PolicyEnforcement
Sanjay Sahay, IPS.,
ADGP, Police Computer Wing,
Bangalore
PEOPLE
PROCESSES
TECHNOLOGY
Cyber threats
• Target hacked
compromised up to 40
million steal encrypted
personal identification numbers
• Google to Pay...
Critical Infrastructure
• Critical infrastructures
banking financial
telecommunications energy
transmission
interconnectiv...
eGovernance
Critical infrastructure
• Users are more vulnerable
Spear
Phishing Social Engineering attack
organization level security awareness
training
Role Based
• Priviledged users
• Normal users
• System
administrators
• System developers
• Information security
• Awarene...
National Cyber Security Policy 2013
DSCI Analysis
National Cyber Security Policy 2013
a drop down
or
bottoms up
• Enhanced Security Awareness
• Adoption of Security Policy
• The capability and effectiveness of the Govt. reach
would be...
ThankYou!
Cyber Security
Cyber Security
Cyber Security
Cyber Security
Upcoming SlideShare
Loading in …5
×

Cyber Security

1,414 views

Published on

Cyber Security

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,414
On SlideShare
0
From Embeds
0
Number of Embeds
246
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber Security

  1. 1. PolicyEnforcement Sanjay Sahay, IPS., ADGP, Police Computer Wing, Bangalore
  2. 2. PEOPLE PROCESSES TECHNOLOGY
  3. 3. Cyber threats • Target hacked compromised up to 40 million steal encrypted personal identification numbers • Google to Pay $17M Settlement Over Secret Safari UserTracking $17 million settlement secretly circumvented Safari's default privacy settings to plant cookies
  4. 4. Critical Infrastructure • Critical infrastructures banking financial telecommunications energy transmission interconnectivity the Internet
  5. 5. eGovernance Critical infrastructure
  6. 6. • Users are more vulnerable Spear Phishing Social Engineering attack organization level security awareness training
  7. 7. Role Based • Priviledged users • Normal users • System administrators • System developers • Information security • Awareness trainers Frequency • Regular • Content updation • Security bulletin • Security Alerts
  8. 8. National Cyber Security Policy 2013 DSCI Analysis
  9. 9. National Cyber Security Policy 2013 a drop down or bottoms up
  10. 10. • Enhanced Security Awareness • Adoption of Security Policy • The capability and effectiveness of the Govt. reach would be decided by its capability of creating right IT tools and deliver secure services
  11. 11. ThankYou!

×