on papers only.
The list is long but sufficient is to
talk about the projects like National Critical Information Infrastructure Protection Centre (NCIPC)
of India, National Cyber Coordination Centre (NCCC) of India, Tri Service
Cyber Command for Armed Forces of India, Cyber Attacks
Crisis Management Plan Of India, etc. None of them are
“Coordinating” with each other and all of them are operating in different and
distinct spheres. Recently, the National Technical Research Organization (NTRO)
was entrusted with the responsibility to protect the critical ICT
infrastructures of India.
India has already launched
e-surveillance projects like National Intelligence Grid (NATGRID), Central Monitoring System (CMS), Internet Spy System Network and
Traffic Analysis System (NETRA) of India, etc. None of them
are governed by any Legal Framework and none of them are under Parliamentary Scrutiny. Thus, these projects are violate
of Civil Liberties Protection in
Cyberspace and provisions of
National Informatics Centre (NIC)
has been formed which provides network backbone Manages IT services, E -GOV
initiatives to central and state governments.
Stakeholder agencies in India :Countering cyber crimes is a coordinated effort on the part of several agencies in the Ministry of Home Affairs and in the Ministry of Communications and Information Technology. The law enforcement agencies such as the Central Bureau of Investigation, The Intelligence Bureau, state police organizations and other specialised organizations such as the National Police Academy and the Indian Computer Emergency Response Team (CERT-In) are the prominent ones who tackle cyber crimes. We will see about of few of them:
1. National Information Board (NIB)
National Information Board is an apex
agency with representatives from relevant Departments and agencies that form
part of the critical minimum information infrastructure in the country.
2. National Crisis Management Committee (NCMC)
2. National Crisis Management Committee (NCMC)
The National Crisis Management
Committee (NCMC) is an apex body of Government of India for dealing with major
crisis incidents that have serious or national ramifications. It will also deal
with national crisis arising out of focused cyber-attacks.
3. National
Security Council Secretariat (NSCS)
National Security Council Secretariat (NSCS) is the apex agency looking into the political, economic, energy and strategic security concerns of India and acts as the secretariat to the NIB.
4. Department of
Information Technology (DIT)
Department of Information Technology
(DIT) is under the Ministry of Communications and Information Technology,
Government of India. DIT strives to make India a global leading player in
Information Technology and at the same time take the benefits of Information
Technology to every walk of life for developing an empowered and inclusive
society. It is mandated with the task of dealing with all issues related to
promotion & policies in electronics & IT.
5. Department of
Telecommunications (DoT)
Department of Telecommunications
(DoT) under the Ministry of Communications and Information Technology,
Government of India, is responsible to coordinate with all ISPs and service
providers with respect to cyber security incidents and response actions as
deemed necessary by CERT-In and other government agencies. DoT will provide
guidelines regarding roles and responsibilities of Private Service Providers
and ensure that these Service Providers are able to track the critical optical
fiber networks for uninterrupted availability and have arrangements of
alternate routing in case of physical attacks on these networks.
6. National Cyber
Response Centre – Indian Computer Emergency Response Team (CERTIn)
CERT-In monitors Indian cyberspace and coordinates alerts and warning of imminent attacks and detection of malicious attacks among public and private cyber users and organizations in the country. It maintains 24×7 operations centre and has working relations/collaborations and contacts with CERTs, all over the world; and Sectoral CERTs, public, private, academia, Internet Service Providers and vendors of Information Technology products in the country.
CERT-In monitors Indian cyberspace and coordinates alerts and warning of imminent attacks and detection of malicious attacks among public and private cyber users and organizations in the country. It maintains 24×7 operations centre and has working relations/collaborations and contacts with CERTs, all over the world; and Sectoral CERTs, public, private, academia, Internet Service Providers and vendors of Information Technology products in the country.
7. National
Information Infrastructure Protection Centre (NIIPC)
NIIPC is a designated agency to
protect the critical information infrastructure in the country. It gathers
intelligence and keeps a watch on emerging and imminent cyber threats in
strategic sectors including National Defence. They would prepare threat
assessment reports and facilitate sharing of such information and analysis
among members of the Intelligence, Defence and Law enforcement agencies with a
view to protecting these agencies’ ability to collect, analyze and disseminate
intelligence.
8. National
Disaster Management of Authority (NDMA)
The National Disaster Management
Authority (NDMA) is the Apex Body for Disaster Management in India and is
responsible for creation of an enabling environment for institutional
mechanisms at the State and District levels.
9. Standardization,
Testing and Quality Certification (STQC) Directorate
STQC is a part of Department of
Information Technology and is an internationally recognized Assurance Service
providing organization. It has also established a test/evaluation facility for
comprehensive testing of IT security products as per ISO 15408 common criteria
security testing standards.
10. The Cyber
Regulations Appellate Tribunal
The Cyber Regulations Appellate
Tribunal has power to entertain the cases of any person aggrieved by the Order
made by the Controller of Certifying Authority or the Adjudicating Officer. It
has been established by the Central Government in accordance with the
provisions contained under Section 48(1) of the Information Technology Act,
2000.The body is quasi-judicial in nature
Intergovernmental Organisations and initiatives :
Intergovernmental organisations and
initiatives. Here we will see in brief, an overview of intergovernmental bodies
and initiatives currently addressing cyber security at the policy level.
Council of Europe.
The Council of Europe helps protect
societies worldwide from the threat of cybercrime through the Budapest
Convention on Cybercrime, the Cybercrime Convention Committee (T-CY) and
the technical co-operation Programme on Cybercrime. The Budapest
Convention on Cybercrime was adopted on 8 November 2001 as the first
international treaty addressing crimes committed using or against network and
information systems (computers). It entered into force on 1 July 2004.
Internet Governance Forum (IGF)
The IGF was established by the World
Summit on the Information Society in 2006 to bring people together
from various stakeholder groups in discussions on public policy issues relating
to the Internet. While there is no negotiated outcome, the IGF informs and
inspires those with policy making power in both the public and private sectors.
The IGF facilitates a common
understanding of how to maximise Internet opportunities and address risks and
challenges. It is convened under the auspices of the Secretary-General of the
United Nations.
Its mandate includes the discussion of
public policy issues related to key elements of Internet governance in order to
foster the sustainability, robustness, security, stability and development of
the Internet.
United Nations (UN)
The International Telecommunication
Union (ITU) is the specialized agency of the United Nations which is
responsible for Information and Communication Technologies.
ITU deals also with adopting international standards to ensure seamless global communications and interoperability for next generation networks; building confidence and security in the use of ICTs; emergency communications to develop early warning systems and to provide access to communications during and after disasters, etc.
ITU deals also with adopting international standards to ensure seamless global communications and interoperability for next generation networks; building confidence and security in the use of ICTs; emergency communications to develop early warning systems and to provide access to communications during and after disasters, etc.
Conferences on
CyberspaceThe London Conference on Cyberspace51 (1-2 November 2011) was meant to
build on the debate on developing norms of behavior in cyberspace, as a
follow-up to the speech given by UK Foreign Minister Hague at the Munich
Security Conference in February 2011 which set out a number of “principles”
that should underpin acceptable behavior on cyberspace.
Meridian ProcessThe Meridian
process aims to provide Governments worldwide with a means by which they can
discuss how to work together at the policy level on Critical Information
Infrastructure Protection (CIIP). Participation is open to all countries and
targets senior level policymakers. An annual conference and interim activities
are held each year to help build trust and establish international relations
within the membership to facilitate sharing of
NETmundial Confrence
In reaction to spying and surveillance activity by National security agency of USA through PRISM, NETmundial – Global Multistakeholder Meeting on the Future of Internet Governance(23 April 2014 – 24 April 2014) was organized in a partnership between the Brazilian Internet Steering Committee and /1Net, a forum that gathers international entities of the various stakeholders involved with Internet governance. This meeting focused on the elaboration of principles of Internet governance and the proposal for a roadmap for future development of this ecosystem.
In reaction to spying and surveillance activity by National security agency of USA through PRISM, NETmundial – Global Multistakeholder Meeting on the Future of Internet Governance(23 April 2014 – 24 April 2014) was organized in a partnership between the Brazilian Internet Steering Committee and /1Net, a forum that gathers international entities of the various stakeholders involved with Internet governance. This meeting focused on the elaboration of principles of Internet governance and the proposal for a roadmap for future development of this ecosystem.
Conclusion :
Community in cyberspace is based on
the interaction between people. Cyberspace has an important social aspect to it
that must not be overlooked. Cyberspace can be treated as a channel touching
portion of real space at key points. Ideas are passed through the channel, and
business is transacted through this channel. The cyberspace communities are
members of the global community interacting on a different plane than in real
space.
With the huge growth in the number of
Internet users all over the world, the security of data and its proper
management plays a vital role for future prosperity and potentiality. It is
concerned with people trying to access remote service is that they are not authorized
to use.
Rules for compulsory wearing of
helmet for bikers by government authorities, has no benefit for them, it is for
our own safety and life. Same we should understand our responsibilities for our
own cyber space and should at least take care of safety for our personal
devices. These steps include installation of antivirus software and keeping it
updated, installing personal firewalls and keeping rules updated. We should
monitor and archive all security logs.
We should have backup of important data.
Our devices should be protected by passwords and there should be restricted
access to sensitive data on our devices. And above all, we should aspire for
more computer literacy to understand the safety issues related to our cyber
space. At the same time we need to utilise the specialisation of private sector
in the field of cyber security and government should promote more PPP projects
for the national cyber space.