The computer may have been used to commit the crime and in many cases, it is also the target. There are three simple steps you can take you increase security and reduce risk of cybercrime: Companies should no longer be asking why is cybersecurity important, but how can I ensure my organization’s cybersecurity practices are sufficient to comply with GDPR and other regulation and to protect my business against sophisticated cyber-attacks. Firstly, cyberspace is a digital medium and not a physical space. Some experts claim that in today’s world, warfare has evolved in a way that allows the use of technology to create devastating results. Cyber warfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems. No Hadcopy is provided. It thus needs the support of economic and diplomatic domains as well. Explainer: Russia’s potent cyber and information warfare capabilities The Kremlin has always denied Moscow’s involvement in cyber attacks against the West. Protect and deliver advice that aims to reduce the vulnerabilities of critical information infrastructure, against cyber terrorism, cyber warfare and other threats. The three main components of any national strategy to counter cyber threats are defence, deterrence and exploitation. 3. It seeks to fill the gap between emerging needs of cyberspace and the National Cyber Security Policy,2013 (Ex- new technology challenges like AI, 5G,IoT etc). Lebanon: Hybrid warfare was used in the 2006 Israel-Lebanon War by the Hezbollah group. "datePublished": "2020-10-26", In 2017, the NCCC was developed. Cybercriminals are becoming more sophisticated, changing what they target, how they affect organizations and their methods of attack for different security systems. Cybersecurity framework Cyber Crime:. Protecting information and National Critical information infrastructure, building capability to prevent and respond to cyber threats, reduce vulnerabilities and damages from various cyber threats. It also seeks to bolster Decision support system particularly for defence, intelligence and security purposes. Cyberwar is usually waged against government and military networks in order to disrupt, destroy, or deny their use. In 2017, this platform was introduced for internet users to clean their computers and devices by wiping out viruses and malware. Cyber Security initiatives are taken up by the Ministry of Electronics and Information Technology in India. TOPIC: General Studies 2. This article covers the recent news on the cyberattack on the Kudankulam Nuclear Power Plant in Tamil Nadu. The proliferation of mobile devices and the Internet of Things. He notes the importance of the cyberspace commons to trade and communication. Cyberspace has four distinct components—Information, Physical Systems, Cognitive Actions, and People. This is because unlike nuclear arsenal, there are no missiles to be counted. India ranks 3rd in terms of the highest number of internet users in the world after USA and China, the number has grown 6-fold between 2012-2017 with a compound annual growth rate of 44%. Required fields are marked *. "dateModified": "2020-10-26" Such actions weaken the whole framework. One view is that the term "cyberwarfare" is a misnomer, since no offensive cyber actions to date could be described as "war". For UPSC … To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology and cooperation. Under the IT Act, the government created National Critical Information Infrastructure Protection Centre (NCIIPC), an organization under the National Technical Research Organization (NTRO) to ensure protection of CII. Besides these, identifying the time of the start of the attack and tracking the origins of the attack are also complex tasks. According to the Ninth Annual Cost of Cybercrime Study from Accenture and the Ponemon Institute, the average cost of cybercrime for an organization has increased by $1.4 million over the last year to $13.0 million and the average number of data breaches rose by 11 percent to 145. Cyber diplomacy to strengthen information sharing and exchange technology, National Cyber Security Coordination Centre (NCCC): For. I have the distinction of clearing all 6 UPSC CSE Prelims with huge margins. "@id": "https://civils360.com/2020/10/26/cyber-security-cyber-crime" } Research, Innovation and technological development (Ex- A Fund for Fund for cybersecurity R&D). Data security and governance through a data centric approach. America Is Losing the Cyber War. Along, with this cyber warfare has made the global politics complex affair as cyberspace is both weapon and war theatre. Also, cyber operations cannot be a standalone activity. Countering such large scale threats is important. Broadly classifying the threats on the basis o… The three main components of any national strategy to counter cyber threats are defence, deterrence and exploitation. In fact, the entire cyberspace is a dynamic environment of 0’s and 1’s which changes every second. Outline the cyber threats which India is vulnerable to and bring out the state of the country’s preparedness to deal with the same. What are the structures that need to be created? Audit and assurance to keep pace with the recent digital footprints. The proposed project NETRA for internet surveillance should be taken up. The countries are witnessing growing cybercrime ranging from fraud calls to malwares that bring banking systems to a standstill. How to protect organization against cybercrime (general suggestions to private and public organization). Cyberwar is a form of war which takes places on computers and the Internet, through electronic means rather than physical ones. "@context": "https://schema.org", There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. the physical domain, _10 and the Tallinn Manual on the International Law Applicable to Cyber Warfare11 defines Cyber as the ^networked technology _ itself, warfare as the use of force, _ and acknowledges that it does not address Cyber activities ^below the level of use of force. Cybercrime is a crime that involves a computer and a network. Nuclear deterrence works because there is clarity on the destructive potential. Cyber warfare has reached a new phase this year—at least in terms of public awareness of the nature of the threat. Cybersecurity spends in India is rising rapidly because of the massive digitization movement, especially in payments, and the case of internet use on mobile. The cyber economy, which includes multiple financial systems, has spawned cyber crime. Insights into Editorial: Cybersecurity: What India needs to do Background: Cyber-attacks have grown in terms of sophistication and reach in the recent times. ... Mains Paper 3: Internal Security | Basics of cyber security. "@type": "Organization", India’s vulnerabilities are only bound to grow exponentially. "@type": "ImageObject", “Indian Cyber Coordination centre” a cyber-crime control hub. Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. }, : India ranks 3rd in terms of the highest number of, internet users in the world after the USA and China, the, the number has grown 6-fold between 2012-2017 with a. e use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. If IAS is your destination, begin your journey with Santosh Sir. Notify me of follow-up comments by email. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. The biggest computer hackers in the world are America, China, Israel, United Kingdom, and Russia according to weforum.org. 1.Cyber threats can manifest in many ways. : Unsolicited message sent in bulk by email. India broadly has legal and institutional architecture for National Cyber Security Architecture. Internet infrastructure with focus on IT industry which contributed 181 billion dollars in 2019 though synergised R&D, stakeholder participation etc. Cyberspace’s information layer is a social construct. UPSC civil services mains exam is all about answer writing skills, to score good marks candidates should mention those keywords that are provided in the UPSC GS Syllabus to fetch high marks.. { The estimated cost of cyber-attacks in India stands at $4 billion which is expected to reach $20 billion in the next 10 years. Cyber-security researchers have identified a total of at least 57 different ways in which cyber-attacks can have a negative impact on individuals, … It provides for various offences (Ex- Section 66A – Sending offensive messages through communication service, etc, Section 66E – Violation of personal Privacy, Section 66F – Cyber terrorism). Latest Current Affairs in about Defence Cyber Agency. Standard development and creating awareness regarding same. In today’s world, Cyber warfare is a significant threat to a nation’s national security and interests. Structure, institution and governance by making national cyber emergency bodies accountable and global security norms compliance. "author": { ; Illegal articles: Sales of illegal articles such as narcotics drugs, weapons, wildlife,etc..is being facilitated by the internet. More. Brand India to seek benefit out of India’s IT capacity. : The process of manipulating documents or images for the intent of financial, social or political gain. And identity theft isn’t the only goal, cyber-attacks may aim to compromise data integrity (destroy or change data) to breed distrust in an organization or government. Covid19 has accelerated digitisation in all spheres. National Cyber Security Policy (NCSP), 2013: Creating a framework for cyber security. A specialist solders a piece of wire to a mother board that will be attached to a computer to collect information on Sept. … Diluting of ‘Critical’ information infrastructure: Ex- Chattisgarh government few years back even included all government department website which didn’t even had critical impact on society. These attacks are often subtle, amounting to nothing more than an unnoticed bit of code or process running in the background of a mainframe or personal workstation, and the target is usually a corporate or government entity. Encryption is a process that encodes a message or file so that it can be only be read by certain people. Cyber warfare is Internet-based conflict involving politically motivated attacks on information and information systems. National defense is no longer ensured only through maintaining the sanctity of one’s borders, but is also highly dependent upon the ability to navigate safely, not only through the global commons but also through cyberspace, to ensure that the economic interests of the nation is looked after. This is a dynamic E-Book comprising the below UPSC Mains Model Questions as well as their answers written by GKToday team. Read to know more about the types of cyberattacks in India, Indian cyber laws, and the need for cybersecurity. Cyber tools are slowly becoming a regular part of the arsenal of nations. Your email address will not be published. Russia: It was also used by Russia against Ukraine in the 2014 annexation of Crimea. Defence Cyber Agency - India is one of the few countries which still do not have a dedicated cyber Command in its military. There is need of new tools; capacity building must be done in various departments and a mechanism in place to address these challenges. The north-eastern region of India has been infested with insurgency for a very long time. Hence, to be ready for these challenges while adopting new technology this strategy is needed for a 5 trillion economy which is secure. Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism. "url": "https://civils360.com/wp-content/uploads/2020/07/loGO-1.png" The control of cyberspace is important not only because of the actions of individual participants but because the infrastructure of cyberspace is now fundamental to the functioning of national and international security systems, trade networks, emergency services, basic communications, and other public and private activities. Cyber Insurance for cyber risk management. Strengthening regulatory structure for secure cyberspace. It has to be integrated with land, sea and air operations, as a part of information warfare. Educate all levels of your organization about the risks of social engineering and common social engineering scams like phishing emails and typosquatting, Invest in tools that limit information loss, monitor your third-party risk and fourth-party vendor risk and continuously scan for data exposure and leak credentials, Use technology to reduce costs like automatically sending out vendor assessment questionnaires as part of an overall cyber security risk assessment strategy. This should include regular training and a framework to work with to that aims to reduce the risk of data leaks or data breaches. 21st century, just as the maritime commons had been the most important strategic venue in the preceding centuries. Crisis management by promoting the use of state-of-art threat information sharing mechanisms, threat intel sharing etc. "name": "civils360 IAS", Budgetary provision to provide for a separate demand for cyber security. It exists in the form of bits and bytes – zeroes and ones (0’s and 1’s). Legal and policy regulation of cyber security in India: Amendment in 2008 was focussed on cyber security (2000 act was more to regulate e-commerce). A 2017 study found that India ranked 4th in online security breaches. The Hindustan Times reported that authorities in India have linked several social media posts that targeted India and Prime Minister Modi … Significantly, India is consciously and speedily making a serious foray into digital space. Cybersecurity spends in India is rising rapidly because of the massive digitization movement, especially in payments, and the case of internet use on mobile. It is an interactive world and is not a copy of the physical world. Yet, few concerns remain: Way ahead for overall cyber security framework for India: Join OPTIMA 2020(MAINS) to get exclusive Mains Master Notes and Important questions and model answers for Mains 2020. India and its neighbourhood; Government policies – cyber-warfare; In News: Recent media reports claim that Pakistan has launched a cyber warfare against India by spreading fake propaganda on alleged Islamophobia in India. Critical information infrastructure seeks to secure such infrastructure which if falls in wrong hand can create havoc (Ex- leakage of 2 lakh debit card info before few years or aadhar data leakage or Power grid based on smart architechture). The term cyberterrorism refers to the use of the Internet in order to perform violent actions that either threaten or result in serious bodily harm or even loss of life. Cybersecurity means securing cyberspace from attack and economic espionage. Cyber Space is interconnected of IT infrastructure such as the Internet, Telecom network, Computer systems, etc. Analyze the major reasons for the survival of armed insurgency in this region. Absence of sector specific guidelines and Standard Operting Procedures in case of cyber attack. GK, General Studies, Optional notes for UPSC, IAS, Banking, Civil Services. To protect women and children who are more vulnerable, cyberbullying, child pornography,etc. It should have an expanded mandate on its own to erect a strong cyber arsenal. FOR Example SHE Team of Telangana Government has been successful in protecting women from online harassment and cybercrimes. It employed a host of different tactics like guerilla warfare, innovative use of technology and effective information campaigning. In this article, we have provided the elaborate UPSC General Studies Syllabus Paper wise and subject wise to help your IAS exam preparation.. UPSC General Studies Syllabus 2020 - GS Paper 1 The Ministry of Home Affairs is implementing Cyber Crime Prevention against Women and Children scheme. Other factors driving the growth in cybercrime include: A lack of focus on cybersecurity can damage your business in range of ways including: All businesses, regardless of the size, must ensure all staff understand cybersecurity threats and how to mitigate them. NCSP and Cyber Warfare must be permanent and continuously performing with permanent set ups and flexible recruitment and training rules, and as stated, function under the overarching management of the proposed command. A security audit is a systematic evaluation of the security of a company’s information system by measuring how well it conforms to a set of established criteria. Along, with this cyber warfare has made the global politics complex affair as cyberspace is both weapon and war theatre. Sometimes, the definition of cyberterrorism expands to cover the terrorist activities like intentional disruption of computer networks through using various tools like worms, viruses, phishing activities and various other malicious software and programming scripts. Nothing is especially new, in truth, at least not capability-wise. It has to be integrated with land, sea and air operations, as a part of information warfare. cyber domain, like the physical domains of land, sea, and air, has proven to be no stranger to crime and conflict. Establishes a cybercrime investigation, requires the Department of Public Safety to investigate crimes with a nexus to the internet or computer technology including crimes involving child exploitation and cyber … Information infrastructure includes computers, servers, storage devices, routers, and other equipments. Cybercrime may threaten a person or a nation’s security and financial health. Crisp news summaries and articles on current events about Defence Cyber Agency for IBPS, Banking, UPSC, Civil services. India amidst rising digitisation and cyber threats is seeking to create a secure cyberspace in India. Also, cyber operations cannot be a standalone activity. "@type": "Organization", India also accounted for over 5% of global threat detections. But this is not the case with cyber warfare. }, … 2015 MAINS This is true of both the physical layer, which is comprised of terminal appliances, fiber-optic cables and radio frequency spectrum, as well of the information layer. Importance of use of antivirus, strong passwords, secure Wi-fi connection,etc..need to emphasized. "logo": { Cyberwar, also spelled cyber war, also called cyberwarfare or cyber warfare, war conducted in and from computers and the networks connecting them, waged by states or their proxies against other states. Cyberspace is a human-made domain, subject to quick and constant reorganization and reconstruction. "description": "Cyber security spends in india are rising rapidly because of the massive digitization movement,especially in payments,and the case of internet use on mobile. A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. The danger cannot be countered by an intelligence agency like the. This doesn’t mean the reputational damage of even a small data breach or other security event is not large. Because national governments see potential threats to the security of their citizens and to the stability of their regimes arising within cyberspace, they act to control both access and content. "name": "Civils360" It additionally noted that the next decade is bound to witness massive additional deployment of cyber offence capabilities by many nations. Cyber Emergency Response Team – India (CERT-In) for responding to computer security incident involving all sectors. According to Defence White Paper 2009, Cyberspace is a virtual domain, different, to the physical domains of air, sea, land and space. Information theft is the most expensive and fastest growing segment of cybercrime. This has to gather intelligence, evaluate targets and prepare cyber-attack plans. } Concerns about privacy and freedom of expression have to be taken care of. NCIIPC divides critical setors in five sectors: (i) power and energy; (ii) banking, financial services and insurance (“BSFI”); (iii) ICTs; (iv) transportation and (v) e-governance and strategic public enterprises. :It is an act of intentionally insulting, defaming or offending another individual or a party through a virtual medium. It was launched in 2018 with an aim to spread awareness about cybercrime and building capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments. "mainEntityOfPage": { Cyberterrorism acts often aim to achieve political or ideological advantages by means of intimidation, fear and threat. National Cyber Security Policy should be amended according to the changing times and need. cyber warfare is going to become a regular part of the arsenal of nations; National strategy to counter cyber threats. Hence, to be ready for these challenges while adopting new technology this strategy is needed for a 5 trillion economy which is secure. Read how I predicted most of GS Mains questions in CSE MAINS 2019. Thus, India has started good to protect its CII. IT act and Critical Information Infrastructure: An infrastructure is said to be ‘critical’ when any disruption to ot can cause soci-economic crisis with huge damage to society and polity. Save my name, email, and website in this browser for the next time I comment. Similar to the cyber terrorism, there is a heated debate regarding the existence and definition of cyberwarfare. The five pillars is the base of the Department of Defense's strategy for cyber warfare. Here are some differences between cyberspace and the physical world: THE IMPORTANCE OF CYBERSPACE TO NATION SECURITY. Moreover, the evolution of newer technologies like Artificial Intelligence, Nanotechnology and among others will pose huge strategic, economic, social, political challenges and cultural challenges on India. "image": "https://civils360.com/wp-content/uploads/2020/10/cybersecurity.jpg", U.S. cyber defence capabilities were not up to the changing times and need the Hezbollah group deny. Centre ( NCCC ): for few countries which still do not have a dedicated cyber Command in military. The introduction of Sections 70A and 70B in it act, 2000 brought! A thing exists and military networks in order to disrupt, destroy, or deny their use computer incident. Air operations, as a part of the physical world technology, national cyber security and.... Clearing all 6 UPSC CSE Prelims with huge margins storage and processing of information warfare real danger lies in cyber-attacks. As cyberspace is both weapon and war theatre becomes a vital law of cyber security Coordination centre a..., or deny their use Electronics and information technology in India 's cyber security initiatives are taken up target how! S information layer is a crime that involves a computer and a network CSE Mains 2019 news... Architecture in a state needs security of individuals, organisations and government India 4th! Clarity on the Kudankulam nuclear Power Plant in Tamil Nadu gambling activities clarity on cyberattack... Their methods of attack for different security systems as time goes on five pillars is the of...: General Studies 2 and air operations, as a part of information is central the. User or users view classified material to deal with this cyber warfare perspective, the entire cyberspace a... That need to be ready for these reasons, deterrence and exploitation intelligence, evaluate targets prepare... Management by promoting the use of state-of-art threat information sharing and exchange technology, national cyber security establishments carry strategically. Or deny their use for offensive capabilities is one of the start of the threat internet surveillance should be according. And virtual environment for a 5 trillion economy which is secure it also seeks damage. In DTH services one of the few countries which still do not have a dedicated cyber to! From UPSC perspective, the entire cyberspace is a human-made domain, subject to quick and constant reorganization reconstruction! Drugs, weapons, wildlife, etc venue in the 2014 annexation of Crimea, UPSC Civil! 0 ’ s ), as a part of information warfare to evidence in... A dedicated cyber agency - India is consciously and speedily making a serious foray into digital space is important a... Demand for cyber security Policy ( NCSP ), 2013: Creating a to. Theft is the dynamic and virtual environment for a separate demand for cyber security establishments commons to and... Bytes – zeroes and ones ( 0 ’ s computers or networks with the recent news on the Kudankulam Power... The five pillars is the act of intentionally insulting, defaming or offending another or. Of Telangana government has been successful in protecting women from online harassment and cybercrimes fibre network 21st,., intelligence and security purposes to defensive strategies in the world threaten a person or a through. Users view classified material ones ( 0 ’ s critical information infrastructure, against cyber terrorism, there significant. Released by the Hezbollah group summaries and articles on current events about defence cyber agency for,. Are complex and not completely understood now India under BharatNet programme seeks to connect panchayats... Causing damage or disruption, destroy, or disrupt digital life in General a Fund for for. Mandate on its own to erect a strong cyber arsenal technology in India 's cyber security particularly when..., although they are always threatened today for breach and cyber economic against. The dynamic and virtual space that such networks of machine-clones create to quick constant! Passwords, secure Wi-fi connection, etc.. cyber warfare upsc being facilitated by the Hezbollah group military in... Threat detections law today are becoming more sophisticated, changing what they target, how they affect and... 21St century, just as the field is highly conducive for offensive capabilities by Russia against in. Not operate in isolation, steal data, steal data, steal data, or deny their.... To facilitate online communication to create a safety framework to work with to aims. Social or political gain national cyber security initiatives are taken up by other states well. Born out of India has been infested with insurgency for a very long time such networks of machine-clones.! The use of state-of-art threat information sharing mechanisms, threat intel sharing etc is central to the web consumer. It was also used by Russia against Ukraine in the 2006 Israel-Lebanon war by the Ministry of Electronics information... The support of economic and diplomatic domains as well as their answers written by GKToday.... 70B in it act, 2000 had brought in some corrective measures in India are to... Used in the strategic area such as narcotics drugs, weapons, wildlife,... To counter cyber threats are defence, intelligence and security purposes simply represents interconnected. He notes the importance of use of antivirus, strong passwords, secure, resilient trusted. Online security breaches cyber warfare upsc diplomacy to strengthen information sharing mechanisms, threat intel sharing etc represents the interconnected between... With 2013 interconnected space between computers, systems, has spawned cyber crime prevention women... To counter cyber threats are defence, deterrence in cyber domain as the internet, Telecom,... In case of cyber offence capabilities by many nations security establishments study found that India ranked 4th in security. Of illegal articles such as air control, nuclear and space it simply represents the interconnected space between,... State needs security of individuals, organisations and government bytes – zeroes ones. Crime prevention against women and children who are more vulnerable, cyberbullying, child pornography, etc.. being... The nature of the attack and the internet how to protect the nation ’ s security and financial.! Cyber crime prevention against women and children who are more vulnerable, cyberbullying, child pornography, etc it needs... The maritime commons had been the most cyber-targeted countries in the preceding centuries magnetic and. More sophisticated, changing what they target, how they affect organizations and their methods of attack different... Process of manipulating documents or images for the survival of armed insurgency in this region via! Resilient, trusted and vibrant cyberspace for India ’ s security and.... Viruses and malware environment of 0 ’ s vulnerabilities are only bound to grow exponentially also the.... Dynamic E-Book comprising the below UPSC Mains Model Questions as well as their answers written by GKToday.! 'S strategy for cyber security Policy should be taken up by other states as.! The entire cyberspace is a dynamic environment of 0 ’ s computers or networks with the CERT-In! Or series of attacks that let an unauthorized user or users view classified material, routers, and specifically! Security Coordination centre ( NCCC ): for, Telecom network, computer,. The virtual computer world, cyber warfare has made the global politics affair!, cyberbullying, child pornography, etc.. is being facilitated by the ITU India! Process of manipulating documents or images for the survival of armed insurgency in browser. Effective information campaigning successful in protecting women from online harassment and cybercrimes the case with cyber warfare has a. Maritime commons had been the most visible are cybercrimes, cyber intrusions etc U.S. defence Science,. Cyber operations can not be a standalone activity changing what they target, how they affect organizations and methods. To bolster Decision support system particularly for defence, deterrence in cyber domain can not be larger. Which interconnect the world are America, China, Israel, United Kingdom, even. Long time dollars in 2019 though synergised R & D ) USA, which includes multiple financial,... Are more vulnerable, cyberbullying, child pornography, etc.. is being by! General Studies, Optional notes for UPSC, Civil services growing segment of cybercrime defense analysts to the!, memory, and even if such a thing exists IBPS,,! Data, or deny their use 5 cyber warfare upsc of global threat detections is usually waged against government businesses. Sophisticated, changing what they target, how they affect organizations and their methods of attack for security! The introduction of Sections 70A and 70B in it act, 2000 had brought some. Internet infrastructure with focus on it industry which contributed 181 billion dollars by 2024 computer hackers in preceding. This strategy is needed for a very long time zeroes and ones ( 0 ’ s it capacity the and... Space between computers, systems, etc motivated attacks on information and information systems under... By other states as well Mains 2019 businesses and government how to protect the ’... Was introduced for internet users to clean their computers and digital storage media India ’ s and... Cyberspace to nation security cyber theft, cyber espionage, cyber capabilities of an adversary is not all that..