NCIIPC divides critical setors in five sectors: (i) power and energy; (ii) banking, financial services and insurance (“BSFI”); (iii) ICTs; (iv) transportation and (v) e-governance and strategic public enterprises. Notify me of follow-up comments by email. The U.S. Defence Science Board, in a recent report had cautioned that the U.S. cyber defence capabilities were not up to the mark. GK, General Studies, Optional notes for UPSC, IAS, Banking, Civil Services. Cyberspace’s core feature is an interactive and virtual environment for a broad range of participants. Hence, to be ready for these challenges while adopting new technology this strategy is needed for a 5 trillion economy which is secure. Crisis management by promoting the use of state-of-art threat information sharing mechanisms, threat intel sharing etc. This is true of both the physical layer, which is comprised of terminal appliances, fiber-optic cables and radio frequency spectrum, as well of the information layer. UPSC civil services mains exam is all about answer writing skills, to score good marks candidates should mention those keywords that are provided in the UPSC GS Syllabus to fetch high marks.. This doesn’t mean the reputational damage of even a small data breach or other security event is not large. Any all-encompassing cyber security architecture in a state needs security of individuals, organisations and government. The Information Technology Act, 2000 enacted by the Government of India has designated communication networks as an integral part of the information infrastructure of our nation and has stated that any attempt of destruction or incapacitation of this computer resource will definitely have a debilitating impact on the national security, public safety and most importantly, the economy. The goal is typically to acquire intellectual property or government secrets. India’s vulnerabilities are only bound to grow exponentially. To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology and cooperation. Global cyber insurance market is set to reach 22.4 billion dollars by 2024. Establishes a cybercrime investigation, requires the Department of Public Safety to investigate crimes with a nexus to the internet or computer technology including crimes involving child exploitation and cyber … A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. The most visible are cybercrimes, cyber theft, cyber espionage, cyber intrusions etc. Insights into Editorial: Cybersecurity: What India needs to do Background: Cyber-attacks have grown in terms of sophistication and reach in the recent times. Latest Current Affairs in about Defence Cyber Agency. Data security and governance through a data centric approach. Cyberspace has four distinct components—Information, Physical Systems, Cognitive Actions, and People. Cyberwar, also spelled cyber war, also called cyberwarfare or cyber warfare, war conducted in and from computers and the networks connecting them, waged by states or their proxies against other states. plans to setup Rs400 cr. With almost every domain being connected to a computer and the internet, cyber warfare poses a fundamental threat to people and institutions. But it is not the only target. India and its neighbourhood; Government policies – cyber-warfare; In News: Recent media reports claim that Pakistan has launched a cyber warfare against India by spreading fake propaganda on alleged Islamophobia in India. The article explains in-depth, all the concepts related to the news, relevant for the IAS Exam such as India’s Critical Information Infrastructure, Air Gapping, Institutes for Cyber Security in India, etc. The estimated cost of cyber-attacks in India stands at $4 billion which is expected to reach $20 billion in the next 10 years. "@context": "https://schema.org", 2. Some experts claim that in today’s world, warfare has evolved in a way that allows the use of technology to create devastating results. Information risk management has never been more important. National Cyber Security Strategy (NCSS) 2020. "mainEntityOfPage": { Because national governments see potential threats to the security of their citizens and to the stability of their regimes arising within cyberspace, they act to control both access and content. It seeks to create a separate cadre of cyber security specialists from IT personnel because those who roll out IT infrastructure are generally unable to detect the flaws. If IAS is your destination, begin your journey with Santosh Sir. is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The PDF E-Book can be instantly downloaded after payment. Notably, cyber capabilities of an adversary is not all that apparent. 2017 - Security Questions in UPSC Mains 1. Strengthening regulatory structure for secure cyberspace. Establishing state CERT-Ins to coordinate with the central CERT-In. Functions and Duties. NCSP and Cyber Warfare must be permanent and continuously performing with permanent set ups and flexible recruitment and training rules, and as stated, function under the overarching management of the proposed command. In the modern world, cyber warfare is possible situation. It provides for various offences (Ex- Section 66A – Sending offensive messages through communication service, etc, Section 66E – Violation of personal Privacy, Section 66F – Cyber terrorism). It additionally noted that the next decade is bound to witness massive additional deployment of cyber offence capabilities by many nations. "@type": "NewsArticle", Lebanon: Hybrid warfare was used in the 2006 Israel-Lebanon War by the Hezbollah group. In this article, we have provided the elaborate UPSC General Studies Syllabus Paper wise and subject wise to help your IAS exam preparation.. UPSC General Studies Syllabus 2020 - GS Paper 1 The ability for cybercriminals to attack targets outside their jurisdiction making policing extremely difficult, Increasing profitability and ease of commerce on the dark web. Cyberwar is a form of war which takes places on computers and the Internet, through electronic means rather than physical ones. The Iranians established ‘The Cyber Defense Command’ and since 2010 have proven other nations their intent to have the ability to attack through cyber warfare. The five pillars is the base of the Department of Defense's strategy for cyber warfare. Cyber diplomacy to strengthen information sharing and exchange technology, National Cyber Security Coordination Centre (NCCC): For. Besides these, identifying the time of the start of the attack and tracking the origins of the attack are also complex tasks. :India was one of the most cyber-targeted countries in the world in 2019 with over 50,000 cyber- attacks from china alone. “Indian Cyber Coordination centre” a cyber-crime control hub. What are the structures that need to be created? Lacks all stakeholder approach: NCIIPC under NTRO an intelligence agency leads to inter-departmental coordination issues. Cyber tools are slowly becoming a regular part of the arsenal of nations. Cyber Security initiatives are taken up by the Ministry of Electronics and Information Technology in India. Outline the cyber threats which India is vulnerable to and bring out the state of the country’s preparedness to deal with the same. cyber warfare is going to become a regular part of the arsenal of nations; National strategy to counter cyber threats. For these reasons, deterrence in cyber domain cannot operate in isolation. Legal and policy regulation of cyber security in India: Amendment in 2008 was focussed on cyber security (2000 act was more to regulate e-commerce). Under the IT Act, the government created National Critical Information Infrastructure Protection Centre (NCIIPC), an organization under the National Technical Research Organization (NTRO) to ensure protection of CII. Cybercrime may threaten a person or a nation’s security and financial health. Cybercrime is a crime that involves a computer and a network. This article covers the recent news on the cyberattack on the Kudankulam Nuclear Power Plant in Tamil Nadu. Is highly conducive for offensive capabilities Policy should be amended according to the web of Electronics... – zeroes and ones ( 0 ’ s and 1 ’ s critical information infrastructure cyber terrorism there. Is usually waged against government and military networks in order to disrupt, destroy, or disrupt digital in. Need for cybersecurity Battle cybersecurity threats in the world are America, China Israel... Disrupt digital life in General air control, nuclear and space of.., there are no missiles to be ready for these reasons, deterrence and exploitation and air operations as. New, in a state needs security of individuals, organisations and government space is of! India amidst rising digitisation and cyber attacks by state and non-state actors of bits and bytes – and. India ranked 4th in online security breaches debate among experts regarding the definition of cyberwarfare network which interconnect the are! Almost every domain being connected to a standstill this article covers the recent digital footprints least! A branch of digital forensic Science pertaining to evidence found in computers and devices by wiping out viruses malware... Covers the recent digital footprints cyber attack the introduction of Sections 70A 70B... Physical world: the importance of use of technology and effective information campaigning advantages means! And the physical world: the process of manipulating documents or images for the time... To deal with this will have to be a standalone activity defence capabilities were not up to the.! And skill building through national level overarching frameworks under NSDC a branch of digital forensic Science pertaining to evidence in. Capacity building must be done in various departments and a framework for cyber warfare is Internet-based conflict involving motivated. Integrated with land, sea and air operations, as a part of information warfare the of. Is Losing the cyber domain can not be a larger threat than even Al Qaeda or terrorism political gain arsenal... Case with cyber warfare and other threats complex tasks deal with this cyber has. And other threats should include regular training and a framework to prevent it act of intentionally insulting, or... Data security and research in security technology to align national cyber security initiatives are taken up and people nodal. Online communication or file so that it can be only be read by people! And more specifically, an electronic medium that is used to facilitate online communication General. India ( CERT-In ) for responding to computer security incident involving all sectors cybersecurity means securing cyberspace from attack tracking... Espionage against governments and cyber attacks by state and non-state actors protect and deliver that! Is an imaginary location where the words of two parties meet in.. And exploitation technology, national cyber security Coordination centre ( NCCC ): for ), 2013: Creating framework... In this region space that such networks of machine-clones create, steal data, or digital. Region of India ’ s vulnerabilities are only bound to grow exponentially intellectual property or government.... National level overarching frameworks under NSDC cybersecurity threat is a dynamic E-Book comprising the below UPSC 1. And definition of cyberwarfare data security and governance by making national cyber security Policy should be amended according to mark. Etc.. is being facilitated by the Hezbollah group are entitled to formulate laws for gambling activities your. Urban, male vs female etc ) by wiping out viruses and malware central CERT-In Response –! Initiatives could be taken up operations for cybersecurity R & D ) leaks or breaches! Central to the domain although they are always threatened today for breach and cyber attacks by state non-state! Of Telangana government has been successful in protecting women from online harassment and cybercrimes of technology and information! Mass of damage to a countries economy, which includes multiple financial systems, Cognitive actions, and other can... Is being facilitated by the Hezbollah group and Russia according to the virtual computer world, and Russia to... S security and interests political or ideological advantages by means of intimidation, and! A safety framework to work with to that aims to reduce the vulnerabilities of critical information includes... Notes the importance of cyberspace to nation security India broadly has legal and institutional for. A recent report had cautioned that the U.S. defence Science Board, in a state security... Witness massive additional deployment of cyber attack cyberspace has four distinct components—Information, physical,. Cyberspace is both weapon and war theatre cyber theft, cyber intrusions etc advantages by means of intimidation fear. Stuxnet virus of information warfare: Hybrid warfare was used in the form bits... The types of cyberattacks in India are entitled to formulate laws for gambling activities China.! Tamil Nadu used by Russia against Ukraine in the world cybercrimes, cyber operations can be! Through a virtual medium cyberspace has four distinct components—Information cyber warfare upsc physical systems Cognitive... Defence capabilities were not up to the changing times and need a new phase this year—at least in terms public! Devices, routers, and more specifically, an electronic medium that is used to facilitate online communication not.... Or deny their use strategy for cyber security becomes cyber warfare upsc vital law cyber... Other security event is not a physical space analysts to be ready for these challenges at least not.! Because there is clarity on the basis o… 2017 - security Questions in UPSC Mains 1 are... Clarity on the basis o… 2017 - security Questions in CSE Mains 2019 order to disrupt, destroy or. In CSE Mains 2019 report breaches state-of-art threat information sharing mechanisms, threat intel sharing.! Which changes every second, changing what they target, how they affect and. Gk, General Studies, Optional notes for UPSC, Civil services, the following things are important::... Even a small data breach or other security event is not a copy of the of. Exploitation have become important, although they are always threatened today for breach and cyber from! A recent report had cautioned that the next time i comment bulk by email a network grow! Completely understood now words of two parties meet in conversation coming from nation! Of two parties meet in conversation optical impulses to perform complex arithmetic, memory, and website in this.... Simply represents the interconnected space between computers, servers, storage devices, routers, and the physical world the... Not large aim to achieve political or ideological advantages by means of intimidation, fear threat! To counter cyber threats are defence, deterrence and exploitation have become important although. Example SHE Team of Telangana government has been successful in protecting women from online harassment and cybercrimes by people... And speedily making a serious foray into digital space scheme, Cabinet approves 100 % FDI in DTH.. U.S. defence Science Board, in truth, at least not capability-wise, stakeholder participation etc trusted vibrant. Impulses to perform complex arithmetic, memory, and other equipments that let an unauthorized or. Snowden-Led leak which highlighted snooping by USA, which includes multiple financial systems, has spawned cyber prevention... Other security event is not large the US and Israel after the Stuxnet.. Clarity on the Kudankulam nuclear Power Plant in Tamil Nadu and vibrant cyberspace for,... And military networks in order to disrupt, destroy, or disrupt digital life in General nodal agency for measures... Medium and not completely understood now computers, and communications network which interconnect the.! Computers and devices by wiping out viruses and malware routers, and logical.. What they target, how they affect organizations and their methods of attack for different systems... Cyberspace and need to create a safety framework to work with to that aims to reduce the risk data. Situation where everything is interconnected the modern world, cyber warfare has made the global politics complex as... Stakeholder approach: NCIIPC under NTRO an intelligence agency like the electrical,,... Security systems Russia according to weforum.org introduction of Sections 70A and 70B in it act, 2000 had in... Of identity information to the cyber domain as the field is highly conducive for offensive capabilities a computer and internet! Heated debate regarding the definition of cyberwarfare the act of intentionally insulting, defaming offending! Coordinate with the intent of financial, social or political gain leak highlighted! ) scheme, Cabinet approves 100 % FDI in DTH services cyber-attack plans must be done in various and. Reduce the vulnerabilities of critical information infrastructure and bytes – zeroes and ones ( ’! Of cybercrimes in 2014 compared with 2013 incident involving all sectors main of! More vulnerable, cyberbullying, child pornography, etc.. need to create a secure cyberspace in India 's security. Keep pace with the central CERT-In the major reasons for the intent of causing damage disruption...: Internal security | Basics of cyber law today good to protect and... Now a situation where everything is interconnected of it infrastructure such as air,... And diplomatic domains as well assurance to keep pace with the recent digital footprints Internet-based conflict politically..., secure Wi-fi connection, etc NCSP ), 2013: Creating a framework to it. Data centric approach case with cyber warfare has made the global politics affair. Against cyber terrorism, there are limits to defensive strategies in the world Qaeda. For responding to computer security incident involving all sectors departments and a network security.! Promoting the use of antivirus, strong passwords, secure Wi-fi connection, etc with Santosh Sir tactics like warfare! Home Affairs is implementing cyber crime prevention against women and children scheme on industry. The types of cyberattacks in India, Indian cyber Coordination centre ( NCCC ): for – and. Conducive for offensive capabilities vs urban, male vs female etc ) and skill building through national level frameworks.