SlideShare une entreprise Scribd logo
1  sur  27
NATIONAL CYBER
SECURITY POLICY - 2013
SANTOSH KAHDASRE
PREAMBLE
SANTOSH KHADSARE 2
Complex environment of integrations between people,
software and services
Common pool used by citizens, businesses , critical
information infrastructure ,military and groups
Vulnerable to a wide range of incidents, whether intentional
or accidental, manmade or natural, and the info can be
exploited by both nation states and non state actors
SANTOSH KHADSARE 3
CYBERSPACE IS…..
Caters to the whole spectrum of ICT users and
providers and is an evolving process
IT SERVES AS AN UMBRELLA FRAMEWORK FOR
DEFINING AND GUIDING THE ACTIONS RELATED
TO SECURITY OF CYBER SPACE
It also enables the individual sectors and org in
designing appropriate cyber security polices to suit
their needs
SANTOSH KHADSARE 4
CYBER SECURITY POLICY
TO BUILD A SECURE AND RESILIENT
CYBERSPACE FOR CITIZENS,
BUSINESSES AND GOVERNMENT
SANTOSH KHADSARE 5
VISION
SANTOSH KHADSARE 6
MISSION
SANTOSH KHADSARE 7
OBJECTIVES
Create a secure
cyber ecosystem
Create an assurance
framework
Strengthen the
regulatory
framework
Enhance and create
national and
sectorial level 24x7
mechanisms for
info gathering
Enhance protection
and resilience of CII
by operating 24x7
NCIIPC
Develop indigenous
security
technologies
SANTOSH KHADSARE 8
OBJECTIVES
Est infrastructure
for testing &
validation of
security of such
products
Create workforce of
500,000
professionals in
next five years
Fiscal benefits to
businesses for
adoption of std
security practices
and processes
Enable effective
prevention ,
investigation and
prosecution of
cyber crime
Create culture of
cyber security
Develop public pvt
partnerships and
enhance global
cooperation
Designate a national nodal agency to coordinate matters(cyber
security) with clearly defined roles and responsibilities
designate CISO in every org who will be responsible for cyber
security efforts and initiatives
Org to devp info security policies and implement them as per
international best practices
Org to earmark a specific budget for cyber security
SANTOSH KHADSARE 9
STRATEGIES : CREATING A SECURE
CYBER ECO SYSTEM
Provide fiscal schemes and initiatives to encourage entities to
install and upgrade info infrastructure fro cyber security
Prevent occurrence and recurrence of cyber incidents
(proactive actions)
Est mechanism for sharing info
Procurement of trustworthy indigenously manufactured ICT
products
SANTOSH KHADSARE 10
STRATEGIES : CREATING A SECURE
CYBER ECO SYSTEM
Promote adoption of global best practices in info security and
compliance.
Create infrastructure for conformity assessment and
certification of compliance to cyber security best practices, std
and guidelines (e.g ISO 27001 ISMS certification).
Enable implementation of global security best practices for risk
management.
Identify and classify info infrastructure facilities and assets.
SANTOSH KHADSARE 11
STRATEGIES : CREATING A
ASSURANCE FRAMEWORK
Encourage secure appln/software devp processes.
Create conformity assessment framework for periodic
verification of compliance to best practices, std and guidelines
on cyber security.
Encourage all entities tom periodically test and evaluate the
adequacy and effectiveness of tech and op security measures
implemented in IT sys and networks .
SANTOSH KHADSARE 12
STRATEGIES : CREATING A
ASSURANCE FRAMEWORK
Encourage use of open standards to facilitate interoperability
and data exchange among different products and services.
Promote a consortium of Govt and private sector to enhance
availability of tested and certified IT products on open
standards.
SANTOSH KHADSARE 13
STRATEGIES : ENCOURAGING OPEN
STANDARDS
Devp dynamic and legal framework and its periodic review to
address Cyber security challenges.
To mandate periodic audit and evaluation.
To enable, educate and facilitate awareness of the regulatory
framework.
SANTOSH KHADSARE 14
STRATEGIES : STRENGTHENING
THE REGULATORY FRAMEWORK
To create National lvl sys , processes, structures and
mechanisms to generate situational scenario of
existing and potential threats and enable timely info
sharing for proactive, preventive and protective
actions.
To operate 24x7 CERT-in to function as a Nodal
Agency for coordination of all efforts for cyber
security emergency response and crisis mgt
(Umbrella org).
SANTOSH KHADSARE 15
STRATEGIES : CREATING MECHANISMS FOR EARLY
WARNING , VULNERABILITY MGT & RESPONSE
Operationalise 24x7 sectorial CERTs.
Implement Crisis Mgt plan for dealing with incidents impacting
critical national processes or endangering public safety and
security of the nation.
To conduct and facilitate regular cyber security drills and
exercises at National, sectorial and entity levels.
SANTOSH KHADSARE 16
STRATEGIES : CREATING MECHANISMS FOR EARLY
WARNING , VULNERABILITY MGT & RESPONSE
To mandate implementation of global security best practices,
business continuity mgt and cyber crisis mgt plan for all e-
Governance initiatives .
To encourage wider usage of PKI within Govt. for trusted
communication and transactions.
To engage info security professionals / org to assist .
SANTOSH KHADSARE 17
STRATEGIES : SECURING E-
GOVERNANCE SERVICES
To devp plan for protection of CII.
To operate 24x7 National Critical Information Infrastructure
Protection Centre(NCIIPC) to function as Nodal agency for CII
protection.
To facilitate identification, prioritisation, assessment,
remediation and protection of CII and key recourses.
To encourage and mandate as appropriate, the use of validated
and certified IT products.
SANTOSH KHADSARE 18
STRATEGIES : PROTECTION AND RESILIENCE
OF CRITICAL INFO INFRASTRUCTURE
To mandate security audit of CII on periodic basis.
To mandate certification of all security roles right from CISO
/CSO to those involved in operation of CII.
To mandate secure appl /software devp process.
SANTOSH KHADSARE 19
STRATEGIES : PROTECTION AND RESILIENCE
OF CRITICAL INFO INFRASTRUCTURE
To undertake R&D programs aimed at short term, medium term
and long term goals.
To encourage R&D to produce cost effective, tailor-made and
indigenous security solutions .
To facilitate transition, diffusion. And commercialisation of
outputs of R&D into commercial products and services for use
in public and private sectors.
SANTOSH KHADSARE 20
STRATEGIES : PROMOTION OF R&D
IN CYBER SECURITY
To set up Centre of Excellence in areas of strategic importance
for the point of security of cyber space .
To collaborate in joint R&D projects with industry and academia
in frontline technologies and solution oriented research.
SANTOSH KHADSARE 21
STRATEGIES : PROMOTION OF R&D
IN CYBER SECURITY
To create and maintain testing infrastructure and facilities of IT
security product evaluation and compliance verification.
To build trust relationships with product / system vendors and
service providers for improving end-to-end supply chain
security visibility.
To create awareness of the threats, vulnerabilities and
consequences of breach of security related to IT procurement.
SANTOSH KHADSARE 22
STRATEGIES : REDUCIN SUPPLY
CHAIN RISKS
To foster education and trg programs both in formal and
informal sectors to support the nation’s cyber security needs
and build capacity.
To est cyber security trg infrastructure across the country by
way of public private partnership arrangements.
To est cyber security concept labs for awareness and skill devp
in key areas.
To est institutional mechanisms for capacity building for Law
Enforcement Agencies.
SANTOSH KHADSARE 23
STRATEGIES : HRD
To promote and launch a comprehensive national awareness
program on security of cyber space.
To sustain security literacy awareness and publicity campaign
through electronic media.
To conduct, support and enable cyber security workshops /
seminars and certifications.
SANTOSH KHADSARE 24
STRATEGIES : CREATING CYBER
SECURITY AWARENESS
To facilitate collaboration and cooperation among stakeholder
entities.
To create models of collaborations and engagement with all
relevant stakeholders.
To create a think tank for cyber security inputs, discussion and
deliberations.
SANTOSH KHADSARE 25
STRATEGIES : DEVP EFFECTIVE
PUBLIC PVT PARTNERSHIPS
INFO SHARING AND COOPERATION (among security agencies,
CERTs, defence agencies, Law enforcement agencies and judicail
systems).
PRIORTIZED APPROACH FOR IMPLEMENTATION.
SANTOSH KHADSARE 26
OTHER STRATEGIES
THANK YOU
SANTOSH KHADSARE 27

Contenu connexe

Tendances

Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 

Tendances (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 

Similaire à INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)

Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxfalknoor56
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemWilliam Roberts
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014vikawotar
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 

Similaire à INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013) (20)

Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 

Plus de Santosh Khadsare (20)

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Smart card
Smart cardSmart card
Smart card
 
Guassvirus
GuassvirusGuassvirus
Guassvirus
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Webmail
WebmailWebmail
Webmail
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Web server
Web serverWeb server
Web server
 
Samba server
Samba serverSamba server
Samba server
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
 
New internet
New internetNew internet
New internet
 

Dernier

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Dernier (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)

  • 1. NATIONAL CYBER SECURITY POLICY - 2013 SANTOSH KAHDASRE
  • 3. Complex environment of integrations between people, software and services Common pool used by citizens, businesses , critical information infrastructure ,military and groups Vulnerable to a wide range of incidents, whether intentional or accidental, manmade or natural, and the info can be exploited by both nation states and non state actors SANTOSH KHADSARE 3 CYBERSPACE IS…..
  • 4. Caters to the whole spectrum of ICT users and providers and is an evolving process IT SERVES AS AN UMBRELLA FRAMEWORK FOR DEFINING AND GUIDING THE ACTIONS RELATED TO SECURITY OF CYBER SPACE It also enables the individual sectors and org in designing appropriate cyber security polices to suit their needs SANTOSH KHADSARE 4 CYBER SECURITY POLICY
  • 5. TO BUILD A SECURE AND RESILIENT CYBERSPACE FOR CITIZENS, BUSINESSES AND GOVERNMENT SANTOSH KHADSARE 5 VISION
  • 7. SANTOSH KHADSARE 7 OBJECTIVES Create a secure cyber ecosystem Create an assurance framework Strengthen the regulatory framework Enhance and create national and sectorial level 24x7 mechanisms for info gathering Enhance protection and resilience of CII by operating 24x7 NCIIPC Develop indigenous security technologies
  • 8. SANTOSH KHADSARE 8 OBJECTIVES Est infrastructure for testing & validation of security of such products Create workforce of 500,000 professionals in next five years Fiscal benefits to businesses for adoption of std security practices and processes Enable effective prevention , investigation and prosecution of cyber crime Create culture of cyber security Develop public pvt partnerships and enhance global cooperation
  • 9. Designate a national nodal agency to coordinate matters(cyber security) with clearly defined roles and responsibilities designate CISO in every org who will be responsible for cyber security efforts and initiatives Org to devp info security policies and implement them as per international best practices Org to earmark a specific budget for cyber security SANTOSH KHADSARE 9 STRATEGIES : CREATING A SECURE CYBER ECO SYSTEM
  • 10. Provide fiscal schemes and initiatives to encourage entities to install and upgrade info infrastructure fro cyber security Prevent occurrence and recurrence of cyber incidents (proactive actions) Est mechanism for sharing info Procurement of trustworthy indigenously manufactured ICT products SANTOSH KHADSARE 10 STRATEGIES : CREATING A SECURE CYBER ECO SYSTEM
  • 11. Promote adoption of global best practices in info security and compliance. Create infrastructure for conformity assessment and certification of compliance to cyber security best practices, std and guidelines (e.g ISO 27001 ISMS certification). Enable implementation of global security best practices for risk management. Identify and classify info infrastructure facilities and assets. SANTOSH KHADSARE 11 STRATEGIES : CREATING A ASSURANCE FRAMEWORK
  • 12. Encourage secure appln/software devp processes. Create conformity assessment framework for periodic verification of compliance to best practices, std and guidelines on cyber security. Encourage all entities tom periodically test and evaluate the adequacy and effectiveness of tech and op security measures implemented in IT sys and networks . SANTOSH KHADSARE 12 STRATEGIES : CREATING A ASSURANCE FRAMEWORK
  • 13. Encourage use of open standards to facilitate interoperability and data exchange among different products and services. Promote a consortium of Govt and private sector to enhance availability of tested and certified IT products on open standards. SANTOSH KHADSARE 13 STRATEGIES : ENCOURAGING OPEN STANDARDS
  • 14. Devp dynamic and legal framework and its periodic review to address Cyber security challenges. To mandate periodic audit and evaluation. To enable, educate and facilitate awareness of the regulatory framework. SANTOSH KHADSARE 14 STRATEGIES : STRENGTHENING THE REGULATORY FRAMEWORK
  • 15. To create National lvl sys , processes, structures and mechanisms to generate situational scenario of existing and potential threats and enable timely info sharing for proactive, preventive and protective actions. To operate 24x7 CERT-in to function as a Nodal Agency for coordination of all efforts for cyber security emergency response and crisis mgt (Umbrella org). SANTOSH KHADSARE 15 STRATEGIES : CREATING MECHANISMS FOR EARLY WARNING , VULNERABILITY MGT & RESPONSE
  • 16. Operationalise 24x7 sectorial CERTs. Implement Crisis Mgt plan for dealing with incidents impacting critical national processes or endangering public safety and security of the nation. To conduct and facilitate regular cyber security drills and exercises at National, sectorial and entity levels. SANTOSH KHADSARE 16 STRATEGIES : CREATING MECHANISMS FOR EARLY WARNING , VULNERABILITY MGT & RESPONSE
  • 17. To mandate implementation of global security best practices, business continuity mgt and cyber crisis mgt plan for all e- Governance initiatives . To encourage wider usage of PKI within Govt. for trusted communication and transactions. To engage info security professionals / org to assist . SANTOSH KHADSARE 17 STRATEGIES : SECURING E- GOVERNANCE SERVICES
  • 18. To devp plan for protection of CII. To operate 24x7 National Critical Information Infrastructure Protection Centre(NCIIPC) to function as Nodal agency for CII protection. To facilitate identification, prioritisation, assessment, remediation and protection of CII and key recourses. To encourage and mandate as appropriate, the use of validated and certified IT products. SANTOSH KHADSARE 18 STRATEGIES : PROTECTION AND RESILIENCE OF CRITICAL INFO INFRASTRUCTURE
  • 19. To mandate security audit of CII on periodic basis. To mandate certification of all security roles right from CISO /CSO to those involved in operation of CII. To mandate secure appl /software devp process. SANTOSH KHADSARE 19 STRATEGIES : PROTECTION AND RESILIENCE OF CRITICAL INFO INFRASTRUCTURE
  • 20. To undertake R&D programs aimed at short term, medium term and long term goals. To encourage R&D to produce cost effective, tailor-made and indigenous security solutions . To facilitate transition, diffusion. And commercialisation of outputs of R&D into commercial products and services for use in public and private sectors. SANTOSH KHADSARE 20 STRATEGIES : PROMOTION OF R&D IN CYBER SECURITY
  • 21. To set up Centre of Excellence in areas of strategic importance for the point of security of cyber space . To collaborate in joint R&D projects with industry and academia in frontline technologies and solution oriented research. SANTOSH KHADSARE 21 STRATEGIES : PROMOTION OF R&D IN CYBER SECURITY
  • 22. To create and maintain testing infrastructure and facilities of IT security product evaluation and compliance verification. To build trust relationships with product / system vendors and service providers for improving end-to-end supply chain security visibility. To create awareness of the threats, vulnerabilities and consequences of breach of security related to IT procurement. SANTOSH KHADSARE 22 STRATEGIES : REDUCIN SUPPLY CHAIN RISKS
  • 23. To foster education and trg programs both in formal and informal sectors to support the nation’s cyber security needs and build capacity. To est cyber security trg infrastructure across the country by way of public private partnership arrangements. To est cyber security concept labs for awareness and skill devp in key areas. To est institutional mechanisms for capacity building for Law Enforcement Agencies. SANTOSH KHADSARE 23 STRATEGIES : HRD
  • 24. To promote and launch a comprehensive national awareness program on security of cyber space. To sustain security literacy awareness and publicity campaign through electronic media. To conduct, support and enable cyber security workshops / seminars and certifications. SANTOSH KHADSARE 24 STRATEGIES : CREATING CYBER SECURITY AWARENESS
  • 25. To facilitate collaboration and cooperation among stakeholder entities. To create models of collaborations and engagement with all relevant stakeholders. To create a think tank for cyber security inputs, discussion and deliberations. SANTOSH KHADSARE 25 STRATEGIES : DEVP EFFECTIVE PUBLIC PVT PARTNERSHIPS
  • 26. INFO SHARING AND COOPERATION (among security agencies, CERTs, defence agencies, Law enforcement agencies and judicail systems). PRIORTIZED APPROACH FOR IMPLEMENTATION. SANTOSH KHADSARE 26 OTHER STRATEGIES