The internet is an ever-expanding medium of communication. One is always frightful about their data on the internet, given its vast atmosphere. The data uploaded onto the internet can easily be misdirected by cunning individuals. A potential cyber attack could result in the leaking of a nation’s confidential data out into the open. A strong security system is needed to protect the data.

The internet has several layers in its system. Each layer performs a different duty. Each layer adds a separate entity to make sure that the data is not lost while it travels from the sender to the receiver. Interesting thing to note here is, that the packets (data is divided into tinier data-elements known as ‘packets’) can be easily lost or reach an unknown destination. Since every packet has a destination address, the receiver can identify if the packet belongs to the receiver, if not, it discards the packet.

The increasing reliance of our information age economies and governments on cyber (computer-based) infrastructure makes them progressively more vulnerable to cyber attacks on our computer systems, networks and data. In their most disruptive form, cyber attacks target the enterprise, government, military, or other infrastructural assets of a nation or its citizens. Both the volume and sophistication of cyber threats (cyber warfare, cyber terrorism, cyber espionage and malicious hacking) are monotonically increasing, and pose potent threats to our enterprise, government, military, or other infrastructural assets. Knowing that to be forewarned is to be forearmed, we are well advised to effect strong cyber security defenses that will thwart rapidly evolving cyber threats.

Recent newsworthy cyber attacks on critical cyber infrastructure (e.g., Target data breach, Mt. Gox bitcoin hacker attacks, NSA data leaks and subsequent PRISM revelations) demonstrate the urgent need for improved cyber security. As cyber threats grow, so must our abilities to neutralize them. Towards that end, the U.S. government issued an Executive Order for Improving Critical Infrastructure cyber security in February 2013, and the 2014 President’s Budget devotes over $13B to cyber-related programs and activities. The European Union Agency for Network and Information Security (ENISA) lists all known public documents of National Cyber Security Strategies in the EU as well as the rest of the world.

National Cyber Security Policy 2013

Well we saw how the internet works. Now we need to see the various ways in which the Government of India provides us with the security we need to access the internet. Before the year 2013, there was no cyber security policy in India. The documents that were leaked by NSA whistle-blower Edward Snowden, has alleged that much of the NSA surveillance was focused on India’s domestic politics and its strategic and commercial interests. This lead to a distress amongst the people of India. Under immense pressure, the government unveiled The National Cyber Security Policy on 2 July 2013.

The act aims to build a secure and resilient cyberspace for citizens, business and government and also to protect anyone from intervening into your privacy. The information and the information infrastructure in cyberspace are protected by the act. The act also aims at building capabilities to prevent and respond to cyber threats and reduce vulnerabilities, minimizing the damage from cyber incidents through a combination of institutional structures, people, processes, technology and cooperation.

National Cyber Safety and Security Standards have done an extensive research in the Cyber domain to understand the nature of cyber threats and Cyber Crimes. We have understood that the multi-faceted cyber technology cannot be handled by common standards and security policies. Thus, a common platform will facilitate the experts to provide an effective solution for the complex and alarming problems in the society towards cyber security domain. National Cyber Safety and Security Standards is developing innovative strategies and compliance procedures to curb the increasing complexity of the Global Cyber Threats.

Previous articleKey Skills for Starting Up
Next articleA Quick WordPress Tutorial
An industrious person. Born in "The City of Nawabs" and brought up in "The Lap of Himalayas" .Majoring in Chemical Engineering from Chennai. He ponders over to know about the power dwelling in humans to understand the meaning of their existence. Want to access in the depth of the creative ability of human, what human minds desire to experience. Keen in knowing the virtue of life. He does talk about his ENGINEERING and accomplishments, but he tailors it in such a manner that the reader/listener can relate to himself.


Please enter your comment!
Please enter your name here