SlideShare a Scribd company logo
1 of 37
CHALLENGES TO INTERNAL SECURITY THROUGH COMMUNICATION NETWORKS,
ROLE OF MEDIA AND SOCIAL NETWORKING SITES IN INTERNAL SECURITY
CHALLENGES, BASICS OF CYBER SECURITY; MONEY-LAUNDERING AND ITS
PREVENTION
3 to 5 PM on 03 November 2022
Col. (Prof.) Rajive Kohli, Ph.D.
Dr. Ambedkar Centre of Excellence
(DACE)
CHALLENGES TO INTERNAL SECURITY THROUGH:
1. Communication Networks
2. Role of Media and Social Networking Sites
3. Basics of Cyber Security
4. Money-laundering
INDIA'S INTERNAL SECURITY THREATS
Communication Networks
1. For maintaining internal security, effectual communication networks has pivotal role.
2. Communication networks described as an interconnection of communicating through
electronic gadgets like computers, laptops, mobiles, telephones which enables executives
to transmit important and secret information of all other sectors including voice, data,
video, and internet networks.
3. Computer networks such as LAN, WAN are just one type of the Communication networks.
4. Various communication networks are the mainstay of much of the critical infrastructure
in many sectors today such as civil aviation, shipping, railways, power, nuclear, oil and
gas, finance, banking, IT, law enforcement, intelligence agencies, space, defence, and
government networks.
5. Communications systems serve in other key internal and external security and emergency
readiness. Communication networks are mainly dependent on each other in complicated
way. If there is a failure of one communication network, it can affect badly in other
sectors.
CHALLENGES TO INTERNAL SECURITY THROUGH
COMMUNICATION NETWORKS
COMMUNICATION NETWORKS EXSISTING RISKS
1. Protect data and information from growing internet attacks on computing and communication
systems.
2. Security to ensure protected communication among computing/ communication systems and user
applications across public and private networks, is essential for guaranteeing confidentiality,
privacy and data/information protection.
3. Large number of threats and incidents reported to CERT
4. Security in networks and distributed systems is a global challenge.
5. To deal with such debilitating issue, design and develop end-to-end security solutions.
6. Growing need of wireless, ad-hoc and sensor networks also create hazards.
7. Technical feature that create risk is the communication speed in networks versus complex and time
consuming cryptography/security mechanisms and protocols.
8. Network security is a major part of a network that needs to be maintained because information is
being passed between computers and is very susceptible to attack.
9. Increasing trend of hackers and criminals that created malicious threats which disrupted the
communication around the globe.
Network threats that can have adverse impact on communication
network:
1. Viruses
2. Worms
3. Trojan Horses
4. SPAM
5. Phishing
6. Packet Sniffers
7. Maliciously Coded Websites
8. Password Attacks
9. Hardware Loss and Residual Data Fragments
10. Shared Computers
11. Zombie Computers or "drone"
12. Botnets.
NETWORK THREATS
1. Viruses:
• A program or piece of code that is loaded onto computer without user knowledge and runs against his wishes.
Viruses can hugely damage to computers.
• If a virus is downloaded in a network then all computers in the network would be affected because the virus
would make copies of itself and spread across networks.
2. Worms:
• Similar to a virus but a worm can run itself whereas a virus needs a host program to run.
• To protect from viruses and worm, install a security suite.
3. Trojan Horses:
• A program in which malicious or harmful code is contained inside apparently harmless programming or data
in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table
on user's hard disk.
• In a network if a Trojan Horse is installed on a computer and interferes with the file allocation table it could
cause enormous damage to all computers of that network.
• To get protected have Security suites, such as Norton Internet Security.
NETWORK THREATS
4. SPAM:
• It is flooding the Internet with many copies of the same message, in an attempt to force the message on
people who would not otherwise pick to receive it.
• SPAM filters are an effective way to stop SPAM.
• These filters come with most of the e-mail providers online.
5. Phishing:
• A security threat that misuses user's valuable information.
• An e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather
personal and financial information from recipients.
• One of the worst security threats over a network because a lot of people that use computers linked up to a
network are amateurs and would be very susceptible to giving out information that could cause situations
such as theft of money or identity theft.
• Use Phishing filters to filter out this unwanted mail and to prevent threat.
NETWORK THREATS
6. Packet Sniffers:
• A device or program that allows snooping on traffic travelling between networked computers.
• It captures data that is addressed to other machines, saving it for later analysis.
• In a network a packet sniffer can filter out personal information and this can lead to areas such as identity
theft.
• Strong encryption make packets unreadable to any but not the destination address.
• So protection from it is strong encryption.
7. Maliciously Coded Websites
• Some websites across the net contain code that is malicious.
• Programming code that is capable of causing harm to availability, integrity of code or data, or confidentiality in
a computer system.
• AVG report that 300,000 infected sites appear per day (PC Advisor, 2009).
• To protect the system, use a security suite to detect infected sites and try to prevent the user from entering.
NETWORK THREATS
8. Password Attacks:
• Attacks by hackers that are able to regulate passwords or find passwords to different protected electronic
areas.
• Many systems on a network are password protected and hence it would be easy for a hacker to hack into the
systems and steal data.
• Easiest way to get private information because people are able to get software online that obtains the
password.
• Currently, there is no software that prevents password attacks.
9. Hardware Loss and Residual Data Fragments:
• Major security threats for companies and governments.
• If a number of laptops get stolen, say, from a bank that have client details on them, this would enable the
robber's to get personal information from clients and maybe steal the clients identities.
• Only solution is to keep data and hardware under strict surveillance.
NETWORK THREATS
10. Shared Computers:
• Involve sharing a computer with one or more people and it pose threat.
• Suggestions when using shared computers:
i. Do not check the "Remember my ID on this computer" box.
ii. Never leave a computer unattended while signed-in.
iii. Always sign out completely.
iv. Clear the browsers cache.
v. Keep an eye out for "shoulder surfers".
vi. Avoid confidential transactions.
vii. Be wary of spyware.
viii. Never save passwords.
ix. Change password often.
11 Zombie Computers or "drone" :
• A computer that has been secretly compromised by hacking tools which allow a third party to control the
computer and its resources remotely.
• A hacker could hack into a computer and control the computer and obtain data.
• Antivirus software can help prevent zombie computers.
NETWORK THREATS
12 Botnets:
• A number of Internet computers that, although their owners are unaware of it, have been set up to forward
transmissions (including spam or viruses) to other computers on the internet.
• This is a major security threat because the network, unknown to anyone, could be acting as a hub that
forwards malicious files to other computers.
• Network Intrusion Prevention (NIP) systems must be installed.
NETWORK THREATS
 Ministry of Home Affairs has already taken effective measures to strengthen the national security apparatus and
communication and information management systems.
 All internal security activities should be underpinned by vigorous information management to safeguard the
effective use of resources and data assets.
 Security agencies face challenges at every stage of information management such as creation, collection,
storage, and communication.
 To deal with such challenges, security agencies must develop robust and automated information management
and install various protective measures to protect from cyber threats.
MEDIA : PRINT, TV, RADIO
Responsibilities of a media in democracy
1. The fundamental objective of journalism is to serve the people with news, views, comments and
information on matters of public interest in a fair, accurate, unbiased and decent manner and language.
2. The press is an indispensable pillar of democracy. It purveys public opinion and shapes it. Parliamentary
democracy can flourish only under the watchful eyes of the media.
3. With the advent of private TV channels, the media seems to have taken over the reins of human life and
society in every walk of life.
4. The media today does not remain satisfied as the Fourth Estate, it has assumed the foremost importance
in society and governance. While playing the role of informer, the media also takes the shape of a
motivator and a leader.
5. Such is the influence of media that it can make or unmake any individual, institution or any thought. So, all
pervasive and all-powerful is its impact on the society. With so much power and strength, the media
cannot lose sight of its privileges, duties and obligations.
Challenges faced by media
1. The issues of paid news, media trial, non-issues being presented as real news while the real issues are
sidelined, the news is being doctored and fact distortion for profits and political favour, fake news, yellow
journalism are important concerns which are influencing public and impacting national security.For
instance, fear mongering through media has led to mob lynchings and attacks on the migrant population.
2. The absence of objective journalism leads to the false presentation of truth in a society which affects the
perception and opinions of people. As observed in the case of Cambridge Analytica case, the biased news
coverage on social media platform affected the US Presidential elections.
3. The chase for sensationalism and higher TRP rates as observed in the coverage of 26/11 terrorist attacks in
India risked the internal security of the nation. The sensationalism-driven reporting compromised the
identities of rape victims and survivors despite SC guidelines.
4. Trial by media does not follow the due process of law and can reduce the public trust in institutions of
governance like the judiciary.
5. Paid news and fake news can manipulate public perception and can instigate hatred, violence, and disharmony
among the various community within society.
6. With the advent of social media, technological changes, the reach of media has grown profoundly. Its reach
and role in impacting public opinion have made it even more important to ensure its objectivity, non-
partisanship calls for the enforcement of journalistic ethics.
Social Media
1. Defined as any web or mobile-based platform that enables an individual or agency to communicate interactively
and enables the exchange of user-generated content
2. It includes blogs, Wikis, discussion forums, micro-blogs, Twitter and social networking sites.
3. It has become synonymous with Social Networking sites such as Facebook or Micro Blogging sites such as
Twitter.
4. Advantages are many but posing threat to Internal Security in various forms like Cyber Terrorism, Fraud, crime,
spreading violence, etc.
5. Highest concentration of online security threats are on mass audience sites.
6. Rapid spread of false information through social media is among the emerging risks.
7. It act as platform for numerous internal security challenges.
8. Social media is not a security threat in itself, but the users of these services can pose threats by their anti-social
endeavours.
9. With limited government oversight, industry standards or incentives to educate users on security, privacy and
identity protection, users are exposed to identity theft and fraud.
10. These platforms have huge confidential user information and are likely vulnerable to an outside or inside attack
which is detrimental to Internal Security.
ROLE OF MEDIA & SOCIAL NETWORKING SITES
IN INTERNAL SECURITY CHALLENGES
Internal Security threats due to Social Media are:
I. Cyber Terrorism
II. Fraud
III. Criminal Activity and Money laundering
IV. Other National and International Users
V. To Bring Revolution
VI. Communal Violence and Fanning Tensions
VII. Virtual Community
VIII. Hacking
I. CYBER TERRORISM:
1. Biggest challenge for the internal security of a nation through social networking sites.
2. Terrorists select this to disturb the function of nations and other business activities, as this technique has the
potential to cause huge damage.
3. Enormous threat to the international system and attracts the mass media, the security community, and the
information technology corporation.
4. Due to the convenience, affordability and broad reach of social media platforms, terrorist groups use social
media to further their goals and spread their message.
5. It became a platform for
i. coordinating plans of attack,
ii. communication with cells,
iii. propaganda and information,
iv. spread of hate campaigns or messages that can hurt the sentiments of people.
6. These groups have own websites where they can convey their propaganda and advise their readers and
followers not to trust the media which are seen as the enemy.
7. The chat service that includes voice and video capabilities, are popular with terrorist cells. Chat rooms and
electronic forums enable these groups to communicate with members and supporters all over the world, recruit
new followers and share information at little risk of identification.
8. Youths are especially targeted for propaganda, incitement and recruitment.
THREATS DUE TO SOCIAL MEDIA
1. II. FRAUD:
Social networking sites attract fraudsters to become wealthy by applying deceiver schemes.
III. CRIMINAL ACTIVITY AND MONEY LAUNDERING:
1. Internet Media is a major resource for developing serious crime.
2. As the Internet is growing explosively, online criminals try innovative fraudulent plans.
3. Social networking sites also a major challenge in financial and organized crime.
4. It creates a threat to a company's security because of what employees might disclose and they are on prime
target for cybercriminals.
IV. OTHER NATIONAL AND INTERNATIONAL USERS:
1. Such as the political parties, NGO's, hackers pose a serious threat using social media.
2. For example, during the civil turmoil in the Arab Spring Uprising, the various governments were threatened
through social media.
V. TO BRING REVOLUTION:
1. Some countries in the world feel threatened by the fact that social media can bring people together and thus,
create a revolution. This, in turn, can cause political instability.
THREATS DUE TO SOCIAL MEDIA
VI. COMMUNAL VIOLENCE AND FANNING TENSIONS:
1. Significant role in polarizing different communities in India and compounding Security challenges.
2. Viral videos and false updates of communal clashes, riots and terrorists attacks have created a massive impact
on public.
3. The power of media and the process of public opinion formation in a free society had undergone radical
change due to the Internet and faster means of communications like SMS, Whatsapp, Viber and simplified
mobile internet.
4. The chain of events beginning with the clashes in northeast that caused d mass exodus of North-east
population from several Indian cities has revealed the fragility.
VII. VIRTUAL COMMUNITY:
1. Popular social networking websites are another means of attracting potential members and followers.
2. These types of virtual communities are growing increasingly popular all over the world.
3. This can build Anti-national Sentiments among Society.
THREATS DUE TO SOCIAL MEDIA
VIII. Hacking:
1. Hackers write or use ready-made computer programs to attack the target computer.
2. By using Social Media hackers breach national security and steal important data of defence or other strategic
sectors.
3. This can upset the whole country without using Arms and Ammunition.
THREATS DUE TO SOCIAL MEDIA
ADVANTAGES OF SOCIAL MEDIA
1) Although social media has the potential to be a threat to national security, it also has the opportunity
to strengthen National Security and to be used to benefit the Government.
2) One of the fastest-growing ways that Governments are using social media is as a warning or trend
prevention tool.
3) As a monitoring tool, the government is able to recognize the first signs of any hostile or
potentially dangerous activity by collecting and analyzing messages in order to try to predict
events that could be a danger to National Security.
4) Another important use of social media by the government is as an institutional Communication
Tool. Social Media provides a medium that creates cohesion between federal agencies by
increasing both communication and transparency.
e-Surveillance Projects in India
1. National Intelligence Grid (NATGRID)
2. Central Monitoring System (CMS)
3. Internet Spy System Network and Traffic Analysis System (NETRA) of India
4. National Critical Information Infrastructure Protection Centre (NCIPC) of India
5. National Cyber Coordination Centre (NCCC) of India
6. Tri Service Cyber Command for Armed Forces of India
7. Cyber Attacks Crisis Management Plan Of India.
CHALLENGES IN MONITORING SOCIAL MEDIA
1. Server Location and Laws of Different Countries:
• Lack of Geographical Boundaries makes social media regulation an arduous task.
• Major Complicating Factors to secure the networks and Media
• Much of the hardware and software that make up the communications ecosystem is sourced externally.
2. Encrypted Message:
• The use of phones/WhatsApp to send and receive messages concerns the government because the
communications sent via such devices and applications are encrypted and could not be monitored and
consequently hinders the country's efforts to fight terrorism and crime.
3. Complicated Networks:
• The task of securing the networks is also complicated by the fact that much of the infrastructure is in the
hands of private companies who see measures such as security auditing and other regulations and
frameworks as adding to their costs.
• The Source of Origin is difficult to find out.
CHALLENGES TO INTERNAL SECURITY THROUGH:
CYBER SECURITY
BACKGROUND
1. Cybercrime is vastly growing in the world of technology today.
2. Criminals of the World Wide Web exploit internet users’ personal information for their own gain.
3. They dive deep into the dark web to buy and sell illegal products and services.
4. They even gain access to classified government information.
5. The evolution of technology and increasing accessibility of smart tech means there are multiple access
points within users’ homes for hackers to exploit.
6. As the world gets absorbed by the COVID-19 pandemic, cyber attacks have become a critical area for
all technology-focused organizations in India.
Recent incidents of cyber attack
The most cyber-attacked countries in 2019 were the US, India, UK, Singapore, Ukraine, UAE,
Nigeria, Japan, South Korea and Spain.
Pegasus is spyware developed by the Israeli cyber-arms company NSO Group that can be covertly
installed on mobile phones running most versions of iOS and Android.
1. Digital India aims to transform the country into a digitally empowered society and knowledge economy.
However, the transition to a Digital India comes with a new set of vulnerabilities.
2. India ranks 3rd in terms of the highest number of internet users in the world after USA and China.
3. The Indian Computer Emergency Response Team (CERT-In) has reported a steep four-fold rise of
cybersecurity incidents in a year (2017 to 2018).
4. Some of the important examples of cyber-attacks are- Union Bank Of India Heist (2016), Wannacry
Ransomware (2017), Data Theft At Zomato (2017), PETYA Ransomware (2017) etc.
5. Thus, Cyber Security becomes very significant in protecting our digital space from attack, damage,
misuse and economic espionage.
VULNERABILITIES OF CYBERSPACE IN INDIA:
FACTORS CONTRIBUTING TO THE CYBER SECURITY THREATS
1. Increasing digitalization
2. Pool of digitally vulnerable targets
3. Heavier dependence on digital technology
4. Digital Illiteracy
What does India need?
1. Cyber security guidelines with Comprehensive
standards
2. Cyber defence network
3. Strengthened policy framework
4. National Cyber Coordination Centre (NCCC),
5. National Critical Information Infrastructure Protection
Centre (NCIIPC)
6. Computer Emergency Response Team (CERT)
CYBERSECURITY CHALLENGES FOR INDIA
1. Lack of national-level architecture for Cybersecurity: Lack of unified efforts to secure Critical
Infrastructure of t public and private sphere, reducing capability of security architecture to assess
threats and tackle them effectively, in a coordinated manner.
2. Shortage of trained workforce: Although India is rife with a young workforce with considerable IT
prowess, there is a dearth of talent when it comes to specific niches, such as Cyber Security. The
demand for talented and skilled manpower far outgrows supply.
3. Lack of high-end secured devices: In India, less than 1% of mobile phone users have access to mobile
phones with higher security norms. With varying income groups in India, not everyone can afford high
end secured phones and this increases vulnerability.
4. Imported hardware may increase cyber threats: Most equipment and technology for setting up Cyber
Security infrastructure in India are currently procured from global sources and their embedded
software may increase the cyber security threats.
5. Lack of awareness: There is a lack of awareness about cyber fraud, cyber laws and regulations at both
corporate levels as well as individual levels.
6. Cyberspace, as it always keeps evolving, has inherent vulnerabilities that cannot be removed.
INDIAN LAWS CONCERNING CYBER SECURITY
1. Information Technology Act, 2000
2. Crime and Criminal Tracking Network System (CCTNS)
3. National Cyber Security Policy, 2013
4. National Technical Research Organization (NTRO)
5. National Critical Information Infrastructure Protection Centre (NCIIPC)
6. CERT-In
7. National Cyber Coordination Centre (NCCC)
8. Cyber Surakshit Bharat
9. India-ITU Joint Cyberdrill event
The National Security Council secretariat organised National Cyber security
incident response exercise NCX, for Government officials and Critical sector
Organisations.
1. CERT-In is a functional organisation of Ministry of Electronics and Information
Technology, with the objective of securing Indian cyber space.
2. CERT-In provides Incident Prevention and Response services as well as Security Quality
Management Services.
3. Vision: Proactive Contribution in Securing India's cyber space.
4. Mission: To enhance the security of India's Communications and Information
Infrastructure through proactive action and effective collaboration.
5. Objectives:
• Preventing cyber attacks against the country's cyber space.
• Responding to cyber attacks and minimizing damage and recovery time
• Reducing national vulnerability to cyber attacks.
• Enhancing security awareness among common citizens.
Indian Computer Emergency Response Team (CERT-In)
6. Functions/Activities:
i. The Information Technology (Amendment) Act 2008, designated CERT-In to serve as
the national agency to perform the following functions inthe area of cyber security:
ii. Collection, analysis and dissemination of information on cyberincidents.
iii. Forecast and alerts of cyber security incidents.
iv. Emergency measures for handling cyber security incidents.
v. Coordination of cyber incident response activities.
vi. Issue guidelines, advisories, vulnerability notes and white papers relating to
information security practices, procedures, prevention, response and reporting of
cyber incidents.
vii. Such other functions relating to cyber security as may be prescribed.
MEASURES TO ENHANCE CYBERSECURITY EXPERTISE OF INDIA
1. Updation of outdated policy: India needs to refresh its National Cyber Security Policy that must be in
sync with present-day technological and ecosystem realities. India’s cybersecurity framework should be
able to protect against intrusions at all levels in the public and private sector.
2. Role of Government: It is needed to define roles and responsibilities for oversight and implementation
across implementation agencies. This will enable strong intra-government coordination on cybersecurity
issues. Also, there is a need to enhance cybersecurity capacity at the state level.
3. Creating skilled Human Resource: Skilled and trained workforce is key to better cybersecurity in the
country. They should be able to create a safe and secured cyber architecture.
4. Cooperation with private sectors: It requires budgetary allocations and opportunities for raising
additional resources, through the involvement of the private sector, toward meeting the cybersecurity
challenge.
The digital economy today comprises 14-15% of India’s total economy and is targeted to reach 20% by 2024. India’s future
economic prospects depend very much on cyber security. Thus, it is imperative that we take the necessary steps to make
India’s cyberspace safe and secured with expertise in cybersecurity.
CYBER WARFARE
1. Cyber warfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on
another nation-state. In these types of attacks, nation-state actors attempt to disrupt the activities of
organizations or nation-states, especially for strategic or military purposes and cyber espionage.
2. It involves the actions by a nation-state or international organization to attack and attempt to damage another
nation’s computers or information networks through, computer viruses or denial-of-service attacks.
3. In 2020, the US Department of Defence exposed an information-stealing malware, SlothfulMedia, for
cyberattacks against targets in India, Kazakhstan, Kyrgyzstan, Malaysia, Russia and Ukraine.
4. Misinformation campaign conducted by Russian bots during the 2016 US presidential elections.
5. Sowing disinformation through social media is also cyberwarfare. Russia has been particularly savvy in this field
but China has stepped up its game.
6. Intellectual property rights are another avenue— in 2014, the US justice department indicted five Chinese
military hackers and accused them of stealing secrets from US companies.
7. Military cyberattacks are perhaps the most associated with cyberwarfare — the “Sandworm Team”, associated
with Russian intelligence, has conducted attacks on government sectors in the US, Ukraine, Poland, and on the
European Union and NATO.
8. Cyberattack occurred in 2010 when a malware “Stuxnet” that was designed to damage Iran’s nuclear capability
by making Iranian scientists and government think there were a series of internal engineering mishaps at their
enrichment facility.
CHALLENGES TO INTERNAL SECURITY THROUGH:
MONEY-LAUNDERING
1. BACKGROUND
2. Money laundering in the banking sector has been a recurring problem in India for over a
century.
3. Money Laundering is basically a process where the proceeds of crime are converted into legal
money.
4. Its intention is to conceal money from the State so that to prevent loss by taxation,
confiscation, etc.
Regulations in India
1. Prevention of Money Laundering Act was passed in India in the year 2002. Currently, this is the only
weapon in the fight against money laundering in India.
2. The Director of the Financial Intelligence Unit – India (FIU-IND) is empowered to impose fines on
financial institutions.
3. RBI, SEBI, and Insurance Regulatory and Development Authority (IRDA) have been brought under
the purview of PMLA, 2002. Hence, the provisions of this Act shall apply to all financial institutions,
banks, mutual funds, insurance companies, and their financial intermediaries.
NEGATIVE EFFECTS OF MONEY LAUNDERING
1. Threatened system: Money Laundering threatens national governments and international relations
between them through corruption of officials and legal systems.
2. Threatened financial system: It undermines free enterprise and threatens financial stability by
crowding out the private sector, as legitimate businesses cannot compete with the lower prices for
goods and services that businesses using laundered funds can offer.
3. Others challenges posed by money-laundering activities:
4. Rise in terrorism
i. Threat to Banking System
ii. Threat to Economic Stability
iii. Discourages foreign investors
iv. Encourages tax evasion culture
v. Results in exchange and interest rates volatility
vi. Undermining of the integrity of fi nancial markets
vii. Loss of revenue
viii. Reputation risk
SOCIAL IMPACTS OF MONEY LAUNDERING
1. Increased criminality
2. Decreases human development
3. Misallocation of resources
4. Affects trust of local citizens in their domestic financial institutions
5. Declines the moral and social position of the society by exposing it to activities such as
drug trafficking, smuggling, corruption and other criminal activities
POLITICAL IMPACTS OF MONEY LAUNDERING
1. Initiates political distrust and instability
2. Criminalization of politics
CHALLENGES IN TACKLING MONEY LAUNDERING
1. Growth of Technology
2. Non-fulfillment of the purpose of KYC Norms
3. Widespread act of smuggling
4. Lack of comprehensive enforcement agencies
5. Tax Heaven Countries
Q. “Digital India requires strong focus on cyber security.” Discuss the challenges faced by cyber security and suggest
ways to increase cyber expertise in India. (250 words)
Approach:
• In introduction, write the significance of cyber security in the present times, especially when there is an emphasis on
“Digital India”.
• Discuss the challenges faced by cybersecurity in India.
• Suggest ways to increase cyber expertise in India to tackle such challenges.
Q. Keeping in view of India’s internal security, analyse the impact of cross-border cyber-attacks. Also, discuss defensive
measures against these sophisticated attacks. (150 words) GS3 UPSC 2021
Q. Discuss the potential threats of Cyber attack and the security framework to prevent it. (150 words) GS3 UPSC 2017
Q. Discuss the role of social networking sites in internal security challenges. (150 words)

More Related Content

Similar to 3Nov Challanges to Inernal Security.pptx

What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
info309708
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Similar to 3Nov Challanges to Inernal Security.pptx (20)

Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

3Nov Challanges to Inernal Security.pptx

  • 1. CHALLENGES TO INTERNAL SECURITY THROUGH COMMUNICATION NETWORKS, ROLE OF MEDIA AND SOCIAL NETWORKING SITES IN INTERNAL SECURITY CHALLENGES, BASICS OF CYBER SECURITY; MONEY-LAUNDERING AND ITS PREVENTION 3 to 5 PM on 03 November 2022 Col. (Prof.) Rajive Kohli, Ph.D. Dr. Ambedkar Centre of Excellence (DACE)
  • 2. CHALLENGES TO INTERNAL SECURITY THROUGH: 1. Communication Networks 2. Role of Media and Social Networking Sites 3. Basics of Cyber Security 4. Money-laundering
  • 4. Communication Networks 1. For maintaining internal security, effectual communication networks has pivotal role. 2. Communication networks described as an interconnection of communicating through electronic gadgets like computers, laptops, mobiles, telephones which enables executives to transmit important and secret information of all other sectors including voice, data, video, and internet networks. 3. Computer networks such as LAN, WAN are just one type of the Communication networks. 4. Various communication networks are the mainstay of much of the critical infrastructure in many sectors today such as civil aviation, shipping, railways, power, nuclear, oil and gas, finance, banking, IT, law enforcement, intelligence agencies, space, defence, and government networks. 5. Communications systems serve in other key internal and external security and emergency readiness. Communication networks are mainly dependent on each other in complicated way. If there is a failure of one communication network, it can affect badly in other sectors. CHALLENGES TO INTERNAL SECURITY THROUGH COMMUNICATION NETWORKS
  • 5. COMMUNICATION NETWORKS EXSISTING RISKS 1. Protect data and information from growing internet attacks on computing and communication systems. 2. Security to ensure protected communication among computing/ communication systems and user applications across public and private networks, is essential for guaranteeing confidentiality, privacy and data/information protection. 3. Large number of threats and incidents reported to CERT 4. Security in networks and distributed systems is a global challenge. 5. To deal with such debilitating issue, design and develop end-to-end security solutions. 6. Growing need of wireless, ad-hoc and sensor networks also create hazards. 7. Technical feature that create risk is the communication speed in networks versus complex and time consuming cryptography/security mechanisms and protocols. 8. Network security is a major part of a network that needs to be maintained because information is being passed between computers and is very susceptible to attack. 9. Increasing trend of hackers and criminals that created malicious threats which disrupted the communication around the globe.
  • 6. Network threats that can have adverse impact on communication network: 1. Viruses 2. Worms 3. Trojan Horses 4. SPAM 5. Phishing 6. Packet Sniffers 7. Maliciously Coded Websites 8. Password Attacks 9. Hardware Loss and Residual Data Fragments 10. Shared Computers 11. Zombie Computers or "drone" 12. Botnets. NETWORK THREATS
  • 7. 1. Viruses: • A program or piece of code that is loaded onto computer without user knowledge and runs against his wishes. Viruses can hugely damage to computers. • If a virus is downloaded in a network then all computers in the network would be affected because the virus would make copies of itself and spread across networks. 2. Worms: • Similar to a virus but a worm can run itself whereas a virus needs a host program to run. • To protect from viruses and worm, install a security suite. 3. Trojan Horses: • A program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on user's hard disk. • In a network if a Trojan Horse is installed on a computer and interferes with the file allocation table it could cause enormous damage to all computers of that network. • To get protected have Security suites, such as Norton Internet Security. NETWORK THREATS
  • 8. 4. SPAM: • It is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise pick to receive it. • SPAM filters are an effective way to stop SPAM. • These filters come with most of the e-mail providers online. 5. Phishing: • A security threat that misuses user's valuable information. • An e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients. • One of the worst security threats over a network because a lot of people that use computers linked up to a network are amateurs and would be very susceptible to giving out information that could cause situations such as theft of money or identity theft. • Use Phishing filters to filter out this unwanted mail and to prevent threat. NETWORK THREATS
  • 9. 6. Packet Sniffers: • A device or program that allows snooping on traffic travelling between networked computers. • It captures data that is addressed to other machines, saving it for later analysis. • In a network a packet sniffer can filter out personal information and this can lead to areas such as identity theft. • Strong encryption make packets unreadable to any but not the destination address. • So protection from it is strong encryption. 7. Maliciously Coded Websites • Some websites across the net contain code that is malicious. • Programming code that is capable of causing harm to availability, integrity of code or data, or confidentiality in a computer system. • AVG report that 300,000 infected sites appear per day (PC Advisor, 2009). • To protect the system, use a security suite to detect infected sites and try to prevent the user from entering. NETWORK THREATS
  • 10. 8. Password Attacks: • Attacks by hackers that are able to regulate passwords or find passwords to different protected electronic areas. • Many systems on a network are password protected and hence it would be easy for a hacker to hack into the systems and steal data. • Easiest way to get private information because people are able to get software online that obtains the password. • Currently, there is no software that prevents password attacks. 9. Hardware Loss and Residual Data Fragments: • Major security threats for companies and governments. • If a number of laptops get stolen, say, from a bank that have client details on them, this would enable the robber's to get personal information from clients and maybe steal the clients identities. • Only solution is to keep data and hardware under strict surveillance. NETWORK THREATS
  • 11. 10. Shared Computers: • Involve sharing a computer with one or more people and it pose threat. • Suggestions when using shared computers: i. Do not check the "Remember my ID on this computer" box. ii. Never leave a computer unattended while signed-in. iii. Always sign out completely. iv. Clear the browsers cache. v. Keep an eye out for "shoulder surfers". vi. Avoid confidential transactions. vii. Be wary of spyware. viii. Never save passwords. ix. Change password often. 11 Zombie Computers or "drone" : • A computer that has been secretly compromised by hacking tools which allow a third party to control the computer and its resources remotely. • A hacker could hack into a computer and control the computer and obtain data. • Antivirus software can help prevent zombie computers. NETWORK THREATS
  • 12. 12 Botnets: • A number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the internet. • This is a major security threat because the network, unknown to anyone, could be acting as a hub that forwards malicious files to other computers. • Network Intrusion Prevention (NIP) systems must be installed. NETWORK THREATS  Ministry of Home Affairs has already taken effective measures to strengthen the national security apparatus and communication and information management systems.  All internal security activities should be underpinned by vigorous information management to safeguard the effective use of resources and data assets.  Security agencies face challenges at every stage of information management such as creation, collection, storage, and communication.  To deal with such challenges, security agencies must develop robust and automated information management and install various protective measures to protect from cyber threats.
  • 13. MEDIA : PRINT, TV, RADIO Responsibilities of a media in democracy 1. The fundamental objective of journalism is to serve the people with news, views, comments and information on matters of public interest in a fair, accurate, unbiased and decent manner and language. 2. The press is an indispensable pillar of democracy. It purveys public opinion and shapes it. Parliamentary democracy can flourish only under the watchful eyes of the media. 3. With the advent of private TV channels, the media seems to have taken over the reins of human life and society in every walk of life. 4. The media today does not remain satisfied as the Fourth Estate, it has assumed the foremost importance in society and governance. While playing the role of informer, the media also takes the shape of a motivator and a leader. 5. Such is the influence of media that it can make or unmake any individual, institution or any thought. So, all pervasive and all-powerful is its impact on the society. With so much power and strength, the media cannot lose sight of its privileges, duties and obligations.
  • 14. Challenges faced by media 1. The issues of paid news, media trial, non-issues being presented as real news while the real issues are sidelined, the news is being doctored and fact distortion for profits and political favour, fake news, yellow journalism are important concerns which are influencing public and impacting national security.For instance, fear mongering through media has led to mob lynchings and attacks on the migrant population. 2. The absence of objective journalism leads to the false presentation of truth in a society which affects the perception and opinions of people. As observed in the case of Cambridge Analytica case, the biased news coverage on social media platform affected the US Presidential elections. 3. The chase for sensationalism and higher TRP rates as observed in the coverage of 26/11 terrorist attacks in India risked the internal security of the nation. The sensationalism-driven reporting compromised the identities of rape victims and survivors despite SC guidelines. 4. Trial by media does not follow the due process of law and can reduce the public trust in institutions of governance like the judiciary. 5. Paid news and fake news can manipulate public perception and can instigate hatred, violence, and disharmony among the various community within society. 6. With the advent of social media, technological changes, the reach of media has grown profoundly. Its reach and role in impacting public opinion have made it even more important to ensure its objectivity, non- partisanship calls for the enforcement of journalistic ethics.
  • 15. Social Media 1. Defined as any web or mobile-based platform that enables an individual or agency to communicate interactively and enables the exchange of user-generated content 2. It includes blogs, Wikis, discussion forums, micro-blogs, Twitter and social networking sites. 3. It has become synonymous with Social Networking sites such as Facebook or Micro Blogging sites such as Twitter. 4. Advantages are many but posing threat to Internal Security in various forms like Cyber Terrorism, Fraud, crime, spreading violence, etc. 5. Highest concentration of online security threats are on mass audience sites. 6. Rapid spread of false information through social media is among the emerging risks. 7. It act as platform for numerous internal security challenges. 8. Social media is not a security threat in itself, but the users of these services can pose threats by their anti-social endeavours. 9. With limited government oversight, industry standards or incentives to educate users on security, privacy and identity protection, users are exposed to identity theft and fraud. 10. These platforms have huge confidential user information and are likely vulnerable to an outside or inside attack which is detrimental to Internal Security. ROLE OF MEDIA & SOCIAL NETWORKING SITES IN INTERNAL SECURITY CHALLENGES
  • 16. Internal Security threats due to Social Media are: I. Cyber Terrorism II. Fraud III. Criminal Activity and Money laundering IV. Other National and International Users V. To Bring Revolution VI. Communal Violence and Fanning Tensions VII. Virtual Community VIII. Hacking
  • 17. I. CYBER TERRORISM: 1. Biggest challenge for the internal security of a nation through social networking sites. 2. Terrorists select this to disturb the function of nations and other business activities, as this technique has the potential to cause huge damage. 3. Enormous threat to the international system and attracts the mass media, the security community, and the information technology corporation. 4. Due to the convenience, affordability and broad reach of social media platforms, terrorist groups use social media to further their goals and spread their message. 5. It became a platform for i. coordinating plans of attack, ii. communication with cells, iii. propaganda and information, iv. spread of hate campaigns or messages that can hurt the sentiments of people. 6. These groups have own websites where they can convey their propaganda and advise their readers and followers not to trust the media which are seen as the enemy. 7. The chat service that includes voice and video capabilities, are popular with terrorist cells. Chat rooms and electronic forums enable these groups to communicate with members and supporters all over the world, recruit new followers and share information at little risk of identification. 8. Youths are especially targeted for propaganda, incitement and recruitment. THREATS DUE TO SOCIAL MEDIA
  • 18. 1. II. FRAUD: Social networking sites attract fraudsters to become wealthy by applying deceiver schemes. III. CRIMINAL ACTIVITY AND MONEY LAUNDERING: 1. Internet Media is a major resource for developing serious crime. 2. As the Internet is growing explosively, online criminals try innovative fraudulent plans. 3. Social networking sites also a major challenge in financial and organized crime. 4. It creates a threat to a company's security because of what employees might disclose and they are on prime target for cybercriminals. IV. OTHER NATIONAL AND INTERNATIONAL USERS: 1. Such as the political parties, NGO's, hackers pose a serious threat using social media. 2. For example, during the civil turmoil in the Arab Spring Uprising, the various governments were threatened through social media. V. TO BRING REVOLUTION: 1. Some countries in the world feel threatened by the fact that social media can bring people together and thus, create a revolution. This, in turn, can cause political instability. THREATS DUE TO SOCIAL MEDIA
  • 19. VI. COMMUNAL VIOLENCE AND FANNING TENSIONS: 1. Significant role in polarizing different communities in India and compounding Security challenges. 2. Viral videos and false updates of communal clashes, riots and terrorists attacks have created a massive impact on public. 3. The power of media and the process of public opinion formation in a free society had undergone radical change due to the Internet and faster means of communications like SMS, Whatsapp, Viber and simplified mobile internet. 4. The chain of events beginning with the clashes in northeast that caused d mass exodus of North-east population from several Indian cities has revealed the fragility. VII. VIRTUAL COMMUNITY: 1. Popular social networking websites are another means of attracting potential members and followers. 2. These types of virtual communities are growing increasingly popular all over the world. 3. This can build Anti-national Sentiments among Society. THREATS DUE TO SOCIAL MEDIA
  • 20. VIII. Hacking: 1. Hackers write or use ready-made computer programs to attack the target computer. 2. By using Social Media hackers breach national security and steal important data of defence or other strategic sectors. 3. This can upset the whole country without using Arms and Ammunition. THREATS DUE TO SOCIAL MEDIA
  • 21. ADVANTAGES OF SOCIAL MEDIA 1) Although social media has the potential to be a threat to national security, it also has the opportunity to strengthen National Security and to be used to benefit the Government. 2) One of the fastest-growing ways that Governments are using social media is as a warning or trend prevention tool. 3) As a monitoring tool, the government is able to recognize the first signs of any hostile or potentially dangerous activity by collecting and analyzing messages in order to try to predict events that could be a danger to National Security. 4) Another important use of social media by the government is as an institutional Communication Tool. Social Media provides a medium that creates cohesion between federal agencies by increasing both communication and transparency.
  • 22. e-Surveillance Projects in India 1. National Intelligence Grid (NATGRID) 2. Central Monitoring System (CMS) 3. Internet Spy System Network and Traffic Analysis System (NETRA) of India 4. National Critical Information Infrastructure Protection Centre (NCIPC) of India 5. National Cyber Coordination Centre (NCCC) of India 6. Tri Service Cyber Command for Armed Forces of India 7. Cyber Attacks Crisis Management Plan Of India.
  • 23. CHALLENGES IN MONITORING SOCIAL MEDIA 1. Server Location and Laws of Different Countries: • Lack of Geographical Boundaries makes social media regulation an arduous task. • Major Complicating Factors to secure the networks and Media • Much of the hardware and software that make up the communications ecosystem is sourced externally. 2. Encrypted Message: • The use of phones/WhatsApp to send and receive messages concerns the government because the communications sent via such devices and applications are encrypted and could not be monitored and consequently hinders the country's efforts to fight terrorism and crime. 3. Complicated Networks: • The task of securing the networks is also complicated by the fact that much of the infrastructure is in the hands of private companies who see measures such as security auditing and other regulations and frameworks as adding to their costs. • The Source of Origin is difficult to find out.
  • 24. CHALLENGES TO INTERNAL SECURITY THROUGH: CYBER SECURITY BACKGROUND 1. Cybercrime is vastly growing in the world of technology today. 2. Criminals of the World Wide Web exploit internet users’ personal information for their own gain. 3. They dive deep into the dark web to buy and sell illegal products and services. 4. They even gain access to classified government information. 5. The evolution of technology and increasing accessibility of smart tech means there are multiple access points within users’ homes for hackers to exploit. 6. As the world gets absorbed by the COVID-19 pandemic, cyber attacks have become a critical area for all technology-focused organizations in India. Recent incidents of cyber attack The most cyber-attacked countries in 2019 were the US, India, UK, Singapore, Ukraine, UAE, Nigeria, Japan, South Korea and Spain. Pegasus is spyware developed by the Israeli cyber-arms company NSO Group that can be covertly installed on mobile phones running most versions of iOS and Android.
  • 25. 1. Digital India aims to transform the country into a digitally empowered society and knowledge economy. However, the transition to a Digital India comes with a new set of vulnerabilities. 2. India ranks 3rd in terms of the highest number of internet users in the world after USA and China. 3. The Indian Computer Emergency Response Team (CERT-In) has reported a steep four-fold rise of cybersecurity incidents in a year (2017 to 2018). 4. Some of the important examples of cyber-attacks are- Union Bank Of India Heist (2016), Wannacry Ransomware (2017), Data Theft At Zomato (2017), PETYA Ransomware (2017) etc. 5. Thus, Cyber Security becomes very significant in protecting our digital space from attack, damage, misuse and economic espionage. VULNERABILITIES OF CYBERSPACE IN INDIA:
  • 26. FACTORS CONTRIBUTING TO THE CYBER SECURITY THREATS 1. Increasing digitalization 2. Pool of digitally vulnerable targets 3. Heavier dependence on digital technology 4. Digital Illiteracy What does India need? 1. Cyber security guidelines with Comprehensive standards 2. Cyber defence network 3. Strengthened policy framework 4. National Cyber Coordination Centre (NCCC), 5. National Critical Information Infrastructure Protection Centre (NCIIPC) 6. Computer Emergency Response Team (CERT)
  • 27. CYBERSECURITY CHALLENGES FOR INDIA 1. Lack of national-level architecture for Cybersecurity: Lack of unified efforts to secure Critical Infrastructure of t public and private sphere, reducing capability of security architecture to assess threats and tackle them effectively, in a coordinated manner. 2. Shortage of trained workforce: Although India is rife with a young workforce with considerable IT prowess, there is a dearth of talent when it comes to specific niches, such as Cyber Security. The demand for talented and skilled manpower far outgrows supply. 3. Lack of high-end secured devices: In India, less than 1% of mobile phone users have access to mobile phones with higher security norms. With varying income groups in India, not everyone can afford high end secured phones and this increases vulnerability. 4. Imported hardware may increase cyber threats: Most equipment and technology for setting up Cyber Security infrastructure in India are currently procured from global sources and their embedded software may increase the cyber security threats. 5. Lack of awareness: There is a lack of awareness about cyber fraud, cyber laws and regulations at both corporate levels as well as individual levels. 6. Cyberspace, as it always keeps evolving, has inherent vulnerabilities that cannot be removed.
  • 28. INDIAN LAWS CONCERNING CYBER SECURITY 1. Information Technology Act, 2000 2. Crime and Criminal Tracking Network System (CCTNS) 3. National Cyber Security Policy, 2013 4. National Technical Research Organization (NTRO) 5. National Critical Information Infrastructure Protection Centre (NCIIPC) 6. CERT-In 7. National Cyber Coordination Centre (NCCC) 8. Cyber Surakshit Bharat 9. India-ITU Joint Cyberdrill event The National Security Council secretariat organised National Cyber security incident response exercise NCX, for Government officials and Critical sector Organisations.
  • 29. 1. CERT-In is a functional organisation of Ministry of Electronics and Information Technology, with the objective of securing Indian cyber space. 2. CERT-In provides Incident Prevention and Response services as well as Security Quality Management Services. 3. Vision: Proactive Contribution in Securing India's cyber space. 4. Mission: To enhance the security of India's Communications and Information Infrastructure through proactive action and effective collaboration. 5. Objectives: • Preventing cyber attacks against the country's cyber space. • Responding to cyber attacks and minimizing damage and recovery time • Reducing national vulnerability to cyber attacks. • Enhancing security awareness among common citizens. Indian Computer Emergency Response Team (CERT-In)
  • 30. 6. Functions/Activities: i. The Information Technology (Amendment) Act 2008, designated CERT-In to serve as the national agency to perform the following functions inthe area of cyber security: ii. Collection, analysis and dissemination of information on cyberincidents. iii. Forecast and alerts of cyber security incidents. iv. Emergency measures for handling cyber security incidents. v. Coordination of cyber incident response activities. vi. Issue guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response and reporting of cyber incidents. vii. Such other functions relating to cyber security as may be prescribed.
  • 31. MEASURES TO ENHANCE CYBERSECURITY EXPERTISE OF INDIA 1. Updation of outdated policy: India needs to refresh its National Cyber Security Policy that must be in sync with present-day technological and ecosystem realities. India’s cybersecurity framework should be able to protect against intrusions at all levels in the public and private sector. 2. Role of Government: It is needed to define roles and responsibilities for oversight and implementation across implementation agencies. This will enable strong intra-government coordination on cybersecurity issues. Also, there is a need to enhance cybersecurity capacity at the state level. 3. Creating skilled Human Resource: Skilled and trained workforce is key to better cybersecurity in the country. They should be able to create a safe and secured cyber architecture. 4. Cooperation with private sectors: It requires budgetary allocations and opportunities for raising additional resources, through the involvement of the private sector, toward meeting the cybersecurity challenge. The digital economy today comprises 14-15% of India’s total economy and is targeted to reach 20% by 2024. India’s future economic prospects depend very much on cyber security. Thus, it is imperative that we take the necessary steps to make India’s cyberspace safe and secured with expertise in cybersecurity.
  • 32. CYBER WARFARE 1. Cyber warfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state. In these types of attacks, nation-state actors attempt to disrupt the activities of organizations or nation-states, especially for strategic or military purposes and cyber espionage. 2. It involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, computer viruses or denial-of-service attacks. 3. In 2020, the US Department of Defence exposed an information-stealing malware, SlothfulMedia, for cyberattacks against targets in India, Kazakhstan, Kyrgyzstan, Malaysia, Russia and Ukraine. 4. Misinformation campaign conducted by Russian bots during the 2016 US presidential elections. 5. Sowing disinformation through social media is also cyberwarfare. Russia has been particularly savvy in this field but China has stepped up its game. 6. Intellectual property rights are another avenue— in 2014, the US justice department indicted five Chinese military hackers and accused them of stealing secrets from US companies. 7. Military cyberattacks are perhaps the most associated with cyberwarfare — the “Sandworm Team”, associated with Russian intelligence, has conducted attacks on government sectors in the US, Ukraine, Poland, and on the European Union and NATO. 8. Cyberattack occurred in 2010 when a malware “Stuxnet” that was designed to damage Iran’s nuclear capability by making Iranian scientists and government think there were a series of internal engineering mishaps at their enrichment facility.
  • 33. CHALLENGES TO INTERNAL SECURITY THROUGH: MONEY-LAUNDERING 1. BACKGROUND 2. Money laundering in the banking sector has been a recurring problem in India for over a century. 3. Money Laundering is basically a process where the proceeds of crime are converted into legal money. 4. Its intention is to conceal money from the State so that to prevent loss by taxation, confiscation, etc. Regulations in India 1. Prevention of Money Laundering Act was passed in India in the year 2002. Currently, this is the only weapon in the fight against money laundering in India. 2. The Director of the Financial Intelligence Unit – India (FIU-IND) is empowered to impose fines on financial institutions. 3. RBI, SEBI, and Insurance Regulatory and Development Authority (IRDA) have been brought under the purview of PMLA, 2002. Hence, the provisions of this Act shall apply to all financial institutions, banks, mutual funds, insurance companies, and their financial intermediaries.
  • 34. NEGATIVE EFFECTS OF MONEY LAUNDERING 1. Threatened system: Money Laundering threatens national governments and international relations between them through corruption of officials and legal systems. 2. Threatened financial system: It undermines free enterprise and threatens financial stability by crowding out the private sector, as legitimate businesses cannot compete with the lower prices for goods and services that businesses using laundered funds can offer. 3. Others challenges posed by money-laundering activities: 4. Rise in terrorism i. Threat to Banking System ii. Threat to Economic Stability iii. Discourages foreign investors iv. Encourages tax evasion culture v. Results in exchange and interest rates volatility vi. Undermining of the integrity of fi nancial markets vii. Loss of revenue viii. Reputation risk
  • 35. SOCIAL IMPACTS OF MONEY LAUNDERING 1. Increased criminality 2. Decreases human development 3. Misallocation of resources 4. Affects trust of local citizens in their domestic financial institutions 5. Declines the moral and social position of the society by exposing it to activities such as drug trafficking, smuggling, corruption and other criminal activities POLITICAL IMPACTS OF MONEY LAUNDERING 1. Initiates political distrust and instability 2. Criminalization of politics
  • 36. CHALLENGES IN TACKLING MONEY LAUNDERING 1. Growth of Technology 2. Non-fulfillment of the purpose of KYC Norms 3. Widespread act of smuggling 4. Lack of comprehensive enforcement agencies 5. Tax Heaven Countries
  • 37. Q. “Digital India requires strong focus on cyber security.” Discuss the challenges faced by cyber security and suggest ways to increase cyber expertise in India. (250 words) Approach: • In introduction, write the significance of cyber security in the present times, especially when there is an emphasis on “Digital India”. • Discuss the challenges faced by cybersecurity in India. • Suggest ways to increase cyber expertise in India to tackle such challenges. Q. Keeping in view of India’s internal security, analyse the impact of cross-border cyber-attacks. Also, discuss defensive measures against these sophisticated attacks. (150 words) GS3 UPSC 2021 Q. Discuss the potential threats of Cyber attack and the security framework to prevent it. (150 words) GS3 UPSC 2017 Q. Discuss the role of social networking sites in internal security challenges. (150 words)