Skip to main content

Smart Cities Cyber Security In India: The Problems And Solutions

Smart cities are the future of urbanisation and population sustainability. The aim of smart cities is to provide a conductive environment for living, commercial activities, healthcare and overall development. Smart cities also predominantly rely upon use of information and communication technologies (ICT) to render public services. Wherever applicable, Internet of Things (IoT) (PDF), cloud computing and virtualisation and machine to machine (M2M) system usage is also there. However, this omnipresent usage of ICT, IoT, M2M, cloud computing, etc has a potential drawback as well in the form of indifference towards smart cities cyber security.

It is not difficult to visualise a scenario of cyber attacks against the critical infrastructures of the smart cities that are run by ICT and technology. Such a cyber attack can cripple the entire smart city if properly executed. Critical infrastructure protection in India (PDF) is still at nascent stage. The national cyber security policy of India 2013 is also very weak and even that has not been implemented by Indian government so far. The much awaited cyber security policy of India 2015 is also missing so far.

A strong cyber security infrastructure of India is need of the hour especially when there is no well settled international legal issues of cyber attacks that can be invoked in the case of a cyber incidence. It is very important that international legal issues of cyber attacks must be resolved by various government and non government stakeholders. There is no globally acceptable cyber law treaty and cyber security treaty (PDF) that can govern the relationships between various countries.  Even the Tallinn Manual on the International Law Applicable to Cyber Warfare  (PDF) is just an academic document with no legal binding obligations. The truth is that Tallinn Manual is not applicable to international cyber warfare attacks and defence and countries are free to take measures as per their own choices.

This has necessitated that cyber security related projects in India must be not only expedited but they must also be successfully implemented as soon as possible. Unfortunately, cyber projects like National Cyber Coordination Centre (NCCC) of IndiaNational Critical Information Infrastructure Protection Centre (NCIPC) of IndiaGrid Security Expert System (GSES) of IndiaNational Counter Terrorism Centre (NCTC) of IndiaCyber Attacks Crisis Management Plan of IndiaCrisis Management Plan Of India For Cyber Attacks And Cyber Terrorism, Cyber Command For Armed Forces Of IndiaTri Service Cyber Command for Armed Forces of IndiaCentral Monitoring System (CMS) Project of IndiaNational Intelligence Grid (Natgrid) Project of IndiaInternet Spy System Network And Traffic Analysis System (NETRA) of IndiaCrime and Criminal Tracking Network and Systems (CCTNS) Project of India, etc have still not been implemented successfully by Indian government.

This raises the pertinent question as to how Indian government would ensure cyber security of smart cities in India. We at Centre of Excellence for Cyber Security Research and Development in India (CECSRDI) believe that Modi government must take cyber security seriously. The cyber security challenges in India would increase further and India must be cyber prepared to protect its cyberspace. CECSRDI believes that the starting point is to draft the cyber security policy of India 2015 as the 2013 policy is highly defective and of little significance. We also believe that a dedicated cyber security law of India is need of the hour. The same must be a techno legal framework keeping in mind contemporary cyber security threats. Further cyber security disclosure norms in India must be formulated by Modi government. The cyber security awareness in India must be further improved so that various stakeholders can contribute significantly to the growth and implementation of cyber security initiatives of Indian government.


Comments

Popular posts from this blog

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...

SAY NO TO SHYNESS !!!

13 Confident Ways to Overcome Your Shyness Those who have never suffered from shyness have no idea how debilitating it can be, especially for someone in a professional situation. If shyness is holding you back, learn how to get past it and become more confident. Shyness can truly hold people back --partly because those who are shy tend to avoid public situations and speaking up, and partly because they experience so much chronic anxiety. ⁣⁣ If that's you, take comfort in knowing you are far from alone--four out of 10 people consider themselves shy. But here's the good news: Shyness can be overcome. With time and effort and a desire to change, it's possible to break through. If your shyness is severe, you may need help from a therapist or counselor, but most people can overcome it on their own. Take your first steps in getting past shyness with these 13 techniques to help you become a more confident you. 1. Don't tell. There's no need to advertise your shyness. T...

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...