Centre for Knowledge Sovereignty (CKS) India , Centre for Joint Warfare Studies (CENJOWS) & Indian Merchants’ Chamber (IMC) have demonstrated National Cyber Security Strategy 2020 (NCSS 2020) to Lt General (Dr) Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat
This Article is Brought You By www.satiitv.com
4 Round Tables were conducted with stakeholders in the month of November & December 2019. These 4 Round Tables were attended by 110 participants, out of which 79 were speaker Delegates representing 61 Organisations.
Need for Cybersecurity
For the first time in history, the majority of the population hold devices that are susceptible to attacks to an extend that allow it to become a weapon against its owner.
It is the era of Non- Kinetic Warfare, where the users are the most vulnerable to any strategic attack and be protected through national strategies, policies and frameworks.
Data is core to the use of any device and the insurance that data is protected.
The roundtable conferences must thus revolve around data protection, the importance of data sovereignty, a national policy and a core representation in the government.
Cyber Attacks in India in the 3rd quarter of 2019
14000 critical attacks detected very high sophistication and persistence, 70300 High-grade attacks in the country
8300 malware variants identified, 3507 malware samples identified.
Malware attacks have been 3% on military-grade, 7% on research labs, 19% mixed, 21% produced via malware forums, 37% on Dark web and 13% unknown.
Major Cyber Attacks in India
2016 July – Union Bank of India Heist – Through a phishing email sent to an employee, hackers accessed the credentials to execute a fund transfer, swindling Union Bank of India of Rs. 17. Crore, Prompt action helped the bank recover almost the entire money
2017 May – Wannacry Ransomware – The global ransomware attack took its toll in India with several thousands of computers getting locked down by ransom-seeking hackers. The attack also impacted systems belonging to the Andhra Pradesh police and state utilities of West Bengal
2017 May – Data Theft at Zomato- The food tech company discovered that an ‘ethical’ hacker-who stole data, including names, email IDs and hashed passwords, of 170 Lakhs users demanded the company
Cybersecurity Citizen 2030 Round Tables of 2019
18 November 2019
Empowering Agencies with Comprehensive Data Gathering Technology Platform
Armed forces have always been preparing anticipatory threat analysis (predictable threat analysis). If we fail in prediction, then we must be prepared for the consequences. The new threat is developing around the world. Data is energy. Data is power.
Social media has become an active conduit to pass on fake news. This has led to the creation of news out of nothing. A well-spoken lie spoken through a credible source can attain a life of its own. Our intelligence system is being impacted. Our adversaries are using young minds against our own country.
26 November 2019
Intel Gathering and Social Media Based Sentiment Correlation
Railways (IR) carries about 250 Lakhs passengers each day. For each passenger, we answer queries as well. So, when social media came, a Twitter cell was set up in 2016. Initially, there was some resistance, but then IR started responding, and it was the vision of the leadership that drove the change. All divisions and zones were told to react immediately to it. Since then, the number of queries has grown so AI and Machine Learning were used to respond on a one on one basis on the complaint resolution platform to protect anonymity. Redressal on twitter is done in a matter of 6 hours on an average. So, the resolution is now quicker and faster.
Privacy: central to the core of our being. We have nothing to hide, so why should we curb this sharing is what people often ask. Our voice samples, our iris data, location information, fingerprint. So, can we hide our data?
23 attacks on Indian Army websites. Every day we are fighting so many attacks in the cyber attack faster than the human mind can comprehend
01 December 2019
Detecting Critical Cyber Threats using Native Technology
Lack of national-level policy on cybersecurity – a systematic form that gives all the dos and don’ts for all digital platforms including social media ones should be brought into the public domain
WhatsApp hacking: we cannot do away with WhatsApp; foreign firms own most of these platforms. So, we have come with Gives – government instant messenger which has been rolled out for group messaging securely even where we don’t have access to secure communication channel. Such alternate infrastructure is placed so that government data and Infrastructure are secure.
05 December 2019
Cyber Resilience for Critical Infrastructure
Cyber Resilience is essential, not enough to just protect data; unless data is pure and trustworthy and protects the privacy of individuals, Resilience is the central part as to how you mitigate, contain and resurrect rapidly.
The risk faced by India on the platform of cybersecurity is unique. Being a subcontinent as diverse as India, and one with a history of invasion, colonization and freedom impacting its participation in the global growth in the technology sector needs to be overcome soon.