SlideShare a Scribd company logo
NATIONAL CYBER SECURITY POLICY
“FOR SECURE COMPUTING ENVIRONMENT AND
ADEQUATE TRUST & CONFIDENCE IN ELECTRONIC
TRANSACTIONS ”
IT’S A CYBER GENERATION NOW DUDE!!!
LOOK N LAUGH!!!!
GROUP MEMBERS:
 Aadesh Rai
 Ajay Jha
 Anu Jain
 Dipak Zala
 Jaykrishnan VK
 Omprakash Singh
 Pooja
 Remya P
 Renbi Jami
 Supriya Sarkar
GLIMPSE OF CYBER SECURITY POLICY
 Headed by a national cyber security coordinator, who reports to the
NSA, the policy has three components that demarcate task and
authority. The existing Indian Computer Emergency Response Team
(CERT-IN) will be tasked to handle the commercial aspects of cyber
security, including 24x7 proactive responses to hackers, cyber-attacks,
intrusions and restoration of affected systems.
 As of now, cyber criminals seem to have no real threat of prosecution.
Our job is to create a climate of fear of effective prosecution, as in
other types of crime.
 For the first time since the advent of dedicated computer networks in
the Indian government, the National Security Council Secretariat
(NSCS) has come up with a comprehensive cyber security policy for
upgrading the security of systems and preventing them from being
hacked, attacked with malware, or intruded upon.
WHY THIS POLICY IS REQUIRED?
 To Prevent cyber attacks against the country’s critical
information infrastructures
 To Reduce national vulnerability to cyber attacks
 To Minimize damage and recovery time from cyber attacks
 For creation of a technical-professional body that certifies the
security of a network to ensure the overall health of government
systems.
 While NSCS is advocating that initially the certification of
networks could be done by private agencies, the long term plan
is to create a technical body of professionals, all under 40, who
will form the backbone of Indian cyber security.
WHY CYBER SECURITY HAS BECOME ESSENTIAL NOW?
 Mischievous activities in cyber space have expanded from
novice geeks to organized criminal gangs that are going Hi-tech
 Growing threat to national security - web espionage becomes
increasingly advanced, moving from curiosity to well-funded
and well-organized operations aimed at not only financial, but
also political or technical gain
 Increasing threat to online services – affecting individuals and
industry because of growth of sophistication of attack
techniques
 Emergence of a sophisticated market for software flaws – that
can be used to carry out espionage and attacks on Govt. and
Critical information infrastructure. Findings indicate a blurred
line between legal and illegal sales of software vulnerabilities
• Internet has become an weapon for political, military and economic
espionage
• Organized cyber attacks have been witnessed in last few years
• Pentagon, US in 2007
• Estonia in April 2007
• Computer systems of German Chancellery and three Ministries
• E-mail accounts at National Informatics Centre, India
• Highly classified Govt. computer networks in New Zealand &
Australia
• The software used to carry out these attacks indicate that they were
clearly designed & tested with much greater resources than usual
individual hackers
• Most Govt. agencies and companies around the world use common
computing technologies & systems that are frequently penetrated by
criminal hackers and malware
• Traditional protective measures are not enough to protect against
attacks such as those on Estonia, as the complexity and coordination
in using the botnets was totally new. National networks with less
sophistication in monitoring and defense capabilities could face
serious problems to National security
• Online services are becoming prime targets for cyber criminals
• Cyber criminals continue to refine their means of deceit as well as their
victims In summary, the global threats affecting users in 2008 are:
• New & sophisticated forms of attacks
• Attacks targeting new technologies, such as VoIP (vishing –
phishing via VoIP & phreaking – hacking tel networks to make
free long distance calls) and peer-to-peer services
• Attacks targeting online social networks
• Attacks targeting online services, particularly online banking
services
• There is a new level of complexity in malware not seen before. These
are more resilient, are modified over and over again and contain
highly sophisticated functionality such as encryption (Ex. Nuwar also
known as ‘Zhelatin’ and ‘Storm’ worm’ – with a new variant
appearing almost daily)
• As a trend we will see an increase in threats that hijack PCs with bots.
Another challenging trend is the arrival of self-modifying threats
• Given the exponential growth in social networking sites, social
engineering may shortly become the easiest & quickest way to commit
ID theft
WHO IS RESPONSIBLE FOR ENSURING VIRTUAL SPACE FREE
OF CYBER THREAT?
 Government
 Private sector
 Users
 Academicians
ACTION NEEDEDTOBE TAKEN AT DIFFERENT LEVELS
At country level:
 Policy directives on data security and privacy protection -
Compliance, liabilities and enforcement (ex. Information
Technology Act 2000)
 Standards and guidelines for compliance (ex: ISO 27001, ISO
20001 & CERT-In guidelines)
 Conformity assessment infrastructure (enabling and
endorsement actions concerning security product – ISO 15408,
security process – ISO 27001 and security manpower – CISA,
CISSP, ISMS-LA, DISA etc.)
 Security incident - early warning and response (National cyber
alert system and crisis management)
• Information sharing and cooperation (MoUs with vendors and
overseas CERTs and security forums).
• Pro-active actions to deal with and contain malicious activities on
the net by way of net traffic monitoring, routing and gateway
controls
• Lawful interceptions and Law enforcement.
• Nation wide security awareness campaign.
• Security research and development focusing on tools, technology,
products and services.
ACTIONS AT NETWORK LEVEL
 Compliance to security best practices (ex. ISO27001), service quality
(ISO 20001) and service level agreements (SLAs) and demonstration.
 Pro-active actions to deal with and contain malicious activities,
ensuring quality of services and protecting average end users by way
of net traffic monitoring, routing and gateway controls
 Keeping pace with changes in security technology and processes to
remain current (configuration, patch and vulnerability management)
 Conform to legal obligations and cooperate with law enforcement
activities including prompt actions on alert/advisories issued by CERT-
In.
 Use of secure product and services and skilled manpower.
 Crisis management and emergency response.
ACTIONS AT CORPORATE LEVEL:
 Compliance to security best practices (ex. ISO27001), and demonstration.
 Pro-active actions to deal with and contain malicious activities, and
protecting average end users by way of net traffic monitoring, routing
and gateway controls
 Keeping pace with changes in security technology and processes to
remain current (configuration, patch and vulnerability management)
 Conform to legal obligations and cooperate with law enforcement
activities including prompt actions on advisories issued by CERT-In.
 Use of secure product and services and skilled manpower.
 Crisis management and emergency response.
 Periodic training and up gradation of skills for personnel engaged in
security related activities
 Promote acceptable users’ behavior in the interest of safe computing
both within and outside.
ACTIONS AT SMALL USER LEVEL:
 Maintain a level of awareness necessary for self-protection.
 Use legal software and update at regular intervals.
 Beware of security pitfalls while on the net and adhere to security
advisories as necessary.
 Maintain reasonable and trust-worthy access control to prevent
abuse of computer resources
HOW THIS POLICY CAN CHECK CYBER CRIMES?
BY FACILITATING INTERNATIONALCOOPERATIONARRANGEMENTS
 It is an inevitable reality that some countries will become safe havens for
cyber criminals and international pressure to crack down won’t work.
 It is believed that in next few years Govts are likely to get aggressive
and pursue action against the specific individuals/groups/companies,
regardless of location
 It is also likely that Govts will start putting pressure on intermediary
bodies that have the skills and resources, such as banks, ISPs and
software vendors to protect the public from malware, hacking and social
engineering
 We may see industry sector codes of practice demanding improved
security measures, backed probably by assurance and insurance
schemes
 Greater connectivity, more embedded systems and less obvious
perimeters
 Compliance regulations will drive upgrades and changes and also
increase system complexity and legal wrangles – increase in civil suits
for security breaches
 Massive data storing patterns that ensure data never goes away – a
boon to law enforcement agencies
• Enabling Govt. as a key stakeholder in creating appropriate
environment/conditions by way of policies and legal/regulatory
framework to address important aspect of data security and privacy
protection concerns. National Cyber Security policy will ensure
amendments to Indian IT Act and designing security and privacy
assurance framework, crisis management plan (CMP) etc.
• Enabling User agencies in Govt. and critical sectors to improve the
security posture of their IT systems and networks and enhance their
ability to resist cyber attacks and recover within reasonable time if
attacks do occur. Formulation of security standards/ guidelines,
empanelment of IT security auditors, creating a network & database of
points-of-contact and CISOs of Govt & critical sector organizations for
smooth and efficient communication to deal with security incidents and
emergencies, CISO training programs on security related topics and
CERT-In initiatives, cyber security drills and security conformity
assessment infrastructure covering products, process and people.
• Enabling CERT-In to enhance its capacity and outreach and to
achieve force multiplier effects to serve its constituency in an
effective manner as a `Trusted referral agency’. Specific actions
include – National cyber security strategy (11th Five Year Plan),
National Cyber Alert system, MoUs with vendors, MoUs with CERTs
across the world, network of sectoral CERTs in India, membership
with international/regional CERT forums for exchange of
information and expertise & rapid response, targeted projects and
training programs for use of and compliance to international best
practices in security and incident response.
• Public Communication & Contact programs to increase cyber
security awareness and to communicate Govt. policies on cyber
security.
SUGGESTIONS FOR FORTIFICATION OF CYBER SECURITY POLICY:
 Social economic political and technological background should be
taken into account while finalizing this policy.
 As India is a developing country hence it should be considered not
in continuum with developed world while finalization of this policy.
 Short and long term consistent realistic objectives should be there in
the policy.
 Fundamental root issues should be addressed in order to be able to
sustain secondary issues.
 Policy should consider available resources and their budgeting to
support the short and long term objective.
 Policy should not be static in nature. So as to be tuned to the
changing needs. There must be a provision for a constant review in
order to improve the policy and remove the impediments if any.
FINALLY IT IS REQUIRED TO CREATE A SECURITY ASSURANCE
LADDER!!!
 Security control emphasis depends on the kind of environment
• Low risk : ‘Awareness’ – know your security concerns and
follow best practices
• Medium risk: ‘Awareness & Action’ – Proactive strategies
leave you better prepared to handle security threats and
incidents
• High risk: ‘Awareness, Action and Assurance’ – Since
security failures could be disastrous and may lead to
unaffordable consequences, assurance (basis of trust &
confidence) that the security controls work when needed
most is essential.
“WISHYOUREMAINSAFE FROMCYBER THREAT”
THANK YOU!!!

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
IoT Security
IoT SecurityIoT Security
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
Nada G.Youssef
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber security
Cyber securityCyber security
Cyber security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 

Viewers also liked

Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
XEventsHospitality
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policyNextBigWhat
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policybarbeejl
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
M P Keshava
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
Symantec
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
kevin_donovan
 
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Rafel Ivgi
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
SajibeKanti
 
State of the State IT Workforces
State of the State IT WorkforcesState of the State IT Workforces
State of the State IT WorkforcesChris Brady
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Prikaz 1362 ot 30122016
Prikaz 1362 ot 30122016Prikaz 1362 ot 30122016
Prikaz 1362 ot 30122016
Julia Korkina
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 

Viewers also liked (20)

Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
Firmitas Cyber Solutions - Inforgraphic - Mirai Botnet - A few basic facts on...
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
State of the State IT Workforces
State of the State IT WorkforcesState of the State IT Workforces
State of the State IT Workforces
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Prikaz 1362 ot 30122016
Prikaz 1362 ot 30122016Prikaz 1362 ot 30122016
Prikaz 1362 ot 30122016
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Similar to National cyber security policy final

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
Dr. C.V. Suresh Babu
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
Infosectrain3
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
SharifulShishir
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
eresavenzon
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aditya Kokadwar
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ankit Ranjan
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
Malu704065
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
Dr. Prashant Vats
 

Similar to National cyber security policy final (20)

Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

National cyber security policy final

  • 1. NATIONAL CYBER SECURITY POLICY “FOR SECURE COMPUTING ENVIRONMENT AND ADEQUATE TRUST & CONFIDENCE IN ELECTRONIC TRANSACTIONS ”
  • 2. IT’S A CYBER GENERATION NOW DUDE!!!
  • 4. GROUP MEMBERS:  Aadesh Rai  Ajay Jha  Anu Jain  Dipak Zala  Jaykrishnan VK  Omprakash Singh  Pooja  Remya P  Renbi Jami  Supriya Sarkar
  • 5. GLIMPSE OF CYBER SECURITY POLICY  Headed by a national cyber security coordinator, who reports to the NSA, the policy has three components that demarcate task and authority. The existing Indian Computer Emergency Response Team (CERT-IN) will be tasked to handle the commercial aspects of cyber security, including 24x7 proactive responses to hackers, cyber-attacks, intrusions and restoration of affected systems.  As of now, cyber criminals seem to have no real threat of prosecution. Our job is to create a climate of fear of effective prosecution, as in other types of crime.  For the first time since the advent of dedicated computer networks in the Indian government, the National Security Council Secretariat (NSCS) has come up with a comprehensive cyber security policy for upgrading the security of systems and preventing them from being hacked, attacked with malware, or intruded upon.
  • 6. WHY THIS POLICY IS REQUIRED?  To Prevent cyber attacks against the country’s critical information infrastructures  To Reduce national vulnerability to cyber attacks  To Minimize damage and recovery time from cyber attacks  For creation of a technical-professional body that certifies the security of a network to ensure the overall health of government systems.  While NSCS is advocating that initially the certification of networks could be done by private agencies, the long term plan is to create a technical body of professionals, all under 40, who will form the backbone of Indian cyber security.
  • 7. WHY CYBER SECURITY HAS BECOME ESSENTIAL NOW?  Mischievous activities in cyber space have expanded from novice geeks to organized criminal gangs that are going Hi-tech  Growing threat to national security - web espionage becomes increasingly advanced, moving from curiosity to well-funded and well-organized operations aimed at not only financial, but also political or technical gain  Increasing threat to online services – affecting individuals and industry because of growth of sophistication of attack techniques  Emergence of a sophisticated market for software flaws – that can be used to carry out espionage and attacks on Govt. and Critical information infrastructure. Findings indicate a blurred line between legal and illegal sales of software vulnerabilities
  • 8. • Internet has become an weapon for political, military and economic espionage • Organized cyber attacks have been witnessed in last few years • Pentagon, US in 2007 • Estonia in April 2007 • Computer systems of German Chancellery and three Ministries • E-mail accounts at National Informatics Centre, India • Highly classified Govt. computer networks in New Zealand & Australia • The software used to carry out these attacks indicate that they were clearly designed & tested with much greater resources than usual individual hackers • Most Govt. agencies and companies around the world use common computing technologies & systems that are frequently penetrated by criminal hackers and malware • Traditional protective measures are not enough to protect against attacks such as those on Estonia, as the complexity and coordination in using the botnets was totally new. National networks with less sophistication in monitoring and defense capabilities could face serious problems to National security
  • 9. • Online services are becoming prime targets for cyber criminals • Cyber criminals continue to refine their means of deceit as well as their victims In summary, the global threats affecting users in 2008 are: • New & sophisticated forms of attacks • Attacks targeting new technologies, such as VoIP (vishing – phishing via VoIP & phreaking – hacking tel networks to make free long distance calls) and peer-to-peer services • Attacks targeting online social networks • Attacks targeting online services, particularly online banking services • There is a new level of complexity in malware not seen before. These are more resilient, are modified over and over again and contain highly sophisticated functionality such as encryption (Ex. Nuwar also known as ‘Zhelatin’ and ‘Storm’ worm’ – with a new variant appearing almost daily) • As a trend we will see an increase in threats that hijack PCs with bots. Another challenging trend is the arrival of self-modifying threats • Given the exponential growth in social networking sites, social engineering may shortly become the easiest & quickest way to commit ID theft
  • 10. WHO IS RESPONSIBLE FOR ENSURING VIRTUAL SPACE FREE OF CYBER THREAT?  Government  Private sector  Users  Academicians
  • 11. ACTION NEEDEDTOBE TAKEN AT DIFFERENT LEVELS At country level:  Policy directives on data security and privacy protection - Compliance, liabilities and enforcement (ex. Information Technology Act 2000)  Standards and guidelines for compliance (ex: ISO 27001, ISO 20001 & CERT-In guidelines)  Conformity assessment infrastructure (enabling and endorsement actions concerning security product – ISO 15408, security process – ISO 27001 and security manpower – CISA, CISSP, ISMS-LA, DISA etc.)  Security incident - early warning and response (National cyber alert system and crisis management)
  • 12. • Information sharing and cooperation (MoUs with vendors and overseas CERTs and security forums). • Pro-active actions to deal with and contain malicious activities on the net by way of net traffic monitoring, routing and gateway controls • Lawful interceptions and Law enforcement. • Nation wide security awareness campaign. • Security research and development focusing on tools, technology, products and services.
  • 13. ACTIONS AT NETWORK LEVEL  Compliance to security best practices (ex. ISO27001), service quality (ISO 20001) and service level agreements (SLAs) and demonstration.  Pro-active actions to deal with and contain malicious activities, ensuring quality of services and protecting average end users by way of net traffic monitoring, routing and gateway controls  Keeping pace with changes in security technology and processes to remain current (configuration, patch and vulnerability management)  Conform to legal obligations and cooperate with law enforcement activities including prompt actions on alert/advisories issued by CERT- In.  Use of secure product and services and skilled manpower.  Crisis management and emergency response.
  • 14. ACTIONS AT CORPORATE LEVEL:  Compliance to security best practices (ex. ISO27001), and demonstration.  Pro-active actions to deal with and contain malicious activities, and protecting average end users by way of net traffic monitoring, routing and gateway controls  Keeping pace with changes in security technology and processes to remain current (configuration, patch and vulnerability management)  Conform to legal obligations and cooperate with law enforcement activities including prompt actions on advisories issued by CERT-In.  Use of secure product and services and skilled manpower.  Crisis management and emergency response.  Periodic training and up gradation of skills for personnel engaged in security related activities  Promote acceptable users’ behavior in the interest of safe computing both within and outside.
  • 15. ACTIONS AT SMALL USER LEVEL:  Maintain a level of awareness necessary for self-protection.  Use legal software and update at regular intervals.  Beware of security pitfalls while on the net and adhere to security advisories as necessary.  Maintain reasonable and trust-worthy access control to prevent abuse of computer resources
  • 16. HOW THIS POLICY CAN CHECK CYBER CRIMES?
  • 17. BY FACILITATING INTERNATIONALCOOPERATIONARRANGEMENTS  It is an inevitable reality that some countries will become safe havens for cyber criminals and international pressure to crack down won’t work.  It is believed that in next few years Govts are likely to get aggressive and pursue action against the specific individuals/groups/companies, regardless of location  It is also likely that Govts will start putting pressure on intermediary bodies that have the skills and resources, such as banks, ISPs and software vendors to protect the public from malware, hacking and social engineering  We may see industry sector codes of practice demanding improved security measures, backed probably by assurance and insurance schemes  Greater connectivity, more embedded systems and less obvious perimeters  Compliance regulations will drive upgrades and changes and also increase system complexity and legal wrangles – increase in civil suits for security breaches  Massive data storing patterns that ensure data never goes away – a boon to law enforcement agencies
  • 18. • Enabling Govt. as a key stakeholder in creating appropriate environment/conditions by way of policies and legal/regulatory framework to address important aspect of data security and privacy protection concerns. National Cyber Security policy will ensure amendments to Indian IT Act and designing security and privacy assurance framework, crisis management plan (CMP) etc. • Enabling User agencies in Govt. and critical sectors to improve the security posture of their IT systems and networks and enhance their ability to resist cyber attacks and recover within reasonable time if attacks do occur. Formulation of security standards/ guidelines, empanelment of IT security auditors, creating a network & database of points-of-contact and CISOs of Govt & critical sector organizations for smooth and efficient communication to deal with security incidents and emergencies, CISO training programs on security related topics and CERT-In initiatives, cyber security drills and security conformity assessment infrastructure covering products, process and people.
  • 19. • Enabling CERT-In to enhance its capacity and outreach and to achieve force multiplier effects to serve its constituency in an effective manner as a `Trusted referral agency’. Specific actions include – National cyber security strategy (11th Five Year Plan), National Cyber Alert system, MoUs with vendors, MoUs with CERTs across the world, network of sectoral CERTs in India, membership with international/regional CERT forums for exchange of information and expertise & rapid response, targeted projects and training programs for use of and compliance to international best practices in security and incident response. • Public Communication & Contact programs to increase cyber security awareness and to communicate Govt. policies on cyber security.
  • 20. SUGGESTIONS FOR FORTIFICATION OF CYBER SECURITY POLICY:  Social economic political and technological background should be taken into account while finalizing this policy.  As India is a developing country hence it should be considered not in continuum with developed world while finalization of this policy.  Short and long term consistent realistic objectives should be there in the policy.  Fundamental root issues should be addressed in order to be able to sustain secondary issues.  Policy should consider available resources and their budgeting to support the short and long term objective.  Policy should not be static in nature. So as to be tuned to the changing needs. There must be a provision for a constant review in order to improve the policy and remove the impediments if any.
  • 21. FINALLY IT IS REQUIRED TO CREATE A SECURITY ASSURANCE LADDER!!!  Security control emphasis depends on the kind of environment • Low risk : ‘Awareness’ – know your security concerns and follow best practices • Medium risk: ‘Awareness & Action’ – Proactive strategies leave you better prepared to handle security threats and incidents • High risk: ‘Awareness, Action and Assurance’ – Since security failures could be disastrous and may lead to unaffordable consequences, assurance (basis of trust & confidence) that the security controls work when needed most is essential.