The document discusses cyber security cooperation between India and the United States. It outlines how the two countries signed an MOU to promote closer cooperation on cyber security issues and the timely exchange of cyber threat information. This agreement establishes best practices for cooperation between the two governments on technical and operational cyber security issues. The document also examines some of the challenges to achieving global cooperation on cyber security, such as the lack of common terminology, legal frameworks, and dismantling the perception of cyber security as a domestic issue only.
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide. M. Swetha | L. Prabha | S. Rajadharani "Cyber Security Intelligence" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29261.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29261/cyber-security-intelligence/m-swetha
O National Security Alliance’s (InSA) Cyber Council, organização norte-americana de inteligência e segurança, publica o primeiro de vários relatórios destinados a ampliar a visão dos tomadores de decisão da indústria e do governo sobre a importância do desenvolvimento de uma “inteligência cibernética”.
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide. M. Swetha | L. Prabha | S. Rajadharani "Cyber Security Intelligence" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29261.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29261/cyber-security-intelligence/m-swetha
O National Security Alliance’s (InSA) Cyber Council, organização norte-americana de inteligência e segurança, publica o primeiro de vários relatórios destinados a ampliar a visão dos tomadores de decisão da indústria e do governo sobre a importância do desenvolvimento de uma “inteligência cibernética”.
IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.
Technologies and Policies for a Defensible Cyberspacemark-smith
Whether curious or malicious hackers, organized criminals, or national spies or soldiers, for decades, those who want to use cyberspace to attack have held nearly all the cards. Cyber attack has been, for decades, far easier than cyber defense.
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Cybersecurity Risk Perception and CommunicationStephen Cobb
Research into Cultural Theory, White Male Effect, and more. We show high level of concern about cybercrime among US adults and first evidence of White Male Effect in cyber risk perception.
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
Managing High-Volume Cyber Attacks through Effective Strategies in Indonesia. Presentation at Cybersecurity for Government Asia Forum, Kuala Lumpur, January 2013
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order
IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.
Technologies and Policies for a Defensible Cyberspacemark-smith
Whether curious or malicious hackers, organized criminals, or national spies or soldiers, for decades, those who want to use cyberspace to attack have held nearly all the cards. Cyber attack has been, for decades, far easier than cyber defense.
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Cybersecurity Risk Perception and CommunicationStephen Cobb
Research into Cultural Theory, White Male Effect, and more. We show high level of concern about cybercrime among US adults and first evidence of White Male Effect in cyber risk perception.
Managing High-Volume Cyber Attacks Through Effective Strategies in IndonesiaYudhistira Nugraha
Managing High-Volume Cyber Attacks through Effective Strategies in Indonesia. Presentation at Cybersecurity for Government Asia Forum, Kuala Lumpur, January 2013
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
Given at SOURCE Boston 2013, this presentation is one of the only places you will find the conceptual and policy underpinnings of U.S. national cyber security and critical infrastructure protection efforts and information about the recent White House Cyber Executive Order
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INFORMATION SYSTEMS 1
Security and safety of the power grid and its related computer information systems
Name of the student:
Name of the institution:
There have been increased use and application of information and communication technologies in most of critical infrastructures and departments of the government. They have proved to be fundamentally significant in helping the various departments to carry out their daily activities with a lot of ease and proficiency. However, these systems have also opened quite a considerable unforeseen opportunity both positive and negative. The infrastructures have become highly efficient and flexible and this has been very beneficial to the people. On the other hand, there have been persistent problems with cybercrimes and hackers who have outsmarted the government and the set securities protocols every now and then. This has made the state lose billions of dollars in a theft of its secrets and high-level information. In this case, it is right to analyze all the general impacts that can be put in place to prevent cybercrimes as well as threats. It is hence important to validate all the necessary measures that need to be put in place in every organization. The paper will hence give recommendations that can help the named organization solve the issues mentioned.
To address this issue, proper precautions needs to be put in place. The government has to demonstrate preparedness in combating this crime both in terms of systems put in place and also the legal jurisprudence (Higgins, 2016). The US power grid system is an interconnected system that is made up of power generation, transmissions software, and its distribution with a capacity to bring down the whole economy if not well protected. The nation's department of defense (DoD) is one of the most critical and sensitive institutions that can paralyze the state if tampered with by unscrupulous individuals. The situation is even worse if there is an advanced persistent threat (APT) against computers and software that operates the western interconnection power grid. This needs an urgent measure to remove the threat immediately and avoid its reoccurrence. We recommend the following security and safety of the power grid and its related computer information systems are taken by the concerned departments:
a. Creation of a special branch that is specifically dedicated to cyber security
It is high time for the government to come up with a special branch of the military personnel that will be dedicated to fighting cybercrimes (Higgins, 2016). Its main function will be to detect cybercrime activities, to develop mechanisms to prevent cybercrimes, apprehend, arrest and align cyber criminals in a court of law.
b. Creation of special court to determine cybercrime cases
Security and safety of the power grid and its related computer information systems and those crimes associated w.
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
Brian Wrote :
There is a wide range of cybersecurity initiatives that exist on the international level through collaborative efforts between the Department of Homeland Security (DHS) and numerous organizational units (UMUC, 2012). According to UMUC (2012), some examples of these initiatives are:
· Federal Law Enforcement Training Center
· National Cyber Security Division
· National Communications System
· Office of Infrastructure Protection
· Office of Operations Coordination
· Privacy Office
· U.S. Secret Service
· U.S. Immigration and Customs Enforcement
· Organization of American States Assistance
“The National Cyber Security Division works to secure cyberspace and America’s cyber assets in cooperation with public, private, and international entities” (UMUC, 2012). This is done using several strategic plans and directives, such as the Presidential Decision Directive 7, the Information Technology Sector Specific Plan, the National Strategy to Secure Cyber Space, National Infrastructure Preparedness Plan, and the National Response Plan (UMUC, 2012). A challenge that the National Cyber Security Division faces in providing an effective deterrent to cybersecurity threats are the constant evolving technologies. These include for both good and bad. Cyber attacks are constantly evolving and so are the technologies use to protect from them. In order for the National Cyber Security Division to effectively deter them not only do they have to stay up-to-date but also so do all of the strategic plans and directives that they use.
Another initiative is the Federal Law Enforcement Training Center (FLETC) that emerged in the 1980s. This initiative puts forth “efforts to counter international hijackings and financial crimes” (UMUC, 2012). It now also extends law enforcement abroad to help against terrorist activity, international crime, and drug-trafficking (UMUC, 2012). It does those with the partner of Department of State. A challenge that the FLETC faces in providing an effective deterrent to cybersecurity threats are their international limitations. All though they have partnered abroad with select foreign nations they still have restrictions and limitations as to what exactly they can do.
Justin Wrote:
Mutual Legal Assistance Treaties (MLATs) are established between two or more nations and provide a formal means of exchanging evidence and information pertaining to criminal acts or cases that occur outside of a nation’s legal jurisdiction. The primary issue associated with MLATs and cybercrime is the inconsistency of host nation laws. Many nations feel that the idea of a global anti-crime initiative may contradict a nation’s fundamental principles (Finklea & Theohary, 2012, p.24). There is no standardized definition for cybercrime which means that one nation may view a virtual act as a crime and the other, with which the MLAT exists, may not. If the two nations agree on the legality of the act then the requesting nation may sub ...
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
Safeguarding the Digital Realm: The Importance of Cybersecurity
Introduction:
In our increasingly interconnected world, cybersecurity has emerged as a critical concern for individuals, organizations, and governments alike. The pervasive nature of technology and the rapid digitization of various sectors have brought about numerous benefits, but they have also introduced unprecedented risks and vulnerabilities. As cyber threats continue to evolve in sophistication and scale, it is crucial to understand the significance of cybersecurity and adopt effective measures to protect our digital infrastructure.
The Ever-Present Cyber Threat Landscape:
Cyberattacks come in various forms, including data breaches, malware infections, ransomware attacks, phishing scams, and more. The motives behind these attacks range from financial gain to espionage, activism, and even geopolitical warfare. The digital landscape is teeming with hackers, criminal syndicates, and state-sponsored actors who constantly seek to exploit vulnerabilities in computer systems and networks. The impact of successful cyberattacks can be devastating, causing financial losses, reputational damage, and compromising personal privacy.
Protecting Sensitive Data:
One of the primary objectives of cybersecurity is to safeguard sensitive information. This includes personal data, financial records, intellectual property, and classified government documents. Robust encryption algorithms, secure authentication protocols, and effective access controls are essential components of protecting data from unauthorized access. Additionally, data backup and disaster recovery strategies play a crucial role in ensuring that information remains intact and accessible even in the event of a breach.
Securing Critical Infrastructure:
Cybersecurity is not limited to protecting personal information or corporate data; it also extends to safeguarding critical infrastructure. Industries such as energy, transportation, healthcare, and finance heavily rely on interconnected networks to function effectively. A breach in these sectors could result in catastrophic consequences, ranging from power outages and disruptions in transportation systems to compromised patient records and financial instability. Consequently, robust cybersecurity measures must be implemented to protect these vital systems from malicious actors.
Building a Cyber-Resilient Culture:
While technological solutions play a significant role in cybersecurity, an equally important aspect is fostering a cyber-resilient culture. This involves educating individuals and organizations about the risks, promoting good cyber hygiene practices, and cultivating a mindset of vigilance. Regularly updating software, using strong and unique passwords, enabling multi-factor authentication, and being cautious of suspicious emails or links are some of the fundamental steps to bolster cybersecurity defenses. Organizations should prioritize employee training programs and e
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
A Time of Great Risk: The Time Between Compromise and Mitigation
In most organizations today, threat detection is based on various security sensors that attempt to look for anomalous behavior or for known signatures of malicious activity. These sensors include firewalls, intrusion detection/prevention systems (IDS/IPS), application gateways, anti- virus/anti-malware, endpoint protection, and more. They operate at and provide visibility into all layers of the IT stack.
talks about the present status of the cyber security in India. The policy of cyber security is also discussed. the general principles of the cyber security is highlighted.
Legal position of cyber security and instances of breach of information technology code is also discussed.
The Open Internet has demonstrated to be a powerful driver for social, technical and economic interaction. The success of the Internet is based on a number of Invariants[1], among which are Global connectivity and integrity, Accessibility, permissionless innovation, interoperability and mutual agreements. Those properties not only bring prosperity, they grow the attack surface too.
When it comes to Internet Security on a global scale the general approach to security may not be all that applicable. That general approach is usually inward facing: whereby actors look at their own assets and how to protect them in a way that makes economic sense.
Security policies are often premised at stopping bad things and not on what the properties are that need protected. When thinking about security for the Internet, then, individual actors also need an external perspective in order to trade off their actions towards the bigger internet: Collaborative Security.
Within that context we reflect on resiliency, about outward facing security, governance, and give some examples of collaborative security and the difficulty of them getting traction.
Running head: CYBER SECURITY
1
CYBER SECURITY/EMERGENCY MANAGEMENT POLICY
2
The term "Running head" is formatted as Running head:
Cyber Security/Emergency Management Policy
American Public University (EDMG 600)
Dr. Darrell Dantzler
05/09/2018
Cyber Security/Emergency Management Policy
Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters-essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics)
Part 1
After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cyber security/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cyber security issues at the state level.
Cyber Security
Cybercrimes are increasingly becoming more common in all sectors in the world. This has made cyber
security a top agenda for everyone in the world. This has resulted in the conventions and creation of agencies and structures that will facilitate cyber security (Deloitte-NASCIO. 2013, p 16).According to the author, a number of cyber laws have been formulated and more are being formulated to handle this challenge. For this matter, protecting our companies from various incidences of cyber-crimes, we will need to formulate clear and organised policies that will pit every structure in place to check the menace (Deloitte-NASCIO. 2013, p 34).Since internet is a gala for vast information in which everyone and business navigate through, with different intentions, protecting personal and company sensitive information is increasingly becoming a challenge (Moore et al., 2010, p 56). Cyber security policy will try to track the paths of the internet users in order to control their navigation and keep it on the recommended or acceptable tracks. Allowing internet users to deviate from the pre-determined and acceptable paths, as are stipulated in the policy, will lead to discrepancy in the use of information on the internet thus risking accessibility and sharing of sensitive information without permission (illegal). When personalised or sensitive information reached the public pages of the internet, it becomes irretrievable and loses secrecy. This is the major concern of most governments. Hackers have been able to exploit the Operating System (OS) of people’s computers, accessing and leaving the gathered information in the public dom ...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...greendigital
Introduction:
In an era dominated by digital innovation, the importance of cybersecurity cannot overstated. The threat landscape has evolved, with businesses, governments. and individuals relying on interconnected networks and digital platforms. This article aims to provide a comprehensive guide to cybersecurity solutions. exploring the current challenges, emerging trends. and practical strategies to safeguard against cyber threats.
Follow us on: Pinterest
I. Understanding the Cybersecurity Landscape:
A. The Evolution of Cyber Threats:
The cybersecurity landscape has seen a paradigm shift. with cyber threats becoming more sophisticated and diverse. From ransomware attacks to phishing schemes. understanding the different types of threats is crucial for developing robust cybersecurity solutions.
B. Impact on Businesses and Individuals:
The consequences of cyber threats extend beyond data breaches. Businesses face financial losses, reputational damage, and regulatory penalties. while individuals may experience identity theft and privacy violations. Examining the real-world impact highlights the urgency of implementing effective cybersecurity measures.
2. Key Components of Cybersecurity Solutions:
A. Endpoint Security:
This section delves into the importance of antivirus software, firewalls. and other endpoint protection measures.
B. Network Security:
Securing networks is paramount for preventing unauthorized access and protecting data in transit. Topics covered include firewalls, intrusion detection systems. and virtual private networks (VPNs), emphasizing the significance of a multi-layered defense approach.
C. Cloud Security:
With the proliferation of cloud services. ensuring data security stored in the cloud is critical. This section explores encryption, access controls. and other cloud security measures to mitigate risks associated with cloud-based solutions.
D. Application Security:
Cybercriminals often target applications as potential entry points. Discussing secure coding practices, penetration testing. and application firewalls sheds light on how organizations can fortify their applications against cyber threats.
E. Data Security:
Protecting sensitive data is at the core of cybersecurity. This section delves into encryption, data loss prevention (DLP), and secure data storage practices to safeguard information from unauthorized access.
3. Emerging Trends in Cybersecurity:
A. Artificial Intelligence and Machine Learning:
Integrating artificial intelligence (AI) and machine learning (ML) in cybersecurity solutions. revolutionizes threat detection and response. Explore how these technologies enhance the ability to identify anomalies. and predict potential threats.
B. Zero Trust Security Model:
The zero-trust model assumes that threats can originate within the network. and need verification from anyone trying to access resources. Discuss the principles and benefits of adopting a zero-trust approach.
C. Blockchain Technology:
The importance of understanding the global cybersecurity indexShivamSharma909
With the advent of modern technologies such as IoT, artificial intelligence, and cloud computing, there is a rapid increase in the number of interconnected devices globally. It has also increased the number of cyber-attacks and data breaches. As a result, cybercrime is a global concern, and appropriate solutions are essential if proper responses are to be found. The Global Cybersecurity Index (GCI) is one such instrument to control cybercrime and provide feedback.
https://www.infosectrain.com/blog/the-importance-of-understanding-the-global-cybersecurity-index/
Similar to Global Partnership Key to Cyber Security (20)
The importance of understanding the global cybersecurity index
Global Partnership Key to Cyber Security
1. Cover Story: InfoSecurity August 2011
Global Partnership Key to Cyber Security
With increasing incidents of Web defacements and cyber assaults no nation or enterprise can
choose to ignore cyber security. The only way out is to be highly prepared and take conclusive
proactive steps for any eventuality.
The United States and India signed a Memorandum of Understanding (MOU) on 19th July 2011
in New Delhi to promote closer cooperation and the timely exchange of information between the
organizations of their respective governments responsible for cyber security. This kick starts a
new beginning for India and United States and for the mutual co-operation for matters related to
cyber security.
A New Beginning
This brings to us a significantly major partnership with the United State in the fight against
cybercrime and all round concerns governing cyber security. The signed MoU according to press
release establishes best practices for the exchange of critical cyber security information and
expertise between the two governments through the Indian Computer Emergency Response
Team (CERT-In), Department of Information Technology, Ministry of Communications and
Information Technology, and DHS United States Computer Emergency Readiness Team (US-CERT).
Through this arrangement, the respective governments and broader cyber security
communities in both the United States and India will have the ability to co-ordinate with their
counterparts on a broad range of technical and operational cyber issues.
As declared recently by William Lynn, Deputy Defense Secretary, the United States already hold
international partnerships, including those with Australia, Canada, the United Kingdom and
NATO. The overarching US Department of Defence (DOD) strategy hinges on five strategic
pillars, including:
• The establishment of cyberspace as an operational domain like air, sea, land or space, and
organize, train and equip forces accordingly to perform cyber missions.
• The introduction and employment of new operating concepts on networks, including
active defenses using sensors, software and signatures.
• Partnership with the private sector and other government agencies, particularly the
Homeland Security Department, which is responsible for civilian network protection, to
protect critical infrastructure.
• The build-up of collective cyber defenses in coordination with U.S. allies and
international partners.
• Capitalisation of U.S. technological and human resources, including an exceptional cyber
workforce and rapid technological innovation.
Challenges to Global Co-operation
The MoU comes at a time when the Web is buzzing with multiple fringe hacktivists spread
across the globe. These include the well-known and most publicised groups such as Anonymous
2. and the self-disbanded group LulSec, who apparently has now joined the Anonymous team.
According to a report published by the East West Institute on International Pathways to Cyber
security are nine areas that need to be addressed by the international private and public sectors in
order to achieve international cooperation. The report states the following points worth
considering by CISOs of all the enterprises and the government officials.
• Education and Awareness: Awareness needs to reach “critical mass” in public perception
in order for it to become a pragmatic item of private and public sector agendas.
• Terminology: Defining and understanding various descriptions of the issues at hand,
whether seen as Cyber security (U.S.), Information Security (Russia), or Internet Security
(China).
• Creation of a sense and system of responsibility: Responsibility needs to be imbedded at
three levels (a) individual and corporate end users; (b) creators of technology and media;
(c) government.
• Understanding the end user as well as growth of new media and technology.
• Constant battle between security, privacy and freedom: Such matters will not have a one-off
solution. Decision makers will need to understand that in order to reach solutions
some compromises need to be made and balances struck among these three important
factors.
• Lack of legal framework: Lack of domestic legal frameworks will impede international
legal cooperation.
• Challenging human nature: By nature we have consistently reacted to threats once they
triggered specific actions. The decision-making and reaction mentality needs to keep
changing where we pro-actively address vulnerabilities before they are exercised by
threats.
• Dismantle the perception of domestic boundaries: Many treat cyber security as a
domestic issue, failing to understand that cyber security is a challenge that transcends all
borders and requires strong international dialogue, trust and cooperation.
• Economics: While the above aspects are considered, it is important to take into account
the economics behind achieving cyber security co-operation. Who will pay for security?
Can incentives be created for corporations and individuals?
State Sponsored Cyber Assault
The Pentagon recently disclosed of facing one of its largest losses ever of sensitive data in a
cyber-attack by a foreign government. This adds to the reason and need for a dedicated cyber
command unit. Just as India, the United States too has been assaulted and hacked multiple times
by various state-sponsored agents for as long as there have been avenues to do so - the
significance of this incident is the public acknowledgement of a state-player. It goes along with a
general escalation in cyber war rhetoric that began in earnest this spring, and seems to be part of
a strategy to dissuade such actions by tying cyber intrusions directly to kinetic military
responses. In India we are yet to have dedicated Cyber command though there are multiple
agencies and teams on passive and active monitoring. Telecom, BFSI, Power utility and other
major engineering networks should achieve more active sensing and response is also a
requirement. Where known threats are detected, it would be useful and strongly advisable to
deploy responses in near real time to protect mission essential services.
3. We need to ensure mission essential networks and network delivered services are assured. Post
hoc forensics, while important, cannot achieve that objective. Commercial IDS and IPS --
alongside detectors at network gateways and on other network attached devices must be
integrated into perimeter and defense in depth solutions.
Multiple Indian Government and private enterprise portals are defaced every month. It is yet to
be known and assessed on how many of those machines are injected with malwares. Cyber
awareness, situational awareness or any other way you put it, still boils down to creating new
terms that do nothing to protect anything that they are meant to do. What we need is leadership
instead of rhetoric. We need to raise the bar for educational institutes to begin pumping out the
right knowledge people, instead of those officials that sit there and go “yeah, we know how to do
it" and then continue to complicate things up.
Attention must be paid to the resiliency of systems at both critical infrastructure and defense
systems. First we need to agree on a definition of resiliency and then apply the management,
engineering and process practices needed to achieve it with a national objective and yet with
International partners.
National Cyber Security Management
There are some great lessons to be learned from some of the more tightly integrated system at
Ministry of Defence. Engines being the same old Ps- People and Process to manage technology.
Then in effect we may begin to synchronise our efforts across cyber intelligence and beyond.
This type of mechanism can cater for new data attributes to be collected and only the collection
hubs need modification. Also a vision is to have clustering hubs that collect all the data from the
collection hubs for wide angle analysis covering many spectrums for specific need and objective.
There are multiple ways of executing this but what is really needed is putting the right people
together in the right place with the right ideas and for it to be objective.
One of the things worth observing is whatever passive sensory equipment is deployed for
monitoring security related, information needs to be 100 percent passive and invasive, that which
cannot interfere with the equipment and or the machine being monitored. And high on the flag
list is if there is any shift in the data patterns should be considered an alert condition to health
check. Going into the technical details, it is also suggested to think of sensors on critical
infrastructure should be one way only, absolutely no inbound polling for data.
It is high time that the Government take proactive steps on various dimensions related to cyber
security. With a booming economy, destabilising the economy has a much greater impact than
someone trying to discern and decipher what the JSAP process is!
—By: Dominic K, Deputy Editor 'InfoSecurity' Bureau.