National Cybersecurity Policy 2013
National Cybersecurity Policy 2013
National Cybersecurity Policy 2013
POLICY,2013”
SESSION 2024-2025
DEPARTMENT OF POLITICAL SCIENCE
J.S.HINDU P.G. COLLEGE ,AMROHA
SUBMITTED TO SUBMITTED BY
1
CERTIFICATE
SIGNATURE:
NAME : DR MANMOHAN SINGH
DESIGNATION: HOD/INRG
DEPARTMENT: POLITICAL SCIENCE
COLLEGE : J.S. HINDU (P.G.)COLLEGE
AMROHA AFFILIATED TO M.J.P.ROHAILKHAND
UNIVERSITY ,BAREILLY
2
DECLARATION
Signature:
3
ACKNOWLEDGEMENT
TANZEEM
M.A 3rd SEMESTER POLITICAL SCIENCE
4
SR CHAPTERIZATION PAGE
NO NO.
1. INTRODUCTION 6
8. GLOBAL IMPLICATIONS 10
15. CONCLUSION 15
5
INTRODUCTION
The National Cyber Security Policy is a policy framework developed by the
Department of Electronics and Information Technology that aims to protect public and
private infrastructure from cyber attacks. The Policy also intends to protect
"information, such as personal information (of web users), financial and banking
information, and sovereign data of the country." The Ministry of Communications and
Information Technology, Government of India, defines the objectives of the National
Cyber Security Policy as creating a secure cyber ecosystem in the country, generating
adequate trust and confidence in I.T. systems and transactions in cyberspace, and thus
increasing the adoption of I.T. in all sectors of the economy.
For the purpose of this paper, “international cyber operation” refers to the use of cyber
capabilities with the intention of advancing the defensive or offensive strategic
objectives of a country or to project power in and through foreign cyberspace by
“[compromising] the confidentiality, integrity, or availability of an adversary’s
information technology systems or networks; devices controlled by these systems or
networks; or information resident in or passing through these systems or networks”.
6
diplomacy places strong emphasis on upgrading skills and capacity; exchange and
sharing of information and providing partner countries with access to technology for
their national development.
Its main priorities include fostering strategic engagement with key partners and
international organizations for enabling capabilities to respond to cyberattacks; and to
jointly collaborate with partner countries to guarantee international security and a
safe, secure cyberspace.
The Indian government aims to create and develop solid safeguards through dynamic
policies to enhance the protection of India’s cyber ecosystem. India has borne the brunt
of several cross-border cyber-attacks in the recent past – a direct threat to India’s
internal security. International collaboration is one way of securing cyberspace.
The government’s Cyber Surakshit Bharat Initiative aims to raise domestic awareness
about cyber crimes and create safety measures. It also seeks to focus on “skill
development and training” in the next 4 to 5 years, for the creation of a talent pool of
500,000 IT professionals, having specialized knowledge and expertise in cyber security
aspects. The public, telecom companies and other stakeholders are constantly notified of
the need to use IT-enabled products from trusted sources only.
Agencies like the Defence Cyber Agency (DCyA) and the Indian Computer Emergency
Response Team (CERT-In) have set up response systems to counter cyber threats,
besides identifying vulnerable sectors in the country’s cyberspace. These and other allied
agencies are also responsible for the Protection of Critical Infrastructure, conducting
round-the-clock surveillance, and installing data encryption and data recovery systems
to safeguard against cyber-hacks.
7
o The purpose of this Policy is to provide individuals, companies, and the
Government with a secure and dependable cyberspace. It also strives to monitor,
protect, and enhance cybersecurity defences.
8
o After Galway, China already attacked India’s energy network and attempted to
enter the National Security Adviser in 2010. These attempts have had a
profound influence on India’s view of national security.
o To build a safe cyber environment in the country, develop appropriate trust and
confidence in I.T. systems and cyberspace transactions, and so increase I.T.
adoption in all sectors of the economy.
9
GLOBAL IMPLICATIONS
Data protection and data privacy are critical issues in international relations, more so
given the rapid expansion of cyber-space, the proliferation of global cyber activity
across geographical boundaries, and the ever-increasing number of multinational
technology companies.
Hostile hackers, spammers, and cybercriminals, who are a serious threat globally, have
upped the ante, by resorting to cyber-attacks, ransomware attacks, identity theft, and
data breaches – acts that cripple critical systems and cause heavy financial losses. Many
other aspects of cyber fraud like money laundering and terrorist financing, seriously
impact international banking, financial services and corporate business deals.
Mercenary elements in the form of Cyber hackers often operate with impunity under the
guise of nation-states, posing serious risks to global security. Economically weaker and
lower-middle-income countries are more susceptible to cyber-intrusions which could
potentially have disastrous consequences for their weak fledgling economies.
Given the sheer magnitude and global spread of such cyber-attacks, it is difficult to
precisely measure their disastrous impact. Yet there are estimations that cybercrime
around the world amounts to trillions of dollars in losses annually to the global
economy.
Fortunately, in recent times, there is growing recognition of the need to tackle this
menace head-on. Governments around the world now invest more time, resources and
funds in upgrading cyber-security systems and building safeguards to reduce the risks.
Emphasis is laid on the protection of Intellectual property and combating security
threats like financial frauds emanating from foreign lands. New technologies are being
leveraged to augment global security and protection of national assets by improving
defences against cyber threats.
10
The biggest challenge facing cyber security diplomacy is the lack of uniform laws and
clear-cut legal guidelines on data protection in different countries around the world.
Questions get raised about the legitimacy, legality and jurisdiction of any potential
measures envisaged under a common international cyber law.
While countries like the United States, Australia and The Netherlands rank high on
the Global Cybersecurity Index (GCI), India figures very low in the pecking order.
India lags primarily due to a dearth of critical infrastructure, under-achievement and
gaps in adopting the “Digital Economy” and lack of robust, enforceable government
regulations on cybersecurity.
The 2001 Budapest Convention on Cybercrime is a criminal justice treaty that aims to
help countries investigate and prosecute cybercrime while providing a framework for
international cooperation between police and judicial systems on issues of Copyright
infringement, Computer-related fraud, Online Child pornography, and Network
security violations. It attempts to harmonize national laws through international
cooperation.
India has also been part of the Quad cybersecurity partnership and has supported
initiatives on Secure Software, Cybersecurity of Critical Infrastructure, Supply Chain
Resilience and Security.
Earlier this year, SIA India entered a collaborative partnership with ISAC – an
international cybersecurity foundation.
11
MAIN COMPONENTS OF THE NATIONAL CYBER
SECURITY STRATEGY
National cybersecurity strategies (NCSSs) are the primary documents used by
national governments to establish strategic directives, goals, and specific actions
to reduce cybersecurity risk. This section describes the Main Components of the
National Cyber Security Strategy for a deeper understanding of cyber security
strategy
o India’s cyber security responses to attacks have been reacted to in a reactive and
fragmented manner. Delays have serious consequences for India’s digital
revolution, diplomatic efforts, and domestic privacy.
o While India’s cyber security activities have primarily been defensive, the
Government has also established capabilities for aggressive endeavours. There
are already ways for both defensive and aggressive cyber reactions.
o WhatsApp sued Israeli surveillance firm N.S.O. Group, saying that the business
enabled clients to use malware to get access to the phones of over 1,400
customers, including those in India. Journalists and political opponents were
among those targeted by the hack.
13
financially targeted assaults in India, Bangladesh, and other South Asian
nations.
o Through its upcoming National Cyber Security Policy, India has the potential
to integrate its domestic Policy with its global goals.
14
norms encourage ethical conduct of cyber activities, and collaborate in resolving
crises triggered by hostile cyber acts. The last word on CS must be left to the
renowned cyber expert James Scott who once said – “There’s no silver
bullet with cybersecurity; a layered defence is the only viable
option.”
CONCLUSION
The Government is concerned about increasing cyber risks and vulnerabilities as
India’s population and government services become more online. This fear
prompted numerous ministries to take action. However, India’s cyber security
system has a long way to go. While India’s primary reaction to cyberattacks has
been to conduct audits and strengthen network security, a national Cyber
Security Policy might establish a more comprehensive framework that can be
used consistently across the country. Launching an updated and comprehensive
national Cyber Security Policy is critical.
15