The document outlines India's 2013 National Cyber Security Policy. The policy aims to build a secure cyber ecosystem in India by protecting information infrastructure, reducing cyber threats and vulnerabilities, and developing cyber security capabilities. It identifies strategic objectives and approaches across areas such as creating assurance frameworks, strengthening regulatory structures, developing threat monitoring and response mechanisms, securing e-governance, protecting critical infrastructure, fostering research and workforce development, and enhancing domestic and international cooperation. The overarching goal is to secure cyberspace for citizens, businesses and the government of India.
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance.
Cybersecurity standards are generally applicable to all organisations regardless of their size or the industry and sector in which they operate. This page provides generic information on each of the standards that is usually recognised as an essential component of any cyber security strategy.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance.
Cybersecurity standards are generally applicable to all organisations regardless of their size or the industry and sector in which they operate. This page provides generic information on each of the standards that is usually recognised as an essential component of any cyber security strategy.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
This power-point present Explain about security risk by internet to government offices. here is some important tools and method for safely handheld internet
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
This power-point present Explain about security risk by internet to government offices. here is some important tools and method for safely handheld internet
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013
An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection
The C3i Group is a national-international outreach venture providing strategic leadership in Cybersecurity, Cybercrime, and Cyber Intelligence.
The C3i Group facilitates open dialog, communication, and information sharing among key public-private entities, enabling them to DISCOVER what is at cyber-counterintelligence risk, how to DEFEND against it, and how to ENSURE cyber-secure competitiveness in the digital global economy.
E mail security using Certified Electronic Mail (CEM)Pankaj Bhambhani
When scientists "invented" electronic mail 30 years ago, they had in mind the exchange of messages between a small number of computers in few universities. Because they worked within a closed network nobody was concerned about misuse.
Today everything changed: Internet became an open network and the e-mail protocol SMTP is used to send billions of messages. Among them a lot with sensitive, private or valuable information. Unfortunately the e-mail protocol is still lacking inherent security and thus it is imperative:As an e-mail receiver without additional security functions you can not trust neither the e-mail sender nor its content!
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
Kiersten E. Todt
President and Managing Partner
Liberty Group Ventures, LLC (LGV)
Kiersten Todt is the President and Managing Partner of Liberty Group Ventures, LLC (LGV). She develops risk and crisis management solutions for infrastructure, emergency management, cybersecurity, higher education, and homeland security clients in the public, private, and non-profit sectors. She has served in senior positions in both the executive and legislative branches of government. Ms. Todt has commented on homeland security and sport security issues in multiple media outlets, including MSNBC, NPR, Bloomberg, and The Wall Street Journal. Her work on sport security has been published in two editions of The International Centre for Sport Security Journal.
Prior to LGV, Ms. Todt was a partner at Good Harbor Consulting and was responsible for the company's North America crisis management practice, which had a concentration in cyber security. Clients included states and quasi-public institutions, maritime entities, small and large businesses, and college and university systems. Before joining Good Harbor, she worked for Business Executives for National Security (BENS) and was responsible for integrating the private sector into state and local emergency management capabilities; she also developed and executed federal and regional port and cyber security projects. Prior to BENS, she was a consultant for Sandia National Laboratories and worked with the California Governor's Office and Bay Area Economic Forum to develop the homeland security preparedness plan for the Bay Area. Ms. Todt was also an adjunct lecturer at Stanford University.
Ms. Todt served as a Professional Staff Member on the U.S. Senate Committee on Governmental Affairs (now the Committee on Homeland Security and Governmental Affairs); she worked for the Committee Chairman, Senator Joseph Lieberman, and was responsible for drafting the bioterror, infrastructure protection, emergency preparedness, and science and technology directorates of the legislation that created the Department of Homeland Security. She also served as Senator Lieberman's Appropriations Director and managed his drug policy portfolio.
Before working in the Senate, Ms. Todt served in Vice President Gore's domestic policy office and was responsible for coordinating federal resources with locally-defined needs, specifically focusing on energy challenges in California and housing issues. She was also the senior advisor on demand-reduction issues to Director Barry. R. McCaffrey at the Office of National Drug Control Policy (ONDCP).
Ms. Todt graduated from Princeton University, with a degree in public policy from The Woodrow Wilson School of Public and International Affairs. She holds a master's degree in Public Policy from the John F. Kennedy School of Government at Harvard University and was selected to be a Presidential Management Fellow in 1999. She earned the Outstanding Service Award at ONDCP.
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09Dr D.C. Misra
This an e-governance vision for India by 2020 by an e-governance researcher and consultant. India is already Internet nation no.4 in the world and is destined to become Internet nation no. 1 in the world in due course of time. However, if the steps suggested in this presentation are taken, not only will it hasten the process but provide firm foundations to e-government.
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
Introduction, Why netiquette, What is netiquette or what is internet etiquette or what is net etiquette, Different rules for netiquette , Rule No. 1: Remember the Human. Rule No. 1: Remember the Human. Rule no. 3: Know where you are in cyberspace. and so on...
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
UN-Singapore Cyber Programme Training course on behalf of the: UN Office for Disarmament Affairs c/o gohg@un.org By: Abdul-Hakeem Ajijola info@consultancyss.com Singapore 15-16 July 2019 #UN #Singapore #Cyber Program #Norms Awareness Workshop for #ASEAN member States #UNODA #UNGGE 2015 #cybersecurity #AskAjijola #GCSC #GFCE @benjaminang @fitbintim @elinanoor #cyberdiplomacy
The Centre for Strategic Cyberspace + Security Science has created this International Strategy for Cyberspace (ISC) as a strategic-level policy document offering a practical, comprehensive, and clear vision for the future of cyberspace. It sets an agenda for partnering on cybersecurity and associated initiatives at an international level, and highlights the importance of international cooperation in advancing cyberspace as a foreign policy priority.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
Security|5
Security|5 is an entry level certifi cation for
anyone interested in learning computer
networking and security basics. Security|5
means 5 components of IT security: fi rewalls,
anti-virus, IDS, networking, and web security.
Wireless|5
Wireless|5 introduces learners to the basics
of wireless technologies and their practical
adaptation. Learners are exposed to various
wireless technologies; current and emerging
standards; and a variety of devices.
Network|5
Network|5 covers the ‘Alphabet Soup of
Networking’ – the basic core knowledge
to know how infrastructure enables a work
environment, to help students and employees
succeed in an integrated work environment.
The
Solution
: EC-Council Press
The EC-Council | Press marks an innovation in academic text books and courses of
study in information security, computer forensics, disaster recovery, and end-user
security. By repurposing the essential content of EC-Council’s world class professional
certifi cation programs to fi t academic programs, the EC-Council | Press was formed.
With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to
revolutionize global information security programs and ultimately create a new breed
of practitioners capable of combating this growing epidemic of cybercrime and the
rising threat of cyber war.
This Certifi cation: C|EH – Certifi ed Ethical Hacker
Certifi ed Ethical Hacker is a certifi cation designed to immerse the learner in an
interactive environment where they will learn how to scan, test, hack and secure
information systems. Ideal candidates for the C|EH program are security professionals,
site administrators, security offi cers, auditors or anyone who is concerned with
the integrity of a network infrastructure. The goal of the Ethical Hacker is to help
the organization take preemptive measures against malicious attacks by attacking
the system himself; all the while staying within legal limits.
EC-Council | Press
Additional Certifi cations Covered By EC-Council Press:
E|NSA – EC-Council
Network Security Administrator
The E|NSA program is designed to provide
fundamental skills needed to analyze the internal
and external security threats against a network,
and to develop security policies that will protect
an organization’s information.
E|CSA - EC-Council Certifi ed Security Analyst
The objective of E|CSA is to add value to experienced
security professionals by helping them analyze
the outcomes of their tests. It is the only in-depth
Advanced Hacking and Penetration Testing
certifi cation available that covers testing in all
modern infrastructures, operating systems, and
application environments.
C|HFI - Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigation is the
process of detecting hacking attacks and properly
extracting evidence to report the crime and
conduct audits to prevent future attacks. The C|HFI
materials will give participants the necess.
Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Emphasizing on Cyber Crime and Threats, Cyberwar Terrorism and Countermeasures.
Be smart & Creative in Cyber World. #D3
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
Irene Moetsana-Moeng, Executive Director and Head at Public Sector Agency on Stakeholders in Cybersecurity: Collaborative Defence for Cybersecurity Resilience at Public Sector Cybersecurity Summit 2024
The Importance of Cybersecurity for Digital TransformationNUS-ISS
In the rapidly evolving landscape of digital transformation, the importance of cybersecurity cannot be overstated. As organizations embrace digital technologies to enhance their operations, innovate, and connect with customers in new and dynamic ways, they simultaneously become more vulnerable to cyber threats.
This talk will discuss the importance of having a well thought through approach in dealing with cybersecurity in the form of a strategy that lays out the various programmes and initiatives that will underpin a secure and resilient digital transformation journey. Not surprisingly, having a pool of well-trained cybersecurity personnel is one of the key ingredient in a cyber strategy as exemplified in Singapore's own national cybersecurity strategy.
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INFORMATION SYSTEMS 1
Security and safety of the power grid and its related computer information systems
Name of the student:
Name of the institution:
There have been increased use and application of information and communication technologies in most of critical infrastructures and departments of the government. They have proved to be fundamentally significant in helping the various departments to carry out their daily activities with a lot of ease and proficiency. However, these systems have also opened quite a considerable unforeseen opportunity both positive and negative. The infrastructures have become highly efficient and flexible and this has been very beneficial to the people. On the other hand, there have been persistent problems with cybercrimes and hackers who have outsmarted the government and the set securities protocols every now and then. This has made the state lose billions of dollars in a theft of its secrets and high-level information. In this case, it is right to analyze all the general impacts that can be put in place to prevent cybercrimes as well as threats. It is hence important to validate all the necessary measures that need to be put in place in every organization. The paper will hence give recommendations that can help the named organization solve the issues mentioned.
To address this issue, proper precautions needs to be put in place. The government has to demonstrate preparedness in combating this crime both in terms of systems put in place and also the legal jurisprudence (Higgins, 2016). The US power grid system is an interconnected system that is made up of power generation, transmissions software, and its distribution with a capacity to bring down the whole economy if not well protected. The nation's department of defense (DoD) is one of the most critical and sensitive institutions that can paralyze the state if tampered with by unscrupulous individuals. The situation is even worse if there is an advanced persistent threat (APT) against computers and software that operates the western interconnection power grid. This needs an urgent measure to remove the threat immediately and avoid its reoccurrence. We recommend the following security and safety of the power grid and its related computer information systems are taken by the concerned departments:
a. Creation of a special branch that is specifically dedicated to cyber security
It is high time for the government to come up with a special branch of the military personnel that will be dedicated to fighting cybercrimes (Higgins, 2016). Its main function will be to detect cybercrime activities, to develop mechanisms to prevent cybercrimes, apprehend, arrest and align cyber criminals in a court of law.
b. Creation of special court to determine cybercrime cases
Security and safety of the power grid and its related computer information systems and those crimes associated w.
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxalfred4lewis58146
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 2016
Running head: IT Security Policy Outline 1
10
Running head: BASIC PAPER TEMPLATE
Introduction
An it security policy is a strategy developed by an organization or an enterprise to protect and maintain network and resources (Bowden, 2003). It is very important that organization create a well-written policy that is geared towards dealings with threats towards availability, confidentiality and integrity. The United States Government has implemented a Cybersecurity framework, which is geared towards improving the critical infrastructure of cybersecurity (NIST, 2014). “The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers” (NIST, 2014).
In addition a proper outline for an IT Security Policy will not only address all applicable elements of the framework core and protective technologies listed in the NIST cybersecurity framework but also address relevant policies and controls from sources including the CIS critical security controls. CIS controls are recommended set of actions that helps an organization defend their infrastructure and are created by people who are highly skilled in dealing with attacks and how they work (CIS, 2015).Analysis
The national Aeronautics and Space Administration (NASA) is a government owned enterprise that organization that is responsible for the civilian space programs and is continuing to venture on to new things such as air transportation (NASA, 2015). Thus, Information technology plays is a vital part of the organizations development as they focus on increasing the productivity of scientist, engineers and mission support personnel by responsively and efficiently delivering reliable, innovative and secure IT services (NASA, 2015). According to NASA’s information technology governance (2013) “the Agency spends more than $1.5 billion annually on a portfolio of IT assets that includes approximately 550 information systems it uses to control spacecraft, collect and process scientific data, provide security for its IT infrastructure, and enable NASA personnel to collaborate with colleagues around the world.” In addition, Technical scientific information generated by NASA research, science, engineering, technology, and exploration initiatives is one of its most valuable assets and should be protected under a solid IT security policy. NASA’s has a sophisticated information infrastructure such as DAEP, SN, DSN, and NEN and supplies telecommunication services to customers across the globe.
In addition, NASA has had it share of cyber threats over the years and has since continued to develop a better IT security policy to safeguard against threats. Following 5408 computer security incidents in 2010 and 2011 the .
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
In the current digital landscape, cybercriminals continually evolve their techniques to execute successful attacks on businesses, thus posing a great challenge to information technology (IT) professionals. While traditional cybersecurity approaches like layered defense and reactive security have helped IT professionals cope with traditional threats, they are ineffective in dealing with evolving cyberattacks. This paper focuses on the need for a proactive cybersecurity culture among IT professionals to enable them combat evolving threats. The paper emphasis that building a proactive security approach and culture can help among IT professionals anticipate, identify, and mitigate latent threats prior to them exploiting existing vulnerabilities. This paper also points out that as IT professionals use reactive security when dealing with traditional attacks, they can use it collaboratively with proactive security to effectively protect their networks, data, and systems and avoid heavy costs of dealing with cyberattack’s aftermaths and business recovery.
Similar to National Cyber Security Policy-2013 (20)
2. PREAMBLE
Cyberspace is a complex environment consisting of
interactions between people, software and services,
supported by worldwide distribution of information and
communication technology devices and networks.
The cyberspace is used by citizens, businesses,
critical information infrastructure, military and
governments and is expected to grow more complex.
IT is one of the critical sectors of cyberspace and is
responsible for contribution to socio-economic factors
like employment, living standards and diversity.
3. Plans for rapid social transformation and inclusive growth,
creating secure computing environment and adequate trust
and confidence in electronic transactions, software's,
services, devices and networks, has become a priority for
India.
Cyberspace is vulnerable to incidents, whether intentional
or accidental, manmade or natural, and the data
exchanged in the cyberspace can be exploited by nation-
states and non-state actors. Some examples of cyber
threats are identity theft, phishing, social engineering,
hactivism, cyber terrorism, compromised digital certificates,
persistent attacks, denial of service, bot nets, supply chain
attacks, data leakage, etc.
Due to the dynamic nature of cyberspace, there is now a
need for actions against all threats to be unified under a
National Cyber Security Policy, with an integrated vision
4. The cyber security policy is an evolving task and
caters to home users and small, medium and large
enterprises and Government and non-Government
entities. It serves as an umbrella framework for
defining and guiding actions relating to cyberspace
security.
5. Vision
“To build a secure and resilient cyberspace for
citizens, businesses and Government.”
6. Mission
To protect information and information infrastructure
in cyberspace, build capabilities to prevent and
respond to cyber threats, reduce vulnerabilities
and minimize damage from cyber incidents
through a combination of institutional structures,
people, processes, technology and cooperation.
7. Objectives
1) To create a secure cyber ecosystem in the country,
generate adequate trust and confidence in IT systems
and transactions in cyberspace and thus enhance
adoption of IT in all sectors.
2) To create an assurance framework for design of security
policies
3) To strengthen the Regulatory framework for ensuring a
secure cyberspace ecosystem.
4) To enhance and create National and Sectoral level 24 X
7 mechanisms for obtaining information regarding
threats to ICT infrastructure, creating scenarios for
responsive, resolution and crisis management through
predictive, preventive, protective, response and
recovery actions
5) Operating a 24 x 7 National Critical Information
8. 7) To develop suitable indigenous security technologies
through frontier technology research, solution oriented
research, proof of concept, pilot development,
transition, diffusion and commercialization.
8) To create a workforce of 500,000 professionals skilled in
cyber security in the next 5 years through capacity
building, skill development and training.
9) To provide fiscal benefits to businesses for adoption of
standard security practices and processes.
10) To enable protection of information while in process,
handling, storage and transit to safeguard citizen’s data.
11) To create a culture of cyber security and privacy
enabling responsible user behavior and actions through
effective communication and promotion.
12) To enhance global cooperation by promoting shared
understanding and leveraging relationships for
furthering the cause of security of cyberspace.
9. STRATEGIES
A. Creating a secure cyber ecosystem
1. To designate a National nodal agency to coordinate all
matters related to cyber security in the country.
2. To encourage all organizations, private and public to
designate a member of senior management, as Chief
Information Security Officer (CISO), responsible for cyber
security efforts and initiatives.
3. To encourage all organizations to develop information
security policies duly integrated with their business plans
and implement such policies as per international best
practices.
4. To ensure that all organizations earmark a specific
10. 5) To provide fiscal schemes and incentives to encourage
entities to install, strengthen and upgrade information
infrastructure with respect to cyber security.
6) To prevent occurrence and recurrence of cyber incidents
by way of incentives for technology development, cyber
security compliance and proactive actions.
7) To establish a mechanism for sharing information and for
identifying and responding to cyber security incidents and
for cooperation in restoration efforts.
8) To encourage entities to adopt guidelines for procurement
of trustworthy ICT products and provide for procurement of
indigenously manufactured ICT products.
11. B. Creating an assurance
framework
1. To promote adoption of global best practices in information
security and compliance and thereby enhance cyber security
posture.
2. To create infrastructure for conformity assessment and
certification of compliance to cyber security test practices,
standards and guidelines.
3. To enable implementation of global security best practices
in formal risk assessment and risk management processes,
business continuity management and cyber crisis
management plan by all entities within Government and in
critical sectors, to reduce the risk of disruption and improve
the security posture.
4. To identify and classify information infrastructure facilities
and assets at entity level with respect to risk perception for
undertaking commensurate security protection measures.
5. To create conformity assessment framework to periodically
12. C. Encouraging Open
Standards
1. To encourage use of open standards to facilitate
interoperability and data exchange among different
products or services.
2. To promote consortium of Government and private
sector to enhance the availability of tested and certified IT
products based on open standards.
13. D. Strengthening the Regulatory
Framework
1. To develop a dynamic legal framework and its periodic
review to address the cyber security challenges arising
out of technological developments in cyber space and
its harmonization with international frameworks
including those related to Internet governance.
2. To mandate periodic audit and evaluation of the
adequacy and effectiveness of security of information
infrastructure as may be appropriate, with respect to
regulatory framework.
3. To enable, educate, and facilitate awareness of the
regulatory framework.
14. E. Creating mechanisms for
security threat early warning,
vulnerability management and
response to security threats
1. To create National level systems, processes, structures
and mechanisms to generate necessary situational
scenario of existing and potential cyber security threats
and enable timely information sharing for proactive,
preventive and protective actions by the individual
entities.
2. To operate a 24 X 7 National Level Computer Response
Team (CERT) to function as a nodal Agency for
coordination of all efforts for cyber security emergency
response.
3. To operationalize 24x7 sectoral CERT’s for all
15. 4) To implement Cyber Crisis Management Plan.
5) To conduct and facilitate regular cyber security drills
and exercises at all levels.
16. F. Securing E-Governance
Services
1. To mandate implementation of global security best
practices, business continuity management, etc.
2. To encourage wider usage of Public Key Infrastructure
(PKI) with Government for trusted communication and
transaction.
3. To engage information security professionals/
organizations to assist e-Governance initiatives and
ensure conformance to security best practices.
17. G. Protection and resilience of
Critical Information
Infrastructure
1. To develop a plan for protection of Critical Information
Infrastructure and its integration with business plan at the
entity level and implement such plan.
2. To operate a 24 x 7 National Critical Information
Infrastructure Protection Centre (NCIIPC) to function as
the nodal agency for information.
3. To facilitate identification, prioritization, assessment,
remediation and protection of critical Infrastructure.
4. To mandate certification for all security roles right from
CISO/CSO to those involved in critical information
infrastructure.
18. H. Promotion of research and
development in cyber security
1. To undertake research and development programs for
addressing all aspects of development aimed at short
term, medium term and long term goals.
2. To facilitate transition, diffusion and commercialization of
the outputs of Research and Development.
3. To set up centers of excellence in areas of strategic
importance for the point of security of cyber space.
4. To collaborate in joint Research and Development
Projects with industry and academia in frontline
technologies and solution oriented research.
19. I. Reducing Supply Chain
Risks
1. To create and maintain testing information infrastructure
and facilities for IT security product evaluation and
compliance verification as per global standards.
2. To build trusted relationships with product/system
vendors.
3. To create awareness of the threats, vulnerabilities and
consequences of breach of security.
20. J. Human Resource
Development
1. To foster education and training programs to both in
formal and informal sectors to support cyber security
threats.
2. To establish cyber security training infrastructure
across the country.
3. To establish cyber security concept labs for
awareness and skill development.
4. To establish institutional mechanisms for capacity
building for Law Enforcement Agencies.
21. K. Creating cyber security
awareness
1. To promote and launch a comprehensive national
awareness program on security of cyberspace.
2. To sustain security literacy awareness and publicity
campaign.
3. To conduct support and enable cyber security workshops/
seminars and certifications.
22. L. Developing effective Public
Private Partnerships
1. To facilitate collaboration and cooperation among
stakeholder entities including private sector, in the
area of cyber security in general and protection of
critical information infrastructure in particular for
actions related to cyber threats, vulnerabilities,
breaches, potential protective measures, and adoption
of best practices.
2. To create models for collaborations and engagement
with all relevant stakeholders.
3. To create a think tank for cyber security policy inputs,
discussions and deliberations.
23. M. Information sharing and
cooperation
1. To develop bilateral and multi-lateral relationships in the
area of cyber security with other countries.
2. To enhance National and global cooperation among
security agencies, CERT’s, defense agencies and
forces, Law Enforcement Agencies and the judicial
systems.
3. To create mechanisms for dialogue related to technical
and operational aspects with industry in order to
facilitate efforts in recovery and resilience of systems.
24. N. Prioritized Approach for
implementation
To adopt a prioritized approach to implement the policy so
as to address the most critical areas in the first instance.
25. O. Operationalization of the
Policy
This policy shall be operational by way of detailed
guidelines and plans of action at various levels as national,
sectoral, state, ministry, department and enterprise, as may
be appropriate, to Address the challenging requirements of
security of the cyber space.