85:
To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threat, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology, and cooperation.
25:(DeitY) It aims at protecting the public and private infrastructure from cyber attacks. The policy also intends to safeguard "information, such as personal information (of web users), financial and banking information and sovereign data". This was particularly relevant in the wake of
111:
To enhance and create
National and Sectoral level 24x7 mechanism for obtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution and crisis management through effective predictive, preventive, protective response and recovery
68:, has alleged that much of the NSA surveillance was focused on India's domestic politics and its strategic and commercial interests. This sparked a furore among people. Under pressure, the government unveiled a National Cyber Security Policy 2013 on 2 July 2013.
104:
To create an assurance framework for the design of security policies and promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment (Product, process, technology &
76:
To build a secure and resilient cyberspace for citizens, business, and government and also to protect anyone from intervening in user's privacy.It mentioned a five year target of training five lakh cyber security personnel by 2018.
241:
101:
To create a secure cyber ecosystem in the country, generate adequate trust and confidence in IT system and transactions in cyberspace and thereby enhance adoption of IT in all sectors of the economy.
126:
To enable
Protection of information while in process, handling, storage & transit so as to safeguard privacy of citizen's data and reducing economic losses due to cyber crime or data theft.
394:
94:
30:
166:
Human
Resource Development (fostering education and training programs both in formal and informal sectors to Support the Nation's cyber security needs and build capacity.
299:
129:
To enable effective prevention, investigation and prosecution of cybercrime and enhancement of law enforcement capabilities through appropriate legislative intervention.
37:
as a complex environment consisting of interactions between people, software services supported by worldwide distribution of information and communication technology.
251:
22:
116:-To improve visibility of integrity of ICT products and services by establishing infrastructure for testing & validation of security of such product.
29:(NSA) leaks that suggested the US government agencies are spying on Indian users, who have no legal or technical safeguards against it.
277:
359:
120:
To create workforce for 500,000 professionals skilled in next 5 years through capacity building skill development and training.
409:
192:
151:
Creating a mechanism for
Security Threats Early Warning, Vulnerability management, and response to security threats.
322:
384:
273:
175:
To develop bilateral and multilateral relationships in the area of cyber security with another country. (
26:
404:
399:
212:
205:
59:
123:
To provide fiscal benefit to businesses for adoption of standard security practices and processes.
389:
365:. Department of Information Technology, Ministry of Communications and Information Technology.
8:
246:
330:
369:
108:
To strengthen the
Regulatory Framework for ensuring a SECURE CYBERSPACE ECOSYSTEM.
65:
49:
378:
334:
62:
217:
Department Of
Electronics & Information Technology, Government Of India
34:
54:
157:
Protection and resilience of
Critical Information Infrastructure.
395:
95:
45:
31:
160:
Promotion of Research and Development in cyber security.
242:"Amid spying saga, India unveils cyber security policy"
40:
274:"National Cyber Security Policy 2013: An Assessment"
23:
Department of Electronics and Information Technology
300:"For a unified cyber and telecom security policy"
172:Developing effective Public-Private partnerships.
376:
278:Institute for Defence Studies and Analyses
182:a Prioritized approach for implementation.
320:
302:. The Economic Times. 24 September 2013
236:
234:
148:Strengthening The regulatory Framework.
377:
58:newspaper, citing documents leaked by
360:"National Cyber Security Policy 2013"
213:"National Cyber Security Policy-2013"
250:. INDIA. 3 July 2013. Archived from
231:
177:Information sharing and cooperation
13:
193:National Security Strategy (India)
169:Creating cyber security awareness.
41:Reason for Cyber Security policies
14:
421:
352:
142:Creating an assurance framework.
154:Securing E-Governance services.
314:
292:
266:
97:define objectives as follows:
19:National Cyber Security Policy
1:
198:
139:Creating a secured Ecosystem.
133:
52:policy before 2013. In 2013,
89:
7:
186:
163:Reducing supply chain risks
145:Encouraging Open Standards.
27:US National Security Agency
10:
426:
410:Computer security in India
80:
321:Editorial (9 July 2013).
71:
21:is a policy framework by
385:Proposed laws of India
323:"Protect, don't snoop"
370:Indian Cyber Security
247:The Times of India
405:Internet in India
400:Computer security
417:
366:
364:
346:
345:
343:
341:
318:
312:
311:
309:
307:
296:
290:
289:
287:
285:
280:. 26 August 2013
270:
264:
263:
261:
259:
238:
229:
228:
226:
224:
209:
425:
424:
420:
419:
418:
416:
415:
414:
375:
374:
362:
358:
355:
350:
349:
339:
337:
319:
315:
305:
303:
298:
297:
293:
283:
281:
272:
271:
267:
257:
255:
240:
239:
232:
222:
220:
211:
210:
206:
201:
189:
136:
92:
83:
74:
43:
12:
11:
5:
423:
413:
412:
407:
402:
397:
392:
387:
373:
372:
367:
354:
353:External links
351:
348:
347:
313:
291:
265:
254:on 7 July 2013
230:
203:
202:
200:
197:
196:
195:
188:
185:
184:
183:
180:
173:
170:
167:
164:
161:
158:
155:
152:
149:
146:
143:
140:
135:
132:
131:
130:
127:
124:
121:
114:
113:
109:
106:
102:
91:
88:
82:
79:
73:
70:
66:Edward Snowden
63:whistle-blower
50:Cyber security
42:
39:
9:
6:
4:
3:
2:
422:
411:
408:
406:
403:
401:
398:
396:
393:
391:
390:2013 in India
388:
386:
383:
382:
380:
371:
368:
361:
357:
356:
336:
332:
328:
324:
317:
301:
295:
279:
275:
269:
253:
249:
248:
243:
237:
235:
219:. 1 July 2013
218:
214:
208:
204:
194:
191:
190:
181:
178:
174:
171:
168:
165:
162:
159:
156:
153:
150:
147:
144:
141:
138:
137:
128:
125:
122:
119:
118:
117:
110:
107:
103:
100:
99:
98:
96:
87:
78:
69:
67:
64:
61:
57:
56:
51:
47:
38:
36:
32:
28:
24:
20:
16:
338:. Retrieved
326:
316:
306:24 September
304:. Retrieved
294:
284:24 September
282:. Retrieved
268:
258:24 September
256:. Retrieved
252:the original
245:
221:. Retrieved
216:
207:
176:
115:
93:
84:
75:
53:
44:
18:
17:
15:
223:21 November
379:Categories
199:References
134:Strategies
35:Cyberspace
340:2 January
335:0971-751X
327:The Hindu
90:Objective
55:The Hindu
187:See also
112:actions.
105:people).
33:defines
81:Mission
48:had no
333:
72:Vision
363:(PDF)
46:India
342:2019
331:ISSN
308:2013
286:2013
260:2013
225:2014
60:NSA
381::
329:.
325:.
276:.
244:.
233:^
215:.
344:.
310:.
288:.
262:.
227:.
179:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.