Abstract
Security of cyber infrastructure and systems is becoming more important today than ever before due to extensive digitization of all aspects of our life. Protecting against cybercrime , cyber warfare, cyber fraud, and cyber theft are of utmost importance to individuals, societies, businesses, and governments at various levels. As cyber incidents proliferate, privacy of individuals, business methods, and processes including intellectual properties and government sovereignty are being threatened. The human is the greatest vulnerability in any organization. In this era of persistent cyber threats, an organization will be secure only with the active participation of everyone (NIST 2018). In this chapter, we will try to provide an overview of all aspects of cyber security at various levels including protection of individuals, businesses, and the states. Specifically, we will try to answer the following questions:
-
What are the different aspects of cyber security? How do cyber incidents affect individuals, businesses, and governments?
-
What precautionary measures should be taken at various levels to minimize harm due to cyber security incidents?
-
What are the extant laws and regulations that we have enacted to protect individuals and businesses, with specific references to India?
With the release of this National Cyber Strategy, the United States now has its first fully articulated cyber strategy in 15 years…The National Cyber Strategy demonstrates my commitment to strengthening America’s cyber security capabilities and securing America from cyber threats. It is a call to action for all Americans and our great companies to take the necessary steps to enhance our national cyber security. We will continue to lead the world in securing a prosperous cyber future.
—Donald Trump, President of the U.S.A.*
*White House of the United States (2018). National Cyber Strategy of the United States of America. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf accessed on 12 Oct 2018.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boeke, S. (2018). National cyber crisis management: Different European approaches. Governance, 31(3), 449–464. Available at: https://doi.org/10.1111/gove.12309. Accessed on February 5, 2010.
Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B. … Anderson, H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.
Council of Europe (CoE). (2001). European treaty series 185—Convention on Cyber Crime, Budapest. Available at: http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf. Accessed on February 12, 2019.
Hui, K. -L., Kim, S. H., Wang, Q. -H. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497–523. Research Collection School Of Information Systems. Available at: http://ink.library.smu.edu.sg/sis_research/3420. Accessed on February 12, 2018.
IBM. (2018). Cost of a data breach study: Global overview. Available at: https://www.ibm.com/security/data-breach. Accessed on October 15, 2018.
Indian Common Criteria Certification Scheme (IC3S). (2018). Available at: http://www.commoncriteria-india.gov.in/Pages/CCSOverview.aspx. Accessed on December 11, 2018.
Karnataka Jnana Ayoga (KJA), Government of Karnataka. (2019). Karnataka cyber security vision 2025.
Ministry of Electronics and Information Technology (MeitY), Government of India. (2008). The Information Technology Act (Amended 2008).
Ministry of Electronics and Information Technology (MeitY), Government of India. (2013). National cyber secruity policy 2013. Available at: https://meity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20%281%29.pdf. Accessed on 2 March 2, 2019.
Ministry of Electronics and Information Technology (MeitY), Government of India. (2018a). The information technology: Intermediaries guidelines (Amendment) Rules] 2018.
Ministry of Electronics and Information Technology (MeitY), Government of India. (2018b). Conference of State IT Ministers and IT Secretaries: Cyber Security and Cyber Law. The Information Technology: Intermediaries Guidelines (Amendment) Rules] 2018.
National Critical Information Infrastructure Protection Centre (NCIIPC). (2014). Guidelines for protection of national critical information infrastructure. Available at: http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf. Accessed on September 14, 2018.
National Critical Information Infrastructure Protection Centre (NCIIPC). (2017). NCIIPC: Standard operating procedures. Available at: http://nciipc.gov.in/documents/SOP-CII.pdf. Accessed on September 14, 2018.
National Association of Software and Services Companies (NASSCOM) Secto Skill Council (SSC). (2018). Cyber security skills. Available at: https://www.sscnasscom.com/ssc-projects/cyber-security-skills/. Accessed on October 15, 2018.
NASSCOM-DSCI. (2016). NASSCOM-DSCI growing cyber security industry roadmap for India.
NASSCOM-KPMG. (2018). Secure India 2018. Leader’s insights into GCC empowered Global Cyber Security.
National Information Assurance Partnership (NIAP). (2018). Available at: https://www.niap-ccevs.org/Ref/What_is_NIAP.CCEVS.cfm. Accessed on December 11, 2018.
National Institute of Standards and Technology (NIST). (2018). Cyber security is everyone’s job. Available at: https://www.nist.gov/sites/default/files/documents/2018/10/15/cybersecurity_is_everyones_job_v1.0.pdf. Accessed on June 9, 2019.
Tan. E. E. (2018). Cyber deterrence in Singapore: Framework & recommendations (RSIS Working Paper, No. 309). Singapore: Nanyang Technological University.
U.S. Computer Emergency Readiness Team (US-CERT). Available at: https://www.us-cert.gov/about-us. Accessed on February 11, 2019.
White House of the United States. (2018). National cyber strategy of the United States of America. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf. Accessed on October 12, 2018.
Woollaston, V. (2017, May 15). The NHS trusts and hospitals affected by the Wannacry cyberattack. WIRED. Retrieved from http://www.wired.co.uk/article/nhs-trusts-affected-by-cyber-attack. Accessed on February 10, 2019.
Zetter, K. (2016, March 3). Inside the cunning, unprecedented hack of Ukraine’s power grid. WIRED. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/. Accessed on February 10, 2019.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sridhar, V. (2019). Cyber Security: A Two-Edged Sword!. In: Emerging ICT Policies and Regulations. Springer, Singapore. https://doi.org/10.1007/978-981-32-9022-8_9
Download citation
DOI: https://doi.org/10.1007/978-981-32-9022-8_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9021-1
Online ISBN: 978-981-32-9022-8
eBook Packages: Economics and FinanceEconomics and Finance (R0)