tag:blogger.com,1999:blog-87991381884363816602024-03-14T01:31:06.137-07:00Cyber Security Issues In IndiaPTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.comBlogger108125tag:blogger.com,1999:blog-8799138188436381660.post-15437593591490524042017-06-01T19:00:00.001-07:002017-06-01T19:04:38.073-07:00The Current And Present Dangers Of Aadhaar Hacking
Cyber
security is a complicated field to manage and even the most ardent
players of cyber security are aware that absolute cyber security is a
myth. So if anybody is claiming that his/her system, software or
project is 100% cyber secure, he/she is simply ignorant of the ground
realities as exist in the cyberspace.
Till
sometime back, cyber warfare was considered as a fiction and not
realityPTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-71165313486638208942016-07-08T23:17:00.002-07:002016-07-08T23:39:24.819-07:00Center Of Excellence (CoE) For Internet Of Things (IoT) In India
Internet
of things (IoT) is the new buzz word these days. Everybody is talking
about IoT because it has great business, commercial and personal use
potential. IoT combines software, hardware and a communication
infrastructure so that systems/devices can contact and communicate
with each other in a non intrusive and automatic manner.
Like
any other technology, IoT has its own used and PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-80005094638832624142016-05-19T04:24:00.003-07:002016-06-05T22:51:54.127-07:00Mobile Cyber Security In India Is Needed Under Digital India
Mobiles are believed to
play a major role in the successful implementation of the Digital
India project of Indian government. From mobile commerce
to mobile banking, the Indian government is betting big upon mobiles
and their use for public delivery of services through electronic
means. Of course, this big scale use of mobiles will also give rise
to cyber
law and cyber
security issues that PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-53900235687026135852016-05-14T23:24:00.003-07:002016-06-05T22:53:11.028-07:00Healthcare Cyber Security Issues For Businesses And Entrepreneurs In India
Healthcare industry is
facing diverse range of cyber attacks these days. The prominent among
them is ransomware that encrypts the sensitive healthcare information
and decrypts the same only once the ransom is paid.
So much is the nuisance
these days that the National Institute of Standards and Technology
(NIST) has released a guide for IT developers on integrating security
measures into PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-34537106148583948652016-05-11T00:43:00.000-07:002016-06-05T22:54:45.053-07:00DARPA Is Soliciting Innovative Research Proposals In The Area Of Cyber Attribution
Cyber attacks have become
a global nuisance these days. Due to the global nature of Internet
and cyberspace, it is very difficult to ascertain the source of such
cyber attacks in many cases. Further, different countries have
different laws that make it really difficult to prosecute and
extradite the cyber criminal. In short, conflict
of laws in cyberspace is a major hurdle before the
PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-89260160584579350522016-05-01T00:22:00.000-07:002016-06-05T22:57:25.518-07:00Malware Are Big Nuisance For Business Houses And Individuals World Over
Business houses and
individuals are facing sophisticated malware attacks around the
world. This is true about not only big business companies but even
small and medium business houses. Cyber criminals are also targeting
individuals for sensitive personal and financial information.
Ransomware attacks are increasing and they are targeting stakeholders
ranging from big hospitals, banks and PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-89384248197115621882016-04-27T08:22:00.000-07:002016-06-05T22:58:31.969-07:00With Projects Like Digital India And Aadhaar Cyber Security Laws In India Are Urgently Needed
India has generously
adopted technology driven projects like Digital India, Aadhaar, etc.
Technology can enable proper and timely management of issues
pertaining to these projects. However, technology would also give
rise to cyber security, cyber law and other techno legal issues in
India.
For instance, smart
cities have unique and techno legal cyber
security and civil
liberties issues PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-24215963887880419922016-04-26T10:01:00.000-07:002016-06-05T23:02:31.436-07:00Cyber Security Obligations Of Directors Of Indian Companies Under Indian Companies Act, 2013 Are Ignored By Them
Cyber security is no more
a problem of technology people of an organisation. Now the top
management is equally concerned and responsible for various cyber law
and cyber security related issues. Recently the Reserve Bank of India
(RBI) declared that it would constitute an IT
subsidiary for managing cyber security issues of banks in
India. Even the Indian government has appointed Dr.
Gulshan RaiPTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-1355481328442662722016-04-13T10:31:00.001-07:002016-04-13T10:31:29.873-07:00Honeypot Launched Offensive Cyber Attack Upon Crackers And Cyber Miscreants
Offensive
and defensive cyber security capabilities are in much demand these
days. While defensive cyber security capabilities can keep the
cracker at bay to great extent yet offensive cyber security strikes
can eliminate the possibilities of continuous cyber attacks by such
crackers to a greater extent.
If we adopt defensive cyber security capabilities
alone, that would not serve the PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-84567290428590517382016-04-13T10:25:00.001-07:002016-04-13T10:25:23.200-07:00Dynamic DNS, Fast Flux, Bullet Proof Servers And Botnet: A Paradise For Cyber Criminals
A
domain name server (DNS) helps the users to reach a particular
website hosted on a particular server. With the advance in
technology, the DNS service has been upgraded to dynamic DNS service.
The dynamic DNS service helps a domain name to point to Internet
resources hosted on changing public IP addresses. However, dynamic
DNS service has both advantages and disadvantages just like all PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-34540672421293286002016-04-04T18:33:00.001-07:002016-04-04T18:33:58.145-07:00Malware Nuisance Would Increase In 2016
Cyber security is a complicated field that requires updated
information to manage cyber threats. There are many forms of cyber
threats that cyber security professionals are required to tackle.
These include malware, virus, social engineering attacks, etc.
Cyber criminals have vast resources these days. Some of them are even
supported by state actors and this allows them to make PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-4576749204921454072015-12-16T21:06:00.002-08:002015-12-16T21:06:45.660-08:00Indian Cyber Security Developments In 2015
Perry4Law
Organisation (P4LO)
has been providing cyber security trends and developments in India
for many years. This year as well, we have discussed both cyber
security trends in India 2015
and cyber security developments in India. We have provided a
research report on cyber security related events in the year 2015.
The report is titled Cyber
Security Developments in India 2015
and it Praveen Dalalhttp://www.blogger.com/profile/07794748785095631475noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-54988745284605050762015-12-08T08:23:00.000-08:002015-12-08T08:23:34.072-08:00Electronic System Design And Manufacturing (ESDM) Policy And Regulations In India 2014
Electronic System Design and Manufacturing in India is the upcoming
field for telecom and electronics companies’ world over. The Department
of Electronics and Information Technology (DeitY), India has formulated
many pro active and reformative policies and strategies in this regard.
The laws, rules and regulations in India are also reformulated to
accommodate the growing demands of PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-5197718385883595332015-12-08T08:06:00.003-08:002015-12-08T08:06:50.596-08:00Telecom Commission Cellular Loop’s Proposal Would Strengthen Mobile Based Surveillance On National Security Grounds
Recently the National Cyber Security Policy of India 2013 (NCSP 2013) (PDF) was released by Department of Electronics and Information Technology (DeitY). However the same was not made part and parcel of the National Security Policy of India. Further, the cyber security policy of India itself was insufficient and weak on many counts including lack of privacy safeguards. The cyber security PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-65768096522815523762015-12-08T08:02:00.000-08:002015-12-08T08:02:24.821-08:00National Security Council Secretariat (NSCS) Wants Reliance Jio Infocomm To Share Potential Cyber Security Threats On India’s Telecom Networks
Governments around the world are stressing upon stringent cyber
security breach disclosures norms but telecom companies are opposing the
same on cost and other burdensome regulatory reasons. Nevertheless the
governments across the globe are working in the direction of forcing the
telecom companies to disclose the cyber security breaches.
There is no universally acceptable internationalPTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-90803239342143962352015-12-08T07:56:00.000-08:002015-12-08T07:56:22.888-08:00DOT India Asks ISPs To Adopt New Cyber Security Measures Including Securing Home ADSL And Broadband
Router and modems insecurity is a major cause of concern for
governments around the world. Cyber criminals are targeting routers and
modems used by home users’ for a broadband connection. In most of the
case the routers and modems come with standard login and password
credential for practical reasons and convenience. The manufacturers of
routers and modems expect the end user to change PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-25047810084864390302015-12-08T07:41:00.001-08:002015-12-08T07:41:20.278-08:00Encryption Laws In India
Encryption has become an indispensable technology these days. Whether
it is online banking, e-commerce or e-governance services, encryption
is commonly used in all these services. Encryption ensures authenticity
and legality to various transactions provided the same is done within
permissible limits and in accordance with the applicable laws of India.
Unfortunately, we have no PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-90588541826116703502015-12-07T05:05:00.000-08:002015-12-07T17:28:00.424-08:00Cyber Security Problems And Challenges in India: Report By Perry4Law Organisation (P4LO)
Cyber security is a
techno legal field that requires patience and techno legal expertise
to practice. India has been a late entrant in the cyber security
field and a robust and resilient cyber
security infrastructure in India is still missing. We have
a national
cyber security policy of India (NCSP) 2013 but the same
has remained on paper only so far. An analysis
of the existing cyber securityPTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-11718954046540284272015-11-27T23:11:00.003-08:002015-11-27T23:11:53.703-08:00Indian Govt To Launch Internet Safety Campaign Soon
Internet safety is a serious requirement these days
when everything has been connected to Internet. Form education to
healthcare, everything depends upon information and communication
technology (ICT). It is natural to seek measures to protect various
infrastructures and digital assets that are connected with Internet
or cyberspace.
Indian government has announced that an Internet
safety PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-10980090509019082742015-11-21T08:05:00.002-08:002015-11-21T08:05:18.331-08:00Lenovo Accused Of Pre Installing Adware In Laptops Compromising Their Security
Spyware and malicious software has become a big
nuisance for companies and individuals alike. While these companies
and individuals can ensure cyber security as per their best judgment
yet they have little control over pre installed malware and malicious
software or codes in hard disks and operating systems.
Recently Kaspersky revealed that hardware based
stealth spyware were used
by. PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-19293164802011701462015-11-21T07:33:00.002-08:002015-11-21T07:33:34.806-08:00Telecom Security Policy Of India 2014 And Unconstitutional E-Surveillance Issues
India literally borrows a majority of Security and
Intelligence related ideas from United States (U.S.). This creates
many unique problems for India. Firstly, these projects and ideas are
meant for western countries and they are not at all suitable for a
country like India. Secondly, if something goes wrong with the U.S.
model, the “Infirmity and Irregularity” automatically creeps into
PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-40142831764650580802015-11-21T06:17:00.005-08:002015-11-21T06:17:43.526-08:00Kaspersky Reveals Hardware Based Stealth Spyware Used By Intelligence Agencies
Cyber espionage is not a new game but it has become
more apparent and visible these days. World over intelligence
agencies have been using various techniques and methods to infiltrate
and track users of their interest. These methods include hardware and
software based spyware. The National Security Agency (NSA) of United
States has even used radio
waves to do e-surveillance.
As per the PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-48802755856398048842015-11-21T06:14:00.004-08:002015-11-21T06:14:43.856-08:00Carbanak Steals About A Billion US Dollars From Financial Institutions Worldwide
The legendary bank robber Willie Sutton was once
asked why he robbed the banks to which he replied “because that is
where the money is”. Although this famous answer was disputed by
the Willie subsequently yet it has become Sutton’s
law that is relied upon by many people and institutions while
giving examples and explaining various principles. This is so because
the legendary answer may be ofPTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-42516578345258197722015-11-21T05:57:00.003-08:002015-11-21T05:57:56.863-08:00Indian Govt Enforces Ban On Private E-Mails For Official Communications
E-mails are important mode of communications these
days. With the increasing webspace most of us also store crucial
data, information and documents in our e-mail accounts. Obviously the
access to these information and documents is available to the e-mail
service providers and the law enforcement agencies of the countries
where such e-mail service providers are located. This access can be
PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0tag:blogger.com,1999:blog-8799138188436381660.post-59201964163175188682015-11-21T05:52:00.003-08:002015-11-21T05:52:39.150-08:00SC Has Killed Cyber Law Due Diligence In India To A Great Extent
Cyber
law due diligence in India (PDF) for Internet Intermediaries is
incorporated in the Information Technology Act 2000 (IT Act 2000).
Section 79 read with Information
Technology (Intermediaries Guidelines) Rules, 2011 (PDF) deals
with cyber law due diligence obligations of Internet Intermediaries
of India.
There has been lots of confusion and protests
against the Internet Intermediary PTLBhttp://www.blogger.com/profile/07463319654826479533noreply@blogger.com0