Professional Documents
Culture Documents
Review Article
Accepted 20 April 2016, Available online 24 April 2016, Vol.6, No.2 (April 2016)
Abstract
Security, safety and privacy are of paramount importance to anyone who likes to crawl on the web. Keeping the best
interest of the internet users in mind, India has laid down very solid foundations to safeguard its people from
cyberattacks and cyber terrorism. Many cyber laws like National Cybersecurity Policy and Information Technology
Act have been very effective in keeping unwanted invaders at bay. Even though India has solid policies against
cybercrimes, the main challenge it faces is that general awareness is non-existent. Moreover, the policies laid down
take too much time to implement rules and regulations for the betterment of the people. This research paper
recommends some excellent points like- Proper blend in between the Western and Eastern technology, as well as
efficient utilization of the resource pool to enable India fight against cyberattacks better. .
Keywords: Cybersecurity, Cybercrime, Cyberattack, Cyber law, Privacy, Security, Hacking, Computer, Internet
E-mail Spoofing is sending an e-mail to someone with Confidentiality: As per Cyber security in India's
a fake e-mail id. This fake e-mail looks like original, counter terrorism strategy by Raghav Unauthorized
since list of e-mail in inbox shows only name not e-mail use or disclosure of confidential information like some
ids. critical details of business, etc. (Section 72-
Imprisonment of up to 2 years or fine of upto Rs. 1
Defamation is publishing or posting a wrong lakhs or both)
defamatory content about someone on websites or
social websites. (Section 67-Imprisonment of up to 5 Special techniques such as Social Engineering are
years or fine of up to Rs. 10 lakhs or both) commonly used to obtain confidential (Cyber security
in India's counter terrorism strategy by Raghav)
Identity Theft is a cybercrime in which a hacker information. Social Engineering is defined as to make
anyhow steals the username or password of a person. fool of people so that they will give up private and
For example, bank details, credit/debit card details, or confidential information for e.g. receive email of
other sensitive information. (Section 66C- winning prize, Phishing, etc.
645| International Journal of Current Engineering and Technology, Vol.6, No.2 (April 2016)
Onkar Singh et al A Review of Indian Approach towards Cybersecurity
4. Indian Computer Emergency Response Team Lack of a security culture: As per Internet World
(CERT-In) Stats Report, 2015 this is especially important in
the cyber security domain, where every individual
The Indian Computer Emergency Response Team, has the potential to be both a defender and a
under the Department of Information Technology of victim. India must therefore increase the priority it
Ministry of Communications and Information accords security issues in general.
Technology, works to enhance the security of India's
communications and information infrastructure 6. Recommendations
through proactive action and effective collaboration. It
is a nodal agency that deals with cyber security threats India should use its large pool of available
like hacking and phishing. It strengthens security- talent and capabilities. As per Angshuman and
related defence of the Indian Internet domain. Mondal Report 2015, Indias significant talent and
In December 2013, CERT reported there was a rise .capabilities in cyber security is one of its biggest
in the cyber-attacks on Government organisations like strengths. With a highly educated, technologically
banking and finance, oil and gas and emergency skilled workforce, the country possesses one of the
services. It issued a list of security guidelines to all largest talent pools in the world.
critical departments. An ideal blend of Western and Eastern
approaches. India has found an ideal blend of
Information Security Task Force (ISTF) Western and Eastern approaches to cyber security.
A per Srivastava and Ali 2015, the Western
Since cybercrimes in India are increasing with a very approach, led by the United States, looks at cyber
fast pace, to combat the situation Government of India security through a national security prism. The
had set up an Inter Departmental Information Security Eastern approach, driven by China and Russia,
Task Force (ISTF) with National Security Council (NSA) emphasizes social [22] cohesion.
as the nodal agency (as per the report of Cyber Law
Awareness programs: India must run sufficient
and Information Technology by Talwant Singh, 2015) .
awareness programs, so that most of its citizens
The Task Force studied and deliberated on the issues
know about the cybercrimes and their prevention
such as
methods.
National Information Security Threat Perceptions Increase punishment and Penalties: India must
Critical Minimum Infrastructure to be protected make their penalties and punishment for
Ways and means of ensuring Information Security cybercrimes as well as other crimes as hard as
including identification of relevant technologies possible.
Legal procedures required to ensure Information Cooperation: Indian government should work
Security cooperatively with industry and civil society
Awareness, Training and Research in Information groups to strengthen its legal framework for
Security cybersecurity.
5. Challenges of Cybersecurity Policies of India References
Lack of awareness: India desperately need Angshuman A. and Mondal Kunal (2015) A survey of Indian
awareness of cybercrimes and the prevention Cybercrime and law and its prevention approach
approaches among their citizens, as India has very International Journal of Advanced Computer Technology
large number of internet users in the world. (IJACT), VOLUME 1, NUMBER 2, pp-48-55,
Lack of a comprehensive policy: IT Act of India is Baylon Caroline (2014) Challenges at the intersection of
not sufficient to cover all the cybercrimes on its Cybersecurity and space security, International Security:
own. Although National Cyber Security Policy 2013 Country and International institution perspective,
(Accessed on 1-12-2015).
(NCSP) has implemented but it has come under
Cyber laws in India, http://www.cyberlawsindia.net/
criticism. (Accessed on 4-12-2015).
Government Policies are slow in using India's Cyber Law and Information Technology, Talwant Singh, Addl.
Talent: India has a big pool of talent, but the Distt. & Sessions Judge, Delhi
government's policies are unable to exploit it. http://www.slideshare.net/talwant/cyber-law-
Lack of a holistic approach: India should involve information-technology (Accessed on 5-12-2015).
the experts from the Information and https://en.wikipedia.org/wiki/Demographics_of_India
Communication Technology field also rather than (Accessed on 1-12-2015)
http://www.internetworldstats.com(Accessed on 2-12-
information technology alone.
2015)
Insufficient private sector inputs: The policy http://ncrb.nic.in/ (Accessed on 1-12-2015)
formation process must include sufficient inputs http://www.cyberlawsindia.net/ (Accessed on 1-12-2015)
from private sector as well including start firms. https://en.wikipedia.org/wiki/Information_Technology_Act,_
Insufficient public input: The policy formation 2000 (Accessed on 2-12-2015)
process must include sufficient participation of https://en.wikipedia.org/wiki/National_Cyber_Security_Polic
civil society groups, RWA's, etc. y_2013 (Accessed on 2-12-2015)
647| International Journal of Current Engineering and Technology, Vol.6, No.2 (April 2016)
Onkar Singh et al A Review of Indian Approach towards Cybersecurity
http://cis-india.org/internet-governance/cyber-crime- Poonia Ajeet Singh (2014), Cyber Crime: Challenges and its
privacy (Accessed on 1-12-2015) Classification International Journal of Emerging Trends &
http://www.oxforddictionaries.com/definition/english/cybe Technology in Computer Science (IJETTCS), Volume 3,
rterrorism (Accessed on 2-12-2015) Issue 6, pp-119-121
https://prezi.com/pq7inkjnx6bq/cyber-bullyingappropriate- Raghav S S (2015), Cyber security in India's counter
use-of-media/ (Accessed on 2-12-2015) terrorism strategy
http://india.gov.in/official-website-national-informatics- http://worldwidejournals.com/paripex/file.php?val=Marc
centre (Accessed on 3-12-2015) h_2016_1458622776__05.pdf (Accessed on 2-12-2015).
Seema S Shinde (2013), Cyber Ethics and Laws-Pros and
https://en.wikipedia.org/wiki/Indian_Computer_Emergency
Cons: A study of IT Act 2000, IJACEN, Vol-1, Issue-13
_Response_Team (Accessed on 5-12-2015).
(Accessed on 16-6-2015).
KPMG cybercrime survey report Srivastav Abhishek, Ali Irman(2014), The Growing
2015,https://www.kpmg.com/IN/en/IssuesAndInsights/A Phenomenon & Challenges of Cybercrime in India,
rticlesPublications/Documents/Cyber-Crime-Survey- International Journal of Advanced Research in Computer
2015-30Nov15.pdf (Accessed on 3-12-2015). Science and Software Engineering, Volume 4, Issue 2, pp
Mittal Pradeep and Singh Amandeep(2013), A study of 315-318
cybercrimes and cyber laws in India, SRJIS, Vol-1, Issue-1 www.iibf.org.in/.../Cyber-Laws-chapter-in-Legal-Aspects-
(Accessed on 1-12-2015). Book.pdf (Accessed on 1-12-2015)
648| International Journal of Current Engineering and Technology, Vol.6, No.2 (April 2016)