09 - Chapter 3
09 - Chapter 3
CHAPTER THREE
CYBER SECURITY POLICY IN INDIA
The Government of India has identified Militarisation of Space and Cyber Security as
one among the five medium term threats/challenges faced by our country. The spectre
of nuclear proliferation and cyber terrorism and their connection with international
terrorism also represent problems for Indian national security for which solutions
must necessarily rely on international cooperation. “The apparent stability of the
nuclear balance and the quest for seeking new areas for military advantage may
prompt some states to move towards weaponisation of space. India, with its yet
limited space capability, will face a major challenge in protecting its space assets in
case of a conflict. Similarly, cyber space will be a greater challenge going forward—
both for security and economy”
India on its growth path is vulnerable. Located in an unstable region where the larger
neighbours possess this capacity, it is logical to assume that the country is under
serious threat and constant attack. The impact on national security is thus serious and
such that all institutions and organs of the state must jointly work to counter this
challenge
The Government of India has recently taken several steps to ensure greater focus on
these issues within the country. It has recently notified the National Cyber Security
Policy 2013 with the goal of addressing the cyber security domain comprehensively
from a national perspective. The main goal of the policy is to make the cyberspace
secure and resilient for citizens, businesses, and the government. The policy envisages
the establishment of national and sectoral mechanisms to ensure cyber security
through the creation of a National Critical Information Infrastructure Protection
Centre (NCIIPC). Computer Emergency Response Team (CERT-In) shall act as the
nodal agency for coordination of all cyber security and crisis management efforts. It
will also act as the nodal organisation for coordination and operationalization of
sectoral CERTs in specific domains in the country.
Though efforts are being made to create an effective policy framework to deal with
cyber security in the country, there are areas where significant challenges lie. E-
111
governance is a specific case in point. The country has put in place a separate core
ICT infrastructure for e-governance consisting of statewide area networks (SWANs)
and state data centres (SDCs) in each state and union territory. Common Service
Centres (CSCs), run by private village level entrepreneurs (VLEs), act as the front end
for delivery of these services in rural areas. Currently, over 100,000 CSCs are
operational across the country. Recently, mobile governance has been implemented to
bring all government services on the mobile platform. The National e-Governance
Plan is the flagship programme in e-governance consisting of 31 Mission Mode
Projects (MMPs) spanning across a large number of government ministries and
departments both at the national and state levels. During the last seven years of its
implementation, NeGP has achieved considerable success with 23 out of the 31
projects delivering services electronically to the citizens and businesses.
Though National e-Governance Plan (NeGP) has been a success, ensuring cyber
security remains a big challenge as it involves protecting critical ICT infrastructure
such as SWANs, SDCs and the applications of various departments running on them.
Though scheme specific guidelines have been issued and several states have made
significant efforts to protect their cyber assets, there is a need for a comprehensive
policy on cyber security in e-governance and ensuring uniformity in its
implementation across the country. Application level security is another important
domain where greater effort is required.
Building a national strategy for cyber security is the first step in establishing a
national cyber security program. A national policy framework should explain the
importance of cyber security; help stakeholders understand their role, and set goals
and priorities. The national strategy should integrate security fundamentals (such as
raising awareness) and emphasize cooperative relationships among national
stakeholders. The national strategy can also serve as a backdrop for the creation of
laws that relate to areas such as computer crime, the protection of intellectual
property, and privacy. The goals that a nation identifies and promotes through its
strategy align the program to a consistent vision and establish a clear direction for the
efforts of the program. The strategy should include sufficient detail to allow
stakeholders—including the National CSIRT—to understand the stated goals and
evaluate their progress toward achieving them. Finally, the national strategy should
112
reconcile the need for security with the rights of citizens, as well as national values
and norms.
The National CSIRT should be deliberately aligned with national cyber security
strategic goals to ensure that its work contributes to achieving them. While
establishing a national strategy is the first step, doing so may not always be feasible.
Getting a large number of stakeholders to agree on a strategy can be difficult.
Alternatively, national leaders may judge that the need to establish an incident
management capability is more pressing than creating a fully integrated strategy. In
these cases, creating an effective strategy may occur concomitantly with building
incident management capability. Regardless, the National CSIRT sponsor or
proponent should work with the government to consider national needs and priorities
throughout the process of building a National CSIRT.
India’s approach to cyber security has so far been ad hoc and piecemeal. A number of
organisations have been created but their precise roles have not been defined nor
synergy has been created among them. As it transcends a vast domain, this falls
within the charter of the NSCS. However, there appears to be no institutional structure
for implementation of policies. Neither the private sector nor government has been
able to build information systems that can be described as reasonably robust. There
has not been enough thinking on the implications of cyber warfare.
Meanwhile, many countries are seriously engaged in attending to their cyber security
doctrines and strategies. The US, Russia, UK, France, Australia, Germany, New
Zealand, South Korea, China, Brazil, South Africa, Denmark, Sweden, EU,
Singapore, Malaysia – the list is long and growing – are actively engaged in ensuring
a safe and secure cyber environment for their citizens. The international community is
also engaged in a variety of discussions.
NATO has taken the task of creating cyber security institutions in member countries.
A group of governmental experts (GGE), set up by the UN Secretary General, gave a
report in 2010 on “developments in the field of ICT in the context of international
security”. The report noted that there was increasing evidence that states were
developing ICTs as “instruments of warfare and intelligence, and for political
113
purposes”. To confront challenges in cyberspace, the GGE recommended cooperation
among likeminded partners, among states, between states, and between states and
civil society and the private sectors.
The strongest countries in terms of cyber military capabilities are the US, China,
Russia, the UK and Israel. In the imminent future there is no doubt that countries that
do not invest in IT protection will become [or already are] easy targets of criminal
elements. On comparison with our enterprising neighbor China, the Indian statistics
pales. As per an estimation of the National Security Council, China, with its 1.25 lakh
cyber security experts, is a potential challenge to India’s cyber security. In
humiliating contrast, India has a mere 556 cyber security experts. At stake is India’s
US$ 2.1 trillion GDP, power grids, telecommunication lines, air traffic control, the
banking system and all computer-dependent enterprises.
India and China’s cyber security preparedness is a striking study in contrast. India is a
reputed information technology-enabled nation while China struggles with its
language handicap. India, with a massive 243 million internet users, has digitized its
governance, economy and daily life on an industrial scale without paying adequate
attention to securitize the digitization plan. In the digital era, national security is
inextricably linked with cyber security, but despite being the single biggest supplier of
cyber workforce across the world India failed to secure its bandwidth and falters to
detect the simplest of cyber crimes, which often leads to devastating consequences.
114
In most nations, the executive branch enforces laws and ensures security. It also may
include the military. The executive branch is often the sponsor of the national cyber
security program. They ensure that the cyber security program remains viable and has
appropriate resources (for example, is authorized, staffed, funded, and so on).
The legislative branch provides effective laws that promote cyber security. Whether
through appropriations of resources or funding, legislation that mandates execution of
national strategy, privacy or tort laws, or laws that establish criminal behaviors, the
legislature must ensure that national cyber security program has necessary support.
The Judiciary
The nation’s judiciary and legal institutions provide clarity and consistency in areas of
law that can affect cyber security. Privacy law is an example of one of these areas. By
working with their global counterparts, the legal community can limit the ability of
criminals and other malicious actors to take advantage of differences in legal
jurisdictions.
Law Enforcement
115
Intelligence Community
The intelligence community plays an important watch and warning role for technical
infrastructure. Intelligence organisations usually monitor various sources for threats
and vulnerabilities to a nation’s infrastructure. This information should be distilled
and provided to the National Computer Security Incident Response Team (National
CSIRT) and, where appropriate, to infrastructure owners. This distribution of
information helps both groups efficiently anticipate, recognize, and resolve attacks.
116
Vendors
Academia
Educational institutions play a key role in developing the human capital and technical
skills needed to solve complex problems, such as aspects of cyber security.
Academics conduct research that enhances the technical, legal, and policy aspects of
cyber security. In many countries, educational institutions have championed and
hosted National CSIRTs.
Foreign Governments
Nations have a shared interest in mitigating cyber risk and working together to
respond to incidents. Partnerships should be established to discuss global risk and
interdependence as well as economic, political, and infrastructure concerns. Countries
aligned with one another can exchange valuable intelligence and promote regional
cyber prevention and preparedness.
Citizens
The citizens of a nation have a stake in the reliable performance of a nation’s strategy
for cyber security and are an inherent part of that strategy.
117
However, only CERT-In is mandated under the IT Amendment Act, 2008 to serve as
the national agency in charge of cyber security. The Act also provided for a national
nodal agency for protection of CII but it is not clear whether such an organisation
exists other than on paper; NDMA and some others play only a peripheral role; and
118
many of the sectoral CERTs are yet to come up. In the meantime, real oversight over
cyber security is to be distributed amongst the Ministries of Communication and
Technology, Home Affairs and Defence, and the office of the NSA.
Recently, Government of India has combined both the DIT and DoT and created a
new department namely Department of electronics and information technology
(DeitY). This department now oversees all the affairs regarding cyber security policy
in India.
The following is the strategy followed by Government of India with regard to policy:
Capacity building
- Skill & Competence development
- Training of law enforcement agencies and judicial officials in the
collection and analysis of digital evidence
- Training in the area of implementing information security in
collaboration with Specialised Organisations in US
119
Setting up Digital Forensics Centres
- Domain Specific training – Cyber Forensics
- Research and Development
- Network Monitoring
- Biometric Authentication
- Network Security
- International Collaboration
It is interesting to analyse NCSP from market driven versus regulatory approach. The
policy conveys that the government is taking a combination of both the approaches –
market and regulatory driven. For instance, the policy on one hand mentions
encouraging organisations to designate Chief Information Security Officer, (CISO) to
develop information security policies, adopt guidelines for procurement of
trustworthy ICT products and services, earmarking of specific budget for security and
goes to the extent of providing fiscal schemes and incentives to encourage
organisations for strengthening information infrastructure with respect to cyber
security. It encourages ‘all entities to periodically test and evaluate the adequacy and
effectiveness of technical and operational security control measures.’ But on the other
hand, the policy mentions ‘mandatory periodic audit and evaluation of the adequacy
and effectives of security of information infrastructure, as may be appropriate.’ The
policy does not however specify which ‘information infrastructure’ and is subject to
further clarification. However, if one analyses other sections of the policy, and relates
them with the above mentioned, one may reach the conclusion that the intention of the
policy is to mandate security measures for e-governance services and critical
information infrastructure. (DSCI Report)
The policy also ‘mandates implementation of global security best practices, business
continuity management and cyber crisis management plan for all e-governance
initiatives’. The same has been mandated for critical sector entities in addition to
‘encouraging and mandating as appropriate, the use of validated and certified IT
products’, ‘mandating security audit of critical information infrastructure on periodic
basis’ and ‘secure application / software development process’ and goes to the extent
of ‘mandating certification for all security roles.’ The policy, however, does not
specify the critical information infrastructure, though the DeitY has enlisted critical
120
sectors as Defence, Finance, Energy, Transportation and Telecommunications. It is
important to explicitly identify the critical information infrastructure. The provisions,
which are mandatory in the policy, need deeper analysis based on the experience of
other countries and the Indian context. For E.g. US had to withdraw the cyber security
bill, which mandated security standards in the wake of industry finding it difficult and
costly to implement. In the process, they lost time in making their critical information
infrastructure more secure.
Another focus area of the NCSP is indigenous development of cyber security products
through cutting edge R&D. The policy direction to work with the industry through
joint R&D projects and setting up Centers of Excellence is a step towards greater
Public Private Participation (PPP). However, the key objective of developing
indigenous security technologies is to enhance security levels especially to address
national security concerns. This objective is in line with the Triad Policies of the
government on Electronics, IT and Telecommunications. In the Securing Our Cyber
Frontiers report it has been emphasized that India should be able to mitigate security
risks arising from procurement of ICT products, especially from foreign vendors, and
yet take full benefits from the global supply chain that includes access to world class
products, services and expertise at competitive prices. Giving preference to
indigenous products for national security reasons may not be the right policy
direction, primarily for two reasons – Firstly, deploying domestically developed
products may not necessarily reduce the supply chain risks, since these need to be
tested globally in real life environment. Secondly, if other countries take such an
approach to this problem, it will adversely impact India’s outsourcing industry, which
will be set to lose out to domestic companies in such countries. Therefore, to
121
effectively address such risks without affecting business competitiveness and
country’s image as a promoter of global trade & market, India should build its
capacity to mitigate ICT supply chain risks.
The focus should be on building testing infrastructure and facilities for IT security
product evaluation. The infrastructure should be rolled out on priority in PPP mode.
Work is already underway to conceptualize this project under the JWG at National
Security Council Secretariat (NSCS). The focus on developing indigenous products
must be there but for the reasons of economic growth, targeting the global security
market, and not solely driven by national security concerns.
The revelation of PRISM program in the US has reignited global debate on national
security versus right to privacy. Many governments’ programs for national security
and cyber security raise privacy concerns. It is the responsibility of the governments
to assuage such concerns by establishing adequate safeguards for protecting privacy.
In this context it is appreciable that one of the objectives of NCSP is to enable
safeguarding of privacy of citizen’s data, even though no specific strategy or activity
to achieve this objective has been mentioned in the policy.
122
India started a process of economic liberalization in the 1990s. One of the main
features of this process has been to simplify rules and regulations to attract foreign
investment. As a result of this, India is becoming easier to enter from a regulatory and
commercial point of view but there are still issues to overcome, one of them being
Indian privacy standards for the outsourcing company. India lacks specific laws on
privacy and data protection, how ever; there are proxy laws and other indirect
safeguards, which provide adequate protection to companies off shoring work (Yadav
& Priyadarshini 2008).
Indian IT act in conjunction with other related acts provide basic legal framework.
One of the biggest drawbacks to securing cyberspace in the Indian context is the lack
of adequate data. Whatever data is available does not adequately convey the full
picture, or worse, can be misleading. Skewed data also results in skewed priorities;
the continued highlighting of website hackings leads to a great deal of time being
spent on securing government websites, irrespective of their importance, at a time
when greater attention should be paid to other facets of cyber security such as
securing critical infrastructure or auditing the cyber security preparedness of
companies in critical sectors. To illustrate, according to the annual report of the
National Crime Records Bureau, cyber-related crimes were a mere 1,322 in 2010,
making up 0.19 per cent of all crimes in the country.
At the same time, according to figures from the Reserve Bank of India as recently
reported to Parliament, the total amount involved in cases of financial fraud over the
Internet in 2011 was Rs.787.39 lakh or US $1.6 million. Finally, according to the
Computer Emergency Response Team-India (CERT-In), 13,301 security incidents
were reported to it in 2011. While these indices have been monitored over the past
few years and provide a general idea of the upward trend in cyber-related incidents,
they do not lend themselves easily to further analysis in the absence of more detailed
data.
For instance, in the case of financial fraud, it would be useful to know whether these
were perpetrated by exploiting technical vulnerabilities or through other means such
as social engineering, or by a combination of the two. The absence of more precise
figures creates an information gap between the various stakeholders, be it the
123
government, the various service providers primarily in the private sector, and the end
users of these services. Much of the data lies with different organisations and is not
available in the public domain. With cyber infrastructure and data largely in the hands
of the private sector, there needs to be much more by way of standardisation and
sharing of data between the government and the private critical information
infrastructure companies such as the Internet Service Providers.
The cyber security market in India was estimated to be around USD 252 million in
2012, with a year-on-year growth rate of 20-30 percent and a Compound Annual
Growth Rate (CAGR) of 16.4 percent from 2012- 2017. It is expected to reach USD
529 million in 2017. Some of the major drivers of the industry include a rise in the
use of IT enabled services, improved internet penetration and the awareness of SMBs
on the importance of investing in IT security in order to protect data.
According to a survey report by security vendor Symantec, SMBs have become alert
about the installation of IT security programs that are more than basic antivirus
solutions. The survey further revealed that 67 percent of the SMBs in India consider
data loss to be a major concern; 60 percent referred to cyber crime as a potential
business risk. Thus, the report clearly indicates that IT security has become the top IT
priority for large enterprises and as well as for SMBs.
Security solutions such as antivirus and firewalls are not fool proof against data theft
or cyber crime. Hence, there has been a considerable change in the way IT services
are being used by enterprises. This has led to changes in the demand for security
124
solutions. The use of virtualization and cloud computing has replaced network
gateways.
According to a report by industry experts, the banking and the financial services,
market (BFSM) is the largest user of cyber security solutions in India. This segment
accounts for 36 percent of the country’s total cyber security. The report further states
that the SMB segment is the fastest growing segment in the adoption of
security solutions. The rise in spending by SMBs is based on basic cyber security
solutions such as firewalls, antivirus, protection for a Virtual Private Network (VPN);
major domain to communicate through a dedicated server to corporate network.
The Indian cyber security market has huge opportunities for further investment as
more and more enterprises become aware of the potential threat of data theft. These
organisations are increasingly spending a major chunk of their budgetary allocation
on IT security solutions.
Market Trend/Analysis
What are the opportunities and challenges that such a situation presents to nations like
India? To analyse these aspects, it is important to understand the key trends in
emerging technologies and how they impact the security scenario in cyber space.
Internet Mobility
The most important phenomenon that is driving the expansion in the usage of Internet
worldwide is mobility. The advent of mobile devices has brought an unprecedented
number of users online, and has consequently increased the risks associated with
125
cyberspace as many of the mobile and tablet users may be first time users of Internet
and may not be skilled enough to understand the risks. An expansion in the usage of
smartphones and tablets has also brought into focus the security of the operating
systems and applications that run on them. As the usage expands, so will the attempts
by hackers to break into these devices and steal sensitive personal and corporate
information. While this poses challenges for the device manufacturers and OS
developers, it presents great opportunities for Indian firms working in the mobility
domain. As India is known for its prowess in software development, developing
security solutions and secure applications for the mobile world is an unprecedented
opportunity globally that is just waiting to be grabbed.
Cloud Platform
The second important technology trend that is driving the ICT industry is the
emergence of the cloud platform. While this phenomenon emerged a few years ago, it
is only now maturing and cloud based solutions are being deployed across a number
of domains in business, industry and government. Ensuring proper security of
applications and data on the cloud is a major challenge and its entire implications are
still not clear. Even a few cloud failures can result in massive breaches in security and
devastating loss of data for the users. As the cloud encompasses the entire gamut of
infrastructure, platform, and software as services, developing security solutions for
this platform presents the Indian industry with an outstanding opportunity globally. A
related segment which also presents great opportunities is data centre operations and
management. Another related phenomenon is the emergence of security as a service
on the cloud. This space offers good opportunities for Indian firms.
Multiple Authentications
The third important trend that has recently emerged is the use of multi-factor
authentication to improve security. Just a simple password is not enough to ensure
access to a host of applications and services in areas such as banking, insurance,
financial transactions and government services. In India, an Aadhaar based biometric
authentication has emerged as a new mechanism to authenticate the identity of users.
126
This presents an excellent opportunity for Indian industry to develop applications in
this domain and address security concerns.
Morphing
The fourth trend impacting on cyber security globally is the continuous morphing of
hacker groups and individuals to maintain their anonymity. This poses serious
challenges for organisations and government agencies trying to secure cyberspace, as
the attacks cannot be attributed to any specific entity. However, this situation also
presents opportunities to continuously evolve technologies that can help in unmasking
the identity of these anonymous attackers. Active cooperation amongst government
agencies and organisations internationally is required to achieve the desired objectives
in this area. Agencies such as the United Nations are active and the issue of global
cyber security is likely to come up at the 68th session of the UN General Assembly in
September 2013.
The fifth trend that is impacting the cyber security scenario is the increasing
involvement of state actors in cyber war aimed at crippling the information and
communication infrastructure of their targeted countries and crippling their social,
economic, government and military activities. There is enough evidence of
involvement of state actors in several recent incidents of cyber attacks. Stuxnet is a
case in point. It presents a serious challenge for countries like India, surrounded by
several inimical neighbours. However, this also presents the country with a big
opportunity to develop solutions to secure its ICT infrastructure and cyber assets.
The sixth emerging trend is the related issue of ensuring privacy and confidentiality of
information pertaining to individuals and businesses. One of the motivations for cyber
attacks is to gain access to or steal information that has commercial value or that helps
127
the attackers to commit fraud with that information. To protect privacy, effective laws
and regulations need to be put in place to ensure what data can be used and shared and
for what purpose. It also has a bearing on where the data can be stored in servers. This
is already a major concern in some domains such as healthcare, where privacy and
security concerns about hosting and sharing health data are significant. As India is the
world leader in IT services outsourcing business, it offers a big opportunity for the
Indian government to put in place effective policies to assure the international
community that the country respects the concerns on privacy and confidentiality of
data. Indian industry should exploit this opportunity to get a bigger share of the
worldwide market in IT and IT enabled services.
International Co-operation
Lastly, there is a greater effort being made internationally at the multilateral level to
address global concerns on cyber security. Recently, the international Group of
Governmental Experts, representing 15 countries including India, has submitted a
report to the United Nations secretary general on enhancing cyber security globally.
International cooperation in cyber security presents great opportunities for India to
spearhead and lead the efforts to build a global consensus around the approaches to
address the issues. It would also open up tremendous opportunities for Indian industry
to develop and showcase its capabilities to offer technical solutions to deal with the
threats.
The National Informatics Centre (NIC) was set up as early as 1975 with the goal of
providing IT solutions to the government. Between 1986 and 1988, three NWs were
set up: INDONET, connecting the IBM mainframe installations that made up India’s
computer infrastructure; NICNET (the NIC Network), being a nationwide very small
aperture terminal (VSAT) NW for public sector organisations as well as to connect
the central government with the state governments and district administrations; and
the Education and Research Network (ERNET), to serve the academic and research
communities.
128
Growth Trends
Policies such as the New Internet Policy of 1998 paved the way for multiple Internet
service providers (ISPs) and saw the Internet user base grow from 1.4 million in 1999
to over 15 million by 2003. Though the rate of growth has slowed subsequently, with
Internet users now approximately numbering 100 million, exponential growth is again
expected as Internet access increasingly shifts to mobile phones and tablets, with the
government making a determined push to increase broadband penetration from its
present level of about 6%. The target for broadband is 160 million households by
2016 under the National Broadband Plan.
Despite the low numbers in relation to the population, Indians have been active users
of the Internet across various segments. The two top email providers, Gmail and
Yahoo, had over 34 million users registered from India.3 Similar figures have also
been seen in the social networking arena, which is the most recent entrant to the cyber
platform. India currently has the fastest growing user base for Facebook and Twitter,
the two top social networking sites. An indication of the rapid pace of adaptation to
the Internet in India is that Indian Railways, India’s top e-commerce retailer, saw its
online sales go up from 19 million tickets in 2008 to 44 million in 2009, with a value
of Rs. 3800 crore ($875 million)
As in most countries around the world, the cyber security scenario in India is one of
relative chaos and a sense of insecurity arising out of the periodic reports of cyber
espionage, cyber terrorism, cyber warfare and cyber crime. The complexity of the
issue has resulted in a virtual paralysis. Legal and law enforcement mechanisms have
not shifted gears fast enough to grapple with growing cyber crime. Periodic
newspaper reports indicate that a wide variety of offensive measures are being
contemplated by various agencies, but that is all. The lack of a coherent cyber security
policy will seriously interfere with India’s national security and economic
development.
It is essential that more attention at the highest levels be paid to ensure that cyber-
related vulnerabilities that can impact on critical sectors are identified and removed. A
coherent and comprehensive cyber security policy will have several major elements,
including accurate conceptualisation of cyberspace threats; building of robust
129
cyberspace through a variety of measures, including technical, legal, diplomatic,
international cooperation; creation of adequate organisational structures;
strengthening of PPPs; HR development; and implementation of best practices and
guidelines. The list is only illustrative.
The policy is expected to boost the cyber security products and services market in
India, providing significant opportunities to security product and services companies
and auditing firms. It is also likely to give impetus to the domestic security industry
esp. the start-ups offering niche and innovative security products. The policy items
once implemented would create direct and indirect jobs as many new infrastructures
such as training institutes, testing labs, centers of excellence, R&D projects, sectoral
CERTs, among others would be established.
130
Core Issues
Cyber-security issues are challenging for academics more generally. Experts of all
sorts widely disagree how likely future cyber-doom scenarios are – and all of their
claims are based on (educated) guesses. While there is at least proof and experience of
cyber-crime, cyber-espionage or other lesser forms of cyber-incidents on a daily basis,
cyber-incidents of bigger proportions (cyber-terror or cyber-war) exist solely in the
form of stories or narratives. The way one imagines them influences our judgment of
their likelihood; and there are an infinite number of ways in how one could imagine
them. Therefore, there is no way to study the “actual” level of cyber-risk in any sound
way, because it only exists in and through the representations of various actors in the
political domain. As a consequence, the focus of research necessarily shifts to
contexts and conditions that determine the process by which key actors subjectively
arrive at a shared understanding of how to conceptualize and ultimately respond to a
security threat.
In India, the government is in the process of making a cyber security policy and
establishing an elaborate cyber security infrastructure. Public-private partnership
(PPP) is being preferred. Yet, Indian cyber space, which is growing at a rapid pace, is
insecure and highly vulnerable, as the spate of recent cyber attacks has shown. A
Computer Emergency Response Team (CERT) India, functioning since 2004, is the
lone institution generating some awareness about cyber security. Unfortunately, the
institution is under funded and under resourced.
131
India needs to ensure its national interests are protected during cyber security
negotiations. It has yet to take firm position on issues such as the rules of the road,
state behaviour in cyber space, confidence building measures, application of the law
of the armed conflict to cyber conflicts and cyber weapons. It must strike a balance
between open, insecure internet and an overregulated an over protected cyber space.
These issues must be debated so that a societal consensus can emerge.
Consistent with need, the primary objectives for securing country's cyber space are:
• Preventing cyber attacks against the country's critical infrastructures
• Reduce national vulnerability to cyber attacks
• Minimise damage and recovery time from cyber attacks
To pursue the strategic objectives the following major initiatives identified need to be
comprehensively prepared:
132
Security Policy, Compliance and Assurance
Many of the critical services that are essential to the well being of the economy are
increasingly becoming dependent on IT. As such, the Government is making efforts
to identify the core services that need to be protected from electronic attacks and is
seeking to work with organisations responsible for these systems so that their services
are secured in a way that is proportional to the threat perception. The primary focus of
these efforts is to secure the information resources belonging to Government as well
as those in the critical sectors. The critical sectors include Defence, Finance, Energy,
Transportation and Telecommunications. Consequently, many in the industry and
critical infrastructure organisations have come to recognize that their continued ability
to gain consumer confidence will depend on improved software development, systems
engineering practices and the adoption of strengthened security models and best
practices.
133
Endorsing actions are essentially commercial in nature and may involve more than
one service provider offering commercial services after having fulfilled requisite
qualification criteria and demonstrated ability prior to empanelment. These include:
Focus: Creation of National Cyber Alert System for Rapid identification & response
to security incidents and information exchange to reduce the risk of cyber threat and
resultant effects.
134
These can often mitigate the damage caused by malicious cyberspace activity.
For those activities to take place effectively at a national level it requires a
partnership between government and industry to perform analyses, issue
warnings, and coordinate response efforts. Because no cyber security plan can
be impervious to concerted and intelligent attacks, information systems must
be able to operate while under attack and have the resilience to restore full
operations in their wake. The National Cyber Alert System will involve
critical infrastructure organisations, public and private institutions to perform
analysis, conduct watch and warning activities, enable information exchange,
and facilitate restoration efforts.
I. Augmentation of CERT-In:
CERT-In is operational since January 2004 and is catering to the security needs of
Indian Cyber community, especially the Critical Information Infrastructure. In line
with the expectation of the user community and various stake holders, there is a need
135
to augment the facilities at CERT-In in terms of Manpower, Communication systems,
tools, etc. for vulnerability prediction, analysis & mitigation, Cyber forensics/artifact
analysis, Cyber space monitoring & interception Capabilities and Critical information
infrastructure Security health check. The National Information Board and National
Security Council have endorsed the need for augmentation of facilities at CERT-In.
The cyber threat sources and attacks span across countries. As such as there is a need
to enhanced global cooperation among security agencies, CERTs and Law
Enforcement agencies of various countries to effectively mitigate cyber threats.
Accordingly it is vital to have well developed Cyber Security and Information
Assurance research and development programme which is executed through different
government agencies in broad collaboration with private sectors, partners and
stakeholders in academia, national and international agencies.
136
documents, security of next generation networks and Cyber Forensics
§ Coordination in early warning, threat & vulnerability analysis and incident
tracking
§ Cyber security drills/exercises to test the vulnerability & preparedness of
critical sectors
Focus - To meet the specific needs of Law Enforcement, Judiciary and other users
such as E-Governance project owners catering for
• A baseline for IT Security awareness
• Skill & Competence development
• Advanced Manpower Certification programmes
Many cyber vulnerabilities exist because of lack of cyber security awareness on the
part of computer users, system/network administrators, technology developers,
auditors, Chief Information Officers (CIOs), Chief Executive Officers (CEOs), and
Corporates. A lack of trained personnel and the absence of widely accepted, multi-
level certification programs for cyber security professionals complicate the task of
addressing cyber vulnerabilities. The following strategy has been identified for major
actions and initiatives for user awareness, education, and training:
137
Security R&D
Privacy
The Group agreed that any proposed framework for privacy legislation must
be technologically neutral and interoperable with international standards.
Specifically, the Privacy Act should not make any reference to specific
technologies and must be generic enough such that the principles and
enforcement mechanisms remain adaptable to changes in society, the
138
marketplace, technology, and the government. To do this it is important to
closely harmonise the right to privacy with multiple international regimes,
create trust and facilitate co-operation between national and international
stakeholders and provide equal and adequate levels of protection to data
processed inside India as well as outside it. In doing so, the framework should
recognise that data has economic value, and that global data flows generate
value for the individual as data creator, and for businesses that collect and
process such data. Thus, one of the focuses of the framework should be on
inspiring the trust of global clients and their end users, without compromising
the interests of domestic customers in enhancing their privacy protection.
Multi-Dimensional Privacy
Horizontal Applicability
The Group agreed that any proposed privacy legislation must apply both to the
government as well as to the private sector. Given that the international trend
is towards a set of unified norms governing both the private and public sector,
and both sectors process large amounts of data in India, it is imperative to
bring both within the purview of the proposed legislation.
139
intended to provide the baseline level of privacy protection to all individual
data subjects. The fundamental philosophy underlining the principles is the
need to hold the data controller accountable for the collection, processing and
use to which the data is put thereby ensuring that the privacy of the data
subject is guaranteed.
140
security threats.
§ To enhance the protection and resilience of the nation’s critical information
infrastructure.
§ To create a workforce of five lakh specialists in cyber security over the next
five years. To achieve these objectives, the NCSP proposes to implement
following strategies:
§ Establish a round-the-clock National Level Computer Emergency Response
Team as the designated national nodal agency for coordination on cyber
security, supported by round-the-clock Sectoral Level Computer Emergency
Response Teams.
§ Implement a Cyber Crisis Management Plan to deal with incidents impacting
critical processes, public safety or national security.
§ Encourage all public and private organisations to appoint Chief Information
Security Officers and implement information security policies.
§ Develop a dynamic legal framework with provisions for periodic review and
harmonisation with international frameworks.
§ Mandate periodic audit and evaluation of information infrastructure security.
§ Establish cyber security training infrastructure through public private
partnerships.
§ Establish institutional mechanisms for capacity building of law enforcement
agencies.
141
security and regulatory compliance policy, dealing with issues like electronic
document classification, compartmentalisation and centralised security clearance, is
also the need the hour.
In this scenario, the responsibility of honing the discourse lands on the shoulders of
able policy makers, strategic affairs analysts and geopolitical experts who can go to
the depths of the problem and evangelise to the international security community with
a fervent zeal. However, there exists a great chasm between the technical security
professionals and high- level interlocutors. The special interest groups on information
warfare and cyber-security lack the contribution of technologists with hands-on
exposure, thus succumbing to misdirection and confusion. It is imperative that we
inculcate in the thought process of contemporary policy makers the multifaceted
views of such professionals.
The question that looms large is whether we can reach a coherent and agreeable
consensus on attribution, deterrence and pre-emption of cyber- attacks. While India
has made tall strides in order to assert its place in the fifth dimension of war, more
awareness and seamless initiative is needed. Mere wishful thinking of being the next
cyber-power would not take India too far. One must always keep in mind that hacking
has its origins as a counter cultural movement preaching fierce individualism, full
disclosure and an emphasis on breaking things. The very act of institutionalisation is
an antithesis to a domain, which breeds on chaos and anarchy.
142
India’s inertia to induct cyber security as an essential element of national security and
growth is tremblingly palpable. Cyber security is less debated, sporadically written
about, and rumoured at best in India. Because of this apathy and despite India’s grand
stature in the cyber world, India is vulnerable to the cyber snarls of China and other
countries.
With its archaic governmental architecture, India is still in expansion mode with little
time spared on digital security. One of the significant reasons of India’s inertia is its
lack of understanding and appreciation of the gravity of cyber security. The Ground
Zero Summit, which is considered as the Mecca of India’s cyber security debate and
an earnest endeavor of cyber security professionals, failed to get a single political
figure to deliberate on the issue. India is nowhere in the cyber war that has engulfed
the globe. India’s response to such a critical situation is a timid National Cyber
Security Policy that the government circulated in 2013. There is no national overhaul
of cyber security and the Indian Computer Emergency Response Team, the statutory
body to look after cyber attacks, has little critical strength or capability. Its endeavour
to recruit young talent and meaningfully engage them is still to take off.
After the 2013 National Security Council note that exposed India’s cyber security
unpreparedness, the government decided to augment infrastructure and hire more
professionals. However, what is required is a strategic vision to ensure stealth in
India’s cyber security and a political conviction to plug strategic vulnerabilities. The
National Technical Research Organisation has regularly been alerting successive
governments about the danger from Chinese cyber attacks. India cannot afford to be
passive and unresponsive because if it does not act now, by the time a sophisticated
cyber-attack happens, it will probably be too late to defend against it effectively.
143
The Institute for Defence Studies and Analyses (IDSA), New Delhi made an
exhaustive study of existing state of cyber security affairs in the country. They came
out with a task force report, which gives an all-inclusive picture of how matters
relating to cyber security are being tackled in the country. The following is the set of
recommendations they came up with:
General Recommendations
Government
§ The NSA, through NIB, should be put in charge of formulating and overseeing
the implementation of the country’s cyber security policy within the ambit of a
larger national security policy. This body should be serviced by the NSCS for
policy measures and DIT and other departments (e.g. Telecom, space, etc.) for
operational measures.
§ A Cyber Coordination Centre should be established at the operational level,
staffed by personnel from the relevant operational agencies. This centre would
serve as a clearing-house, assessing information arriving in real time and
assigning responsibilities to the agencies concerned, as and when required.
§ MHA should be the nodal agency for handling cyber terrorism. To handle
cyber terrorism and cyber crime, a slew of measures will be needed, ranging
144
from monitoring and surveillance, investigation, prosecution etc. Cyber
terrorism should be regarded as a part of the nation’s overall counterterrorism
capabilities. The National Counter Terrorism Centre being set up should have
a strong cyber component. NIB, with MHA as the nodal agency, should be
tasked with the responsibility of formulating and implementing a policy to
deal with cyber terrorism. The issues of ethical hacking and immunity for
defence and intelligence officers should be considered.
§ MHA should also be the nodal agency for dealing with cyber crime. In dealing
with cyber crime, some of the measures needed will overlap with those
required to deal with cyber terrorism but extra effort will be required to ensure
greater awareness, strengthening of the legal framework, law enforcement,
prosecution, etc. Particular focus should be placed on awareness and
enforcement. MHA, in collaboration with DIT and the Law Ministry should
make a necessary roadmap in this regard.
§ Headquarters IDS should be the nodal agency for preparing the country for
cyber warfare in all its dimensions. The necessary structures should be created
in a time-bound manner. Since cyberspace is integral there should be an
appropriate interface between defence and civilian departments. NIB should
smooth out the difficulties.
§ NSCS should be given the nodal agency for coordinating the efforts to protect
critical infrastructure of the country. This will require identification of the
critical infrastructure and formulation and implementation of strategies to
ensure protection of each component from cyber attacks.
§ DIT should be tasked with creating the necessary cyberspace situational
awareness, strengthening PPP, promoting international cooperation, and other
residual measures. DIT will necessarily have other nodal agencies. The
interface between DIT and other agencies should be smoothed out by the NIB.
§ Cyber security education, R&D and training will be an integral part of the
national cyber security strategy. The government should set up a well-
equipped National Cyber Security R&D Centre to do cutting edge cyber
security R&D. This Centre should be a PPP endeavour. Cyber security
research should also be encouraged in public and private universities and
institutions. DIT could come up with a roadmap for cyber security research in
the country. The country’s strengths in ICT should be leveraged. DRDO
145
should conduct specialised research for the armed forces and NTRO should do
so for the country’s intelligence agencies.
§ DIT’s CERT should be the nodal agency, much like the Met Department for
weather forecasting, to create and share cyberspace situational awareness in
the country. DIT should make public awareness of risks, threats and
vulnerabilities in cyberspace and how these should be managed.
§ Disaster management and recovery must be an integral part of any national
cyber security strategy. The DIT should be the nodal agency for such efforts.
It should coordinate its efforts with NDMA and also other government
departments as well as private bodies.
Specific Recommendations
146
renowned cyber professional bodies should be encouraged.
§ The impact of the emergence of new social networking media, and
convergence of technologies on society including business, economy, national
security should be studied with the help of relevant experts, including political
scientists, sociologists, anthropologists, psychologists, and law enforcement
experts. It should be ensured that the issues of privacy and human rights are
not lost sight of and a proper balance between national security imperatives
and human rights and privacy is maintained.
Cyber Warfare
§ Need to lay down red lines, define objectives and enunciate a doctrine. Flesh
out a policy of proactive cyber defence with emphasis on actions taken in
anticipation to prevent an attack against computers and NWs.
§ Raise a Cyber Command and build up offensive capabilities.
§ Create a pool of trained people such as Cyber TA Battalions who can provide
“surge capacity” to bolster the country’s resources during critical periods or in
the event of hostilities
§ Study the impact of social NWs with respect to national security and
perception management, especially during crisis.
Critical Infrastructure
147
element of e-security plan to address security issues.
§ Government should promote R&D in private industry through active
government support for industry-led research projects in the areas of security.
Establish enabling mechanisms to facilitate this.
§ Government should focus on creating a workforce of security professionals in
the country keeping in view the requirements of the future.
§ PPP model should be explored for taking security to the regions and industry
sectors.
§ Strengthening telecom security – one of the key pillars of cyber security,
especially through development of standards and establishment of testing labs
for telecom infrastructure (equipment, hardware).
§ Capacity building in the area of cyber crime and cyber forensics in terms of
infrastructure, expertise and availability of HR and cooperation between
industry, LEAs and judiciary.
Legal
§ Need for trained and qualified experts to deal with the highly specialised field
of cyber security. Awareness with regard to the threat to ICT infrastructure
needs to be created and the necessary legal provisions to ensure cyber safety
must be developed.
§ Substantive laws dealing with illegal access, illegal interception, data
interference, misuse of devices, computer-related forgery, child pornography,
etc. must be implemented.
§ Procedural laws need to be in place to achieve cooperation and coordination of
international organisations and governments to investigate and prosecute
cyber criminals.
§ The police must work closely with both governmental and non-governmental
agencies, Interpol and the public at large to develop a comprehensive strategy
to address the problems.
§ Lobbying at an international level for the harmonisation of existing national
legislation to ensure that such laws provide a fair measure of deterrence to
cyber criminals and cyber terrorists, thereby making cyberspace a safer place
148
for national and international transactions.
§ Government must put in place necessary amendments in existing laws or enact
a new legislation like a Data Protection/Privacy Act to safeguard against the
misuse of personal information by various government agencies and protect
individual privacy.
Miscellaneous
The IDSA have come out with a comprehensive set of recommendations or the
government. The government needs to take their inputs seriously and implement them
while preparing the policy bill on national cyber security policy.
Conclusion
India has enacted the information technology act, 2000 that governs legal issues of e-
commerce, e-governance, cyber crimes, etc. However, techno legal experts believe
that Indian laws like IT Act 2000 and telegraph act require urgent repeal and new and
149
better techno legal laws must be enacted to replaces these laws.
There are no dedicated cyber security laws in India. Indian government has drafted
the cyber security policy of India 2013 but the same has not been implemented so far.
Further, the policy is also suffering from many shortcomings including lack of
privacy and civil liberties protection and absence of cyber security breaches
disclosure norms. The cyber security trends of India have also shown poor cyber
security preparedness of India to protect its cyberspace and critical infrastructures.
India has still to take care of issues like critical infrastructure protection, cyber
warfare policy, cyber terrorism, cyber espionage, e-governance cyber security, e-
commerce cyber security, cyber security of banks, etc. Companies and individuals are
also required to cyber insure their businesses from cyber threats. Indian government is
in the process of formulating a cyber crime prevention strategy. This has come in the
wake of a public interest litigation (PIL) filed at the Supreme Court of India that has
asked the centre to frame regulations and guidelines for effective investigation of
cyber crimes in India. Simultaneously, the cyber crime investigation trainings in India
are also needed.
The offensive and defensive cyber security capabilities of India are also required to be
developed. A cyber attacks crisis management plan of India must also be formulated
to tackle cyber attacks and cyber terrorism against India. The proposed National
Cyber Coordination Centre (NCCC) of India is a good initiative regarding
strengthening of Indian cyber security capabilities. The National Critical Information
Infrastructure Protection Centre (NCIPC) of India would also come handy in
protecting Indian cyberspace.
150
The ambitious project named Digital India would also require very robust and
effective cyber security infrastructure and capabilities on the part of Indian
government and its agencies. There is no international cyber security treaty or cyber
law treaty that can help in resolving conflict of laws in cyberspace. Even a simple task
of obtaining digital information from foreign companies like Google takes months to
achieve.
In today’s information age, Internet is the engine for global economic growth and the
cyber security initiatives of any country should not impede it. Cyber security must be
considered as a key enabler for India’s economic growth and the government and
industry efforts/initiatives should reflect this realization. To establish itself as the
knowledge hub of the world, the key imperative for India is to address the cyber
security challenges by leveraging the strengths of public and private sectors through
public-private partnerships, considering the issue of cyber security at the board level
within organisations and taking leadership and partnering with other nations for
addressing global concerns in cyber security.
151