Open Access Open Access  Restricted Access Subscription or Fee Access

Enforcing Digital Security Framework in Indian Economy: The National Cyber Security Policy of India 2013

Dev Agrawal

Abstract


Rapid technological advancements and growing reliance on the internet have produced an environment of uncertainty and vulnerability, making it impossible for any government to manage the pervasive cyberspace phenomena. Every government must now confront this challenge with reasonably extensive and aggressive security programmes. Almost every government has released a National Cyber Security Strategy (NCSS) aimed at bolstering cyber defences, establishing a cyber deterrent posture, and developing cyber capabilities. In the context of cyberspace, deterrence, international engagement, incident response, resiliency, and recovery are all included in the broad category of activities and policies referred to as "cyber security strategy/policy." This category also includes all computer network operations, information assurance, law enforcement, diplomatic, military, and intelligence missions. The National Cyber Security Strategy (NCSS) is the nation's readiness strategy for providing coordinated actions and strategic measures aimed at securing and protecting the country's online presence, protecting vital information infrastructure, and establishing and fostering a trusted online community. In Basic sense, a cyber security policy or strategy should prioritise protecting cyberspace, protecting e-government services, more effectively combating cybercrime, updating the law, fostering international cooperation and communication, raising awareness, and ensuring that specialised education is available to combat the growing threat of cyber intrusions.


Full Text:

PDF

References


Dalei P, Brahme T. Cyber Crime and Cyber Law in India: An Analysis. International Journal of Humanities and Applied Sciences (IJHAS) Vol. 2014;2.

Rohas N. Introduction to Indian Cyber Law [Online]. Available from https://dict.mizoram.gov.in/uploads/attachments/cybercrime/intro indiancyberlaw.pdf.

Trilokekar NP. A practical guide to information technology act, 2000: Indian cyber law.

Dhupdale VY. Cyber Crimes in India and the Challenges Ahead. Indian JL & Just.. 2010;1:102.

Bunn ME. Can deterrence be tailored? Strategic Forum, Number 225, January 2007. National Defense Univ Washington DC Inst for National Strategic Studies; 2007 Jan 1.

IAS Parliament. Draft Defence Production Policy (2018) [Online]. Available from https://ddpmod.gov.in/sites/defaultlfiles/Draft.

Follath E, Stark H. How Israel Destroyed Syria’s Al Kibar Nuclear Reactor. Spiegel Online. 2009 Feb;11:22-6.

Kampani G. Is the Indian Nuclear Tiger Changing Its Stripes? Data, Interpretation, and Fact. The nonproliferation review. 2014 Oct 2;21(3 4):383-98.

Singh S. Military using 13 satellites to keep eyes on foes. The Times of India. 2017 Jun 26;26.

Sanger DE, Pelroth N. Chinese Hackers Resume Attacks on US Target. New York Times. 2013 May 19.

Healey J. A Brief History of US Cyber Conflict. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. 1986:29-30.

12DOCSLIB.ORG. Shaker & Bumiller, supra note 18.Military Law Review[Online].Available from https://docslib.org/doc/7763037/military-law-review-volume-219-2014-volume-219-spring2014

Broad WJ, Sanger DE. Worm was perfect for sabotaging centrifuges. New York Times. 2010 Nov 18;18.

Shanker T, Bumiller E. After Suffering Damaging Attack, The Pentagon Takes Defensive Action. New York Times. 2011 Jul;15:A6.




DOI: https://doi.org/10.37591/ijowns.v8i1.806

Refbacks

  • There are currently no refbacks.