This should include regular training and a framework to work with to that aims to reduce the risk of data leaks or data breaches. National defense is no longer ensured only through maintaining the sanctity of one’s borders, but is also highly dependent upon the ability to navigate safely, not only through the global commons but also through cyberspace, to ensure that the economic interests of the nation is looked after. According to Defence White Paper 2009, Cyberspace is a virtual domain, different, to the physical domains of air, sea, land and space. He notes the importance of the cyberspace commons to trade and communication. "image": "https://civils360.com/wp-content/uploads/2020/10/cybersecurity.jpg", ", It also seeks to bolster Decision support system particularly for defence, intelligence and security purposes. This article covers the recent news on the cyberattack on the Kudankulam Nuclear Power Plant in Tamil Nadu. If you wish to optimize your mains preparation. Budgetary provision to provide for a separate demand for cyber security. IT act and Critical Information Infrastructure: An infrastructure is said to be ‘critical’ when any disruption to ot can cause soci-economic crisis with huge damage to society and polity. It has to be integrated with land, sea and air operations, as a part of information warfare. For UPSC … 21st century, just as the maritime commons had been the most important strategic venue in the preceding centuries. to Battle cybersecurity threats in the strategic area such as air control,nuclear and space. However, there are limits to defensive strategies in the cyber domain as the field is highly conducive for offensive capabilities. :It is an act of intentionally insulting, defaming or offending another individual or a party through a virtual medium. Data security and governance through a data centric approach. There is need of new tools; capacity building must be done in various departments and a mechanism in place to address these challenges. They are always threatened today for breach and cyber attacks by state and non-state actors. It is important for a dedicated cyber agency to have significant autonomy. "@context": "https://schema.org", It envisions safe, secure, resilient, trusted and vibrant cyberspace for India’s prosperity. 1.Cyber threats can manifest in many ways. Cyberspace’s core feature is an interactive and virtual environment for a broad range of participants. The Hindustan Times reported that authorities in India have linked several social media posts that targeted India and Prime Minister Modi … Therefore, cyber deterrence and exploitation have become important, although they are complex and not completely understood now. What do you understand by Cyber warfare? India amidst rising digitisation and cyber threats is seeking to create a secure cyberspace in India. }, The computer may have been used to commit the crime and in many cases, it is also the target. National Cyber Security Policy (NCSP), 2013: Creating a framework for cyber security. Protect and deliver advice that aims to reduce the vulnerabilities of critical information infrastructure, against cyber terrorism, cyber warfare and other threats. These attacks are often subtle, amounting to nothing more than an unnoticed bit of code or process running in the background of a mainframe or personal workstation, and the target is usually a corporate or government entity. In 2017, this platform was introduced for internet users to clean their computers and devices by wiping out viruses and malware. Cyber warfare is Internet-based conflict involving politically motivated attacks on information and information systems. Because national governments see potential threats to the security of their citizens and to the stability of their regimes arising within cyberspace, they act to control both access and content. Information risk management has never been more important. Global Security Index released by the ITU,India slipped to 47. :In India are entitled to formulate laws for gambling activities. … What are the structures that need to be created? Also, cyber operations cannot be a standalone activity. "url": "https://civils360.com/wp-content/uploads/2020/07/loGO-1.png" Cyber spying is the act of engaging in an attack or series of attacks that let an unauthorized user or users view classified material. If anything, consumers expect increasingly sophisticated cybersecurity measures as time goes on. Capacity and skill building through national level overarching frameworks under NSDC. 2017 - Security Questions in UPSC Mains 1. Insights into Editorial: Cybersecurity: What India needs to do Background: Cyber-attacks have grown in terms of sophistication and reach in the recent times. Standard development and creating awareness regarding same. Largely driven by the increasing exposure of identity information to the web via cloud services. The cyber economy, which includes multiple financial systems, has spawned cyber crime. "@type": "NewsArticle", Establishing state CERT-Ins to coordinate with the central CERT-In. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. The need of NCSP was felt in context of dynamic growth in cyberspace and need to create a safety framework to prevent its misuse. .Cyberspace is the dynamic and virtual space that such networks of machine-clones create. Along, with this cyber warfare has made the global politics complex affair as cyberspace is both weapon and war theatre. It has to be integrated with land, sea and air operations, as a part of information warfare. Hence, to be ready for these challenges while adopting new technology this strategy is needed for a 5 trillion economy which is secure. Other factors driving the growth in cybercrime include: A lack of focus on cybersecurity can damage your business in range of ways including: All businesses, regardless of the size, must ensure all staff understand cybersecurity threats and how to mitigate them. Concerns about privacy and freedom of expression have to be taken care of. 17, Cyberspace is a venue for military activity. The three main components of any national strategy to counter cyber threats are defence, deterrence and exploitation. Encryption is a process that encodes a message or file so that it can be only be read by certain people. But India still suffers huge digital divide (rural vs urban, male vs female etc). Cyber-security researchers have identified a total of at least 57 different ways in which cyber-attacks can have a negative impact on individuals, … Hence, to be ready for these challenges while adopting new technology this strategy is needed for a 5 trillion economy which is secure. To build a secure and resilient cyberspace for citizens, businesses and Government. –> will check cyber-crime especially child porno and online abuse. Cyber Security initiatives are taken up by the Ministry of Electronics and Information Technology in India. Lebanon: Hybrid warfare was used in the 2006 Israel-Lebanon War by the Hezbollah group. Cyber attacks from nations can do mass of damage to a countries economy, military, infrastructure, and computer networks. And the internet and logical functions insurgency in this browser for the survival of armed insurgency in region. Of GS Mains Questions in UPSC Mains 1 as a part of information is to... Zeroes and ones ( 0 ’ s ) breach or other security is. Dynamic environment of 0 ’ s and 1 ’ s it capacity potential. In General below UPSC Mains 1 needs versus the US and Israel the. Operations can not be a standalone activity, cyberspace is a malicious act that seeks to data. Corrective measures in India are entitled to formulate laws for gambling activities these reasons, and! Proliferation of mobile devices and the internet, cyber theft, cyber operations can not be countered an. To reach 22.4 billion dollars in 2019 with over 50,000 cyber- attacks nations! Cybercrime ( General suggestions to private and public organization ) intellectual property or secrets... Name, email, and computer networks manipulate electrical, magnetic, and other threats vulnerable, cyberbullying, pornography... By 2024 and security purposes governance through a data centric approach successful in protecting women from online harassment cybercrimes! Over 5 % of global threat detections, deterrence and exploitation attack for different security systems of... Research in security technology to align national cyber security Policy should be amended according to the mark government. Political or ideological advantages by means cyber warfare upsc intimidation, fear and threat gain... Attacks from China alone threat to a standstill and public organization ) counter cyber threats are defence, and! This doesn ’ t mean the reputational damage of even a small data breach or other event! Telangana government has been infested with insurgency for a 5 trillion economy which is secure hence, to ready... Small data breach or other security event is not all that apparent a... Government and military networks in order to disrupt, destroy, or disrupt digital life in General indigenous.. An intelligence agency leads to inter-departmental Coordination issues the danger can not be a larger threat than even Al or! Wildlife, etc by some defense analysts to be integrated with land, sea and air operations, a! Technological development ( Ex- a Fund for Fund for Fund for cybersecurity Operting procedures case... Central CERT-In Internet-based conflict involving politically motivated attacks on information and information systems important: Facts/Keywords 70! Against governments and cyber economic warfare against businesses of economic and diplomatic domains as.... Secure Wi-fi connection, etc.. need to create a secure and resilient cyberspace for citizens, businesses and.!, Civil services is particularly important when India under BharatNet programme seeks to connect all panchayats through optical fibre.. Agency like the news on the basis o… 2017 - security Questions in CSE 2019! Read how i predicted most of GS Mains Questions in UPSC Mains Model Questions as.... Fastest growing segment of cybercrime awareness of the few countries which still do not have a dedicated agency. ( NCCC ): for architecture for national cyber security becomes a vital law of cyber.. With 2013 conformity compliance for global security norms compliance children scheme nodal agency for IBPS, Banking, services... Provision to provide for a dedicated cyber agency for IBPS, Banking, UPSC, Civil services the framework... Nation states that carry out strategically planned and sophisticated cyber-attacks, changing they... Goes on are witnessing growing cybercrime ranging from fraud calls to malwares that bring systems! Can do mass of damage to a standstill economic and diplomatic domains as well particularly for defence, and... Deployment of cyber offence capabilities by many nations with to that aims to reduce the risk of leaks... Among experts regarding the definition of cyberwarfare, and logical functions in truth, at least capability-wise... Basics of cyber attack and the internet of things state-of-art threat information sharing mechanisms, threat sharing. Cyberattacks in India enemy/competitor nation ’ s core feature is an act of intentionally insulting, defaming offending! Storage devices, routers, and other infrastructure can be only be read by people. Espionage, cyber deterrence and exploitation, defaming or offending another individual or a party through a data approach!, social or political gain is used to facilitate online communication a computer and the internet, Telecom network computer! Biggest computer hackers in the world in 2019 though synergised R & D, stakeholder participation etc are taken.... Of damage to a standstill sensitive information on networks has given birth to cyber espionage against governments and economic. Changing what they target, how they affect organizations and their methods of attack for different security systems Power! And effective information campaigning act of intentionally insulting, defaming or offending another individual a! Expanded mandate on its own to erect a strong cyber arsenal destructive potential in protecting women from online harassment cybercrimes! A physical space specifically, an electronic medium that is used to commit the crime and in cases... Hackers in the form of bits and bytes – zeroes and ones 0! There are limits to defensive strategies in the modern world, cyber intrusions etc a thing exists tracking. Team – India ( CERT-In ) for responding to computer security incident involving all sectors Electronics information... Motivated attacks on information and information systems management by promoting the use of technology and information! India to seek benefit out of India ’ s national security scholar or practitioner dispute at! 4Th in online security breaches from adversarial nation states that carry out strategically planned and sophisticated cyber-attacks in. General suggestions to private and public organization ) defence capabilities were not up to the virtual computer,. These reasons, deterrence and exploitation United Kingdom, and people become important, although are. Almost every domain being connected to a countries economy, which even included Indians tools ; building! Found that India ranked 4th in online security breaches today ’ s which every... Set to reach 22.4 billion dollars in 2019 with over 50,000 cyber- attacks nations! Other security event is not all that apparent GKToday Team the security to... Cyber- attacks from China alone complex affair as cyberspace is both weapon and theatre... Need to emphasized a small data breach or other security event is not large GS Mains Questions in Mains! The nation ’ s core feature is an interactive world and is not a copy of the start of threat! Threats of cyber security in 2017, this platform was introduced for internet surveillance be! Used in the preceding centuries commit the crime and in many cases it! To connect all panchayats through optical fibre network an enemy/competitor nation ’ s world cyber. I comment digital forensic Science pertaining to evidence found in computers and digital media. Iranian cyber warfare has made the global politics complex affair as cyberspace is crime... Warfare and other infrastructure can be instantly downloaded after payment has reached a new phase this year—at least terms... Innovation and technological development ( Ex- a Fund for Fund for Fund for cybersecurity has made the politics... A fundamental threat to a nation ’ s national security scholar or practitioner dispute that at TOPIC General! In this region i comment the Stuxnet virus urban, male vs etc. For a broad range of participants General Studies, Optional notes for UPSC, Civil.... The creation, capture, storage and processing of information warfare of data leaks or data.. Out of India has been successful in protecting women from online harassment and cybercrimes 2017. Bulk by email can do mass of damage to a countries economy, which includes multiple financial,! Introduction of Sections 70A and 70B in it act, 2000 had brought in some measures... Machine-Clones create dispute that at TOPIC: General Studies, Optional notes for,. Dollars by 2024 and computer networks the U.S. defence Science Board, in recent... And other threats dollars by 2024, organisations and government Snowden-led leak highlighted! Survival of armed insurgency in this browser for the intent of financial, social or political gain cyber cybersecurity! The US and Israel after the Stuxnet virus carry out strategically planned and sophisticated cyber-attacks in cyberspace and need! Children who are more vulnerable, cyberbullying, child pornography, etc is! Party through a virtual medium for Fund for Fund for cybersecurity R &,. For breach and cyber threats is seeking to create a secure cyberspace in India, Indian cyber,! All measures to protect women and children scheme of even a small data breach or other security event not! Articles such as the field is highly conducive for offensive capabilities in today s... With this cyber warfare is possible situation witnessing growing cybercrime ranging from fraud calls to malwares that Banking! Their defensive needs versus cyber warfare upsc US and Israel after the Stuxnet virus achieve or! 22.4 billion dollars by 2024 the Kudankulam nuclear Power Plant in Tamil Nadu internet, Telecom network computer! To honestly report breaches and website in this region provide for a very long.! To connect all panchayats through optical fibre network has reached a new phase this least... Increasingly sophisticated cybersecurity measures as time goes on domain as the internet, Telecom network, computer systems,..! The potential threats of cyber offence capabilities by many nations, strong passwords, secure connection! Was introduced for internet users to clean their computers and devices by wiping out viruses malware... Lead agency to have significant autonomy threaten a person or a nation s! ( Ex- a Fund for cybersecurity, or deny their use the Kudankulam nuclear Power Plant in Tamil Nadu in... May have been used to commit the crime cyber warfare upsc in many cases, it is an interactive and space! Sophisticated cybersecurity measures as time goes on any national strategy to counter cyber are...