Knowledge

National Cyber Security Policy 2013

Source 📝

85:
To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threat, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology, and cooperation.
25:(DeitY) It aims at protecting the public and private infrastructure from cyber attacks. The policy also intends to safeguard "information, such as personal information (of web users), financial and banking information and sovereign data". This was particularly relevant in the wake of 111:
To enhance and create National and Sectoral level 24x7 mechanism for obtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution and crisis management through effective predictive, preventive, protective response and recovery
68:, has alleged that much of the NSA surveillance was focused on India's domestic politics and its strategic and commercial interests. This sparked a furore among people. Under pressure, the government unveiled a National Cyber Security Policy 2013 on 2 July 2013. 104:
To create an assurance framework for the design of security policies and promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment (Product, process, technology &
76:
To build a secure and resilient cyberspace for citizens, business, and government and also to protect anyone from intervening in user's privacy.It mentioned a five year target of training five lakh cyber security personnel by 2018.
241: 101:
To create a secure cyber ecosystem in the country, generate adequate trust and confidence in IT system and transactions in cyberspace and thereby enhance adoption of IT in all sectors of the economy.
126:
To enable Protection of information while in process, handling, storage & transit so as to safeguard privacy of citizen's data and reducing economic losses due to cyber crime or data theft.
394: 94: 30: 166:
Human Resource Development (fostering education and training programs both in formal and informal sectors to Support the Nation's cyber security needs and build capacity.
299: 129:
To enable effective prevention, investigation and prosecution of cybercrime and enhancement of law enforcement capabilities through appropriate legislative intervention.
37:
as a complex environment consisting of interactions between people, software services supported by worldwide distribution of information and communication technology.
251: 22: 116:-To improve visibility of integrity of ICT products and services by establishing infrastructure for testing & validation of security of such product. 29:(NSA) leaks that suggested the US government agencies are spying on Indian users, who have no legal or technical safeguards against it. 277: 359: 120:
To create workforce for 500,000 professionals skilled in next 5 years through capacity building skill development and training.
409: 192: 151:
Creating a mechanism for Security Threats Early Warning, Vulnerability management, and response to security threats.
322: 384: 273: 175:
To develop bilateral and multilateral relationships in the area of cyber security with another country. (
26: 404: 399: 212: 205: 59: 123:
To provide fiscal benefit to businesses for adoption of standard security practices and processes.
389: 365:. Department of Information Technology, Ministry of Communications and Information Technology. 8: 246: 330: 369: 108:
To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE ECOSYSTEM.
65: 49: 378: 334: 62: 217:
Department Of Electronics & Information Technology, Government Of India
34: 54: 157:
Protection and resilience of Critical Information Infrastructure.
395:
Ministry of Communications and Information Technology (India)
95:
Ministry of Communications and Information Technology (India)
45: 31:
Ministry of Communications and Information Technology (India)
160:
Promotion of Research and Development in cyber security.
242:"Amid spying saga, India unveils cyber security policy" 40: 274:"National Cyber Security Policy 2013: An Assessment" 23:
Department of Electronics and Information Technology
300:"For a unified cyber and telecom security policy" 172:Developing effective Public-Private partnerships. 376: 278:Institute for Defence Studies and Analyses 182:a Prioritized approach for implementation. 320: 302:. The Economic Times. 24 September 2013 236: 234: 148:Strengthening The regulatory Framework. 377: 58:newspaper, citing documents leaked by 360:"National Cyber Security Policy 2013" 213:"National Cyber Security Policy-2013" 250:. INDIA. 3 July 2013. Archived from 231: 177:Information sharing and cooperation 13: 193:National Security Strategy (India) 169:Creating cyber security awareness. 41:Reason for Cyber Security policies 14: 421: 352: 142:Creating an assurance framework. 154:Securing E-Governance services. 314: 292: 266: 97:define objectives as follows: 19:National Cyber Security Policy 1: 198: 139:Creating a secured Ecosystem. 133: 52:policy before 2013. In 2013, 89: 7: 186: 163:Reducing supply chain risks 145:Encouraging Open Standards. 27:US National Security Agency 10: 426: 410:Computer security in India 80: 321:Editorial (9 July 2013). 71: 21:is a policy framework by 385:Proposed laws of India 323:"Protect, don't snoop" 370:Indian Cyber Security 247:The Times of India 405:Internet in India 400:Computer security 417: 366: 364: 346: 345: 343: 341: 318: 312: 311: 309: 307: 296: 290: 289: 287: 285: 280:. 26 August 2013 270: 264: 263: 261: 259: 238: 229: 228: 226: 224: 209: 425: 424: 420: 419: 418: 416: 415: 414: 375: 374: 362: 358: 355: 350: 349: 339: 337: 319: 315: 305: 303: 298: 297: 293: 283: 281: 272: 271: 267: 257: 255: 240: 239: 232: 222: 220: 211: 210: 206: 201: 189: 136: 92: 83: 74: 43: 12: 11: 5: 423: 413: 412: 407: 402: 397: 392: 387: 373: 372: 367: 354: 353:External links 351: 348: 347: 313: 291: 265: 254:on 7 July 2013 230: 203: 202: 200: 197: 196: 195: 188: 185: 184: 183: 180: 173: 170: 167: 164: 161: 158: 155: 152: 149: 146: 143: 140: 135: 132: 131: 130: 127: 124: 121: 114: 113: 109: 106: 102: 91: 88: 82: 79: 73: 70: 66:Edward Snowden 63:whistle-blower 50:Cyber security 42: 39: 9: 6: 4: 3: 2: 422: 411: 408: 406: 403: 401: 398: 396: 393: 391: 390:2013 in India 388: 386: 383: 382: 380: 371: 368: 361: 357: 356: 336: 332: 328: 324: 317: 301: 295: 279: 275: 269: 253: 249: 248: 243: 237: 235: 219:. 1 July 2013 218: 214: 208: 204: 194: 191: 190: 181: 178: 174: 171: 168: 165: 162: 159: 156: 153: 150: 147: 144: 141: 138: 137: 128: 125: 122: 119: 118: 117: 110: 107: 103: 100: 99: 98: 96: 87: 78: 69: 67: 64: 61: 57: 56: 51: 47: 38: 36: 32: 28: 24: 20: 16: 338:. Retrieved 326: 316: 306:24 September 304:. Retrieved 294: 284:24 September 282:. Retrieved 268: 258:24 September 256:. Retrieved 252:the original 245: 221:. Retrieved 216: 207: 176: 115: 93: 84: 75: 53: 44: 18: 17: 15: 223:21 November 379:Categories 199:References 134:Strategies 35:Cyberspace 340:2 January 335:0971-751X 327:The Hindu 90:Objective 55:The Hindu 187:See also 112:actions. 105:people). 33:defines 81:Mission 48:had no 333:  72:Vision 363:(PDF) 46:India 342:2019 331:ISSN 308:2013 286:2013 260:2013 225:2014 60:NSA 381:: 329:. 325:. 276:. 244:. 233:^ 215:. 344:. 310:. 288:. 262:. 227:. 179:)

Index

Department of Electronics and Information Technology
US National Security Agency
Ministry of Communications and Information Technology (India)
Cyberspace
India
Cyber security
The Hindu
NSA
whistle-blower
Edward Snowden
Ministry of Communications and Information Technology (India)
National Security Strategy (India)
"National Cyber Security Policy-2013"


"Amid spying saga, India unveils cyber security policy"
The Times of India
the original
"National Cyber Security Policy 2013: An Assessment"
Institute for Defence Studies and Analyses
"For a unified cyber and telecom security policy"
"Protect, don't snoop"
ISSN
0971-751X
"National Cyber Security Policy 2013"
Indian Cyber Security
Categories
Proposed laws of India
2013 in India
Ministry of Communications and Information Technology (India)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.