Skip to main content

New Plan For Cyber Security

 By:- Josy Joseph, TNN

In the face of incessant attacks on its crucial networks, the government is finalizing an elaborate plan to upgrade India's cyber security capabilities. By stepping up protection levels, putting in place real time command- and- control centers and delineating responsibilities among various agencies, the government hopes to take on the onslaught of international cyber attacks on its critical infrastructure. 

Among the proposals are dedicated command- and- control centers to monitor critical infrastructure real time, and computer emergencies response teams for key sectors such as power and elaborate protocols for all involved.

Senior sources told TOI that the cabinet committee on security " should approve in a few weeks" the multilayer security plans to protect India's critical infrastructure. " the NSA (National Security Advisor) and the cabinet security are working on the final plan." sources said.

On top of this plan is a clear delineation of responsibilities between CERT - IN ( computer emergency response team- India), NTRO ( national technical research organization), intelligence Bureau, military intelligence and other agencies that have a role in fighting cyber intrusions. even where there are overlaps, protocol will be laid out. the proposed protocol will also cover department of telecom, department of information technology, national informatics center etc.

Under the proposal the government will also regularly and proactively monitor and scan critical networks. not just that, the levels of security for these networks will also be steeped up, sources said. among the key recommendations to be approved will be the creation of a National Critical Information Infrastructure Protection Center (NCIPC). it will be a sort of command- and- control center for monitoring a significant portion of India's critical infrastructure. NCIPC will be manned by technical experts, but will also have officials from various organizations for quick response to any intrusions. " it will provide real time response to any breach" a senior official said.

Sources said, CERT- IN was also creating its own real time monitoring center to measure up to the new demands for cyber security. the responsibility for monitoring critical infrastructure will be divided between NCIPC and CERT-IN, sources said.

The government will also set up dedicated CERT for critical sectors such as power, aviation, etc where no such national monitoring mechanism exists, sources said.

The entire move comes in the wake of a series of sensational cyber attacks on India's critical infrastructure, a specially targeted at key ministries and departments. what is more worrying is the targeted cyber attacks on computers and networks of agencies such as Indo-Tibetian border police, a sign that China was carrying out targeted attacks. however, sources said the attacks were not just limited to those from China. " there are instances where the end user is not clear, but definitely not China, sources said."

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p