Cyber Security Strategies
Cyber Security Strategies
To design and implement a secure cyberspace, some stringent strategies have been put in place.
This chapter explains the major strategies employed to ensure cybersecurity, which include the
following −
This strategy explores the idea of having a strong and robust cyber-ecosystem where the cyber-
devices can work with each other in the future to prevent cyber-attacks, reduce their
effectiveness, or find solutions to recover from a cyber-attack.
Such a cyber-ecosystem would have the ability built into its cyber devices to permit secured ways
of action to be organized within and among groups of devices. This cyber-ecosystem can be
supervised by present monitoring techniques where software products are used to detect and
report security weaknesses.
Technical
Security
Affordability
Scalability
Interoperability
Comparison of Attacks
The following table shows the Comparison of Attack Categories against Desired Cyber
Ecosystem Capabilities −
Case Study
The following diagram was prepared by Guilbert Gates for The New York Times, which shows
how an Iranian plant was hacked through the internet.
Explanation − A program was designed to automatically run the Iranian nuclear plant.
Unfortunately, a worker who was unaware of the threats introduced the program into the
controller. The program collected all the data related to the plant and sent the information to the
intelligence agencies who then developed and inserted a worm into the plant. Using the worm,
the plant was controlled by miscreants which led to the generation of more worms and as a
result, the plant failed completely.
Types of Attacks
The following table describes the attack categories −
data-leakage attacks
spoofing
time-state attacks
Hacking
buffer and data structure attacks
resource manipulation
backdoors
exploitation of authentication
inciting phishing
Attacks such as −
network investigation
To cater to the national security requirements, a national framework known as the Cybersecurity
Assurance Framework was developed. It accommodates critical infrastructure organizations and
the governments through "Enabling and Endorsing" actions.
Enabling actions are performed by government entities that are autonomous bodies free from
commercial interests. The publication of "National Security Policy Compliance Requirements"
and IT security guidelines and documents to enable IT security implementation and compliance
are done by these authorities.
Endorsing actions are involved in profitable services after meeting the obligatory qualification
standards and they include the following −
ISO 27001/BS 7799 ISMS certification, IS system audits etc., which are essentially the
compliance certifications.
'Common Criteria' standard ISO 15408 and Crypto module verification standards, which
are the IT Security product evaluation and certification.
Indian IT/ITES/BPOs need to comply with the international standards and best practices on
security and privacy with the development of the outsourcing market. ISO 9000, CMM, Six Sigma,
Total Quality Management, ISO 27001 etc., are some of the certifications.
Existing models such as SEI CMM levels are exclusively meant for software development
processes and do not address security issues. Therefore, several efforts are made to create a
model based on self-certification concept and on the lines of Software Capability Maturity Model
(SW-CMM) of CMU, USA.
The structure that has been produced through such association between industry and
government, comprises of the following −
standards
guidelines
practices
These parameters help the owners and operators of critical infrastructure to manage
cybersecurity-related risks.
Link-Oriented Measures
It delivers security while transferring data between two nodes, irrespective of the eventual source
and destination of the data.
End-to-End Measures
It is a medium for transporting Protocol Data Units (PDUs) in a protected manner from source to
destination in such a way that disruption of any of their communication links does not violate
security.
Association-Oriented Measures
Association-oriented measures are a modified set of end-to-end measures that protect every
association individually.
Data Encryption
It defines some general features of conventional ciphers and the recently developed class of
public-key ciphers. It encodes information in a way that only the authorized personnel can
decrypt them.
Similarly, there is no law for obligatory e-delivery of public services in India. And nothing is more
hazardous and troublesome than executing e-governance projects without sufficient
cybersecurity. Hence, securing the e-governance services has become a crucial task, especially
when the nation is making daily transactions through cards.
Fortunately, the Reserve Bank of India has implemented security and risk mitigation measures for
card transactions in India enforceable from 1st October, 2013. It has put the responsibility of
ensuring secured card transactions upon banks rather than on customers.
It is in demand that the government works with business owners and operators to reinforce their
services and groups by sharing cyber and other threat information.
A common platform should be shared with the users to submit comments and ideas, which can
be worked together to build a tougher foundation for securing and protecting critical
infrastructures.
The government of USA has passed an executive order "Improving Critical Infrastructure
Cybersecurity" in 2013 that prioritizes the management of cybersecurity risk involved in the
delivery of critical infrastructure services. This Framework provides a common classification and
mechanism for organizations to −
Categorize and prioritize chances for development within the framework of a constant
process, and