SlideShare a Scribd company logo
Title
• Text
Defending Virtual Borders
• Internet has now become a weapon for political, military and
  economic espionage.
• The conventional threats to national security now have a
  digital delivery mechanism charecterised by spyware,
  malware, trojans, botnets and conflicker worms.
• Although, there have been no true cyber wars till date, cyber
  battles of great consequence are easy to find.
• Every nation now has a new border to safeguard and protect -
  the Virtual Border or the Cyber Space.
Cyber Warfare
• Cyber warfare is the use of computer technologies as
  both defensive and offensive weapons in international
  relations.
• The debate over cyberwarfare is only now emerging
  in the United States, the United Kingdom, and in the
  foreign policy dialogue between the United States,
  the Russian Federation, and other nations.
Estonia experienced a devastating cyber attack in 2007    following
          a decision to move a statue memorializing Russian soldiers who
                        fought during World War II.
• . Pro-Russian hackers took down bank and school websites via
  Denial of Service (DoS) attacks on Estonian networks.
In 2008, Georgia experienced similar DoS
attacks following its conflict with Russia.
In June 2009, the websites belonging to Iranian
news agencies, Presidendent Mahmoud Ahmadinejad
and Iran’s supreme leader Ayatollah Khamenei were
  knocked off-line employing Dos Attacks.
Cyber Warrior
• NATO has created a cyber defence facility in Estonia
  codenamed K5.
• The US has established the „US Cyber Command‟ to defend
  the country against cyber attacks.
• The United Kingdom created two Organisations namely - the
  „Office of Cyber Security‟ and the „Cyber Security Operations
  Center‟ to protect its cyber space from attacks.
• South Korea has set up its cyber warfare center and has
  recruited 3000 security experts by now.
• Isreal too has an „Internet warfare‟ team dedicated to cyber
  security.
Cyber Threats to India
Mumbai Terror Attacks
The Great Irony
• “It's the great irony of our Information Age --
  the very technologies that empower us to
  create and to build also empower those who
  would disrupt and destroy. And this paradox -
  - seen and unseen -- is something that we
  experience every day.”
The Future Face of War !
• The police found four Global Positioning System
  (GPS) handsets, one satellite phone, nine mobile
  phones and computer discs with high-resolution
  images and maps of the 10 sites that were attacked.
  The terrorists used the Internet to make calls which
  hampered the investigation.
• The terror group took credit for the bloodshed with a
  series of e-mails to local media.
• They used a “remailer" service to mask their
  identities; earlier attacks were claimed from cyber
  cafes.
The next war will be in
           cyberspace
• All political and military conflicts
  now have a cyber dimension, the size
  and impact of which are difficult to
  predict !
Cyber Security for India
• We live in times of e-espionage, where nations and
  hacking groups across the globe search for vital
  information relating to intelligence, military or economic
  policies. Therefore entrusting this huge responsibility to
  CERT-India will not be in the best interest of the nation.
• A separate office designed in the model of the US or UK
  is the best solution to this. The body has to be constituted
  with experts in the field at the top management.
• The cyber threats call for such decisive steps. Half
  hearted actions at this juncture will not deliver.
Cyber Security –An India
         Centric Framework
1. Cyber Security Policy
2. Create a cyber command
3. An independent office for cyber security
4. Encourage Research and Development in cyber
   security
5. State‟s Liability for not protecting personal data
6. Strengthen the legal framework
7. Establish a „single window‟ for registering cyber
   crimes
Continued…
8. Spread awareness about the seriousness of the cyber
   security problems
9. Establish a Digital work force
10. Private – Public Partnership
11. Conduct „Cyber Exercises‟
12. Establish Cyber Wings for CBI and NSG
13.Establish a Chief Information Security Officer
   (CISO) for every State
Conclusion
• The difference between cybercrime, cyber-espionage,
  and cyber war is only a couple of keystrokes.

• The rapid spread of information and communication
  technology will only magnify the threat of cyber
  warfare in years to come.
13. Establish a Chief Information Security
  Officer (CISO) for every State
Is India a heaven for
  Cybercriminals ?
Securing Indian Cyberspace Shojan

More Related Content

What's hot

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Maria Parra
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
shifahirani
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
Pierluigi Paganini
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Deepak Pareek
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
Talwant Singh
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
Priyanka Aash
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
Brett L. Scott
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
arii827
 

What's hot (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 

Similar to Securing Indian Cyberspace Shojan

Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
Fahmi Albaheth
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
Amit Anand
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
Julesroa
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
Michalis Mavis, MSc, MSc
 
Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
James Stuart
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
Khalizan Halid
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
Leonardo
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
114-116
114-116114-116
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
ijbuiiir1
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
bhagyasri patel
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
wacko07
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 

Similar to Securing Indian Cyberspace Shojan (20)

Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
114-116
114-116114-116
114-116
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 

Recently uploaded

Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
Filippo64
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 

Recently uploaded (9)

Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 

Securing Indian Cyberspace Shojan

  • 2. Defending Virtual Borders • Internet has now become a weapon for political, military and economic espionage. • The conventional threats to national security now have a digital delivery mechanism charecterised by spyware, malware, trojans, botnets and conflicker worms. • Although, there have been no true cyber wars till date, cyber battles of great consequence are easy to find. • Every nation now has a new border to safeguard and protect - the Virtual Border or the Cyber Space.
  • 3. Cyber Warfare • Cyber warfare is the use of computer technologies as both defensive and offensive weapons in international relations. • The debate over cyberwarfare is only now emerging in the United States, the United Kingdom, and in the foreign policy dialogue between the United States, the Russian Federation, and other nations.
  • 4. Estonia experienced a devastating cyber attack in 2007 following a decision to move a statue memorializing Russian soldiers who fought during World War II. • . Pro-Russian hackers took down bank and school websites via Denial of Service (DoS) attacks on Estonian networks.
  • 5. In 2008, Georgia experienced similar DoS attacks following its conflict with Russia.
  • 6. In June 2009, the websites belonging to Iranian news agencies, Presidendent Mahmoud Ahmadinejad and Iran’s supreme leader Ayatollah Khamenei were knocked off-line employing Dos Attacks.
  • 7. Cyber Warrior • NATO has created a cyber defence facility in Estonia codenamed K5. • The US has established the „US Cyber Command‟ to defend the country against cyber attacks. • The United Kingdom created two Organisations namely - the „Office of Cyber Security‟ and the „Cyber Security Operations Center‟ to protect its cyber space from attacks. • South Korea has set up its cyber warfare center and has recruited 3000 security experts by now. • Isreal too has an „Internet warfare‟ team dedicated to cyber security.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17. The Great Irony • “It's the great irony of our Information Age -- the very technologies that empower us to create and to build also empower those who would disrupt and destroy. And this paradox - - seen and unseen -- is something that we experience every day.”
  • 18.
  • 19. The Future Face of War ! • The police found four Global Positioning System (GPS) handsets, one satellite phone, nine mobile phones and computer discs with high-resolution images and maps of the 10 sites that were attacked. The terrorists used the Internet to make calls which hampered the investigation. • The terror group took credit for the bloodshed with a series of e-mails to local media. • They used a “remailer" service to mask their identities; earlier attacks were claimed from cyber cafes.
  • 20.
  • 21. The next war will be in cyberspace • All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict !
  • 22. Cyber Security for India • We live in times of e-espionage, where nations and hacking groups across the globe search for vital information relating to intelligence, military or economic policies. Therefore entrusting this huge responsibility to CERT-India will not be in the best interest of the nation. • A separate office designed in the model of the US or UK is the best solution to this. The body has to be constituted with experts in the field at the top management. • The cyber threats call for such decisive steps. Half hearted actions at this juncture will not deliver.
  • 23. Cyber Security –An India Centric Framework 1. Cyber Security Policy 2. Create a cyber command 3. An independent office for cyber security 4. Encourage Research and Development in cyber security 5. State‟s Liability for not protecting personal data 6. Strengthen the legal framework 7. Establish a „single window‟ for registering cyber crimes
  • 24. Continued… 8. Spread awareness about the seriousness of the cyber security problems 9. Establish a Digital work force 10. Private – Public Partnership 11. Conduct „Cyber Exercises‟ 12. Establish Cyber Wings for CBI and NSG 13.Establish a Chief Information Security Officer (CISO) for every State
  • 25. Conclusion • The difference between cybercrime, cyber-espionage, and cyber war is only a couple of keystrokes. • The rapid spread of information and communication technology will only magnify the threat of cyber warfare in years to come.
  • 26.
  • 27. 13. Establish a Chief Information Security Officer (CISO) for every State
  • 28.
  • 29.
  • 30. Is India a heaven for Cybercriminals ?