Potential and problems related with Cyber Security issues in India

Analyzing the Challenges and Opportunities in India's Cyber Security Landscape

by Anita Yadav*, Dr. Vipin Kumar,

- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540

Volume 16, Issue No. 1, Jan 2019, Pages 3265 - 3271 (7)

Published by: Ignited Minds Journals


ABSTRACT

Amidst the information, communication, and technological revolutions, cyber security is the basis of a connected society. A new cyberspace has emerged, presenting the international community with both opportunities and challenges, such as the ability to communicate with one another. There are various dangers and hazards that have never been witnessed before in human history in India as well as the rest of the world. Furthermore, in the present day, threats to global security originate not only from local but also from global networks as a result of technological advancements. For everyone, these hazards transcend time and geography and pose a constant threat. As a result, international relations are increasingly focused on defending countries' economic and security interests while limiting restrictions on the internet world. Because there is no power balance in the cybersphere, actions like this have the potential to drive nations into waging real-world war against one another. India's cyber security problems are examined in this article. An attempt is also made to identify and evaluate possible diagnoses.

KEYWORD

Cyber security, India, Dangers, Hazards, Global networks, International relations, Economic interests, Security interests, Internet world, Power balance

INTRODUCTION

Cyber security concerns have become an important part of international relations, even if they are still in their infancy. It has already had a significant influence on the relationship between the states. In recent years, the United States and China's relationship has been strained by the issue of cyber security. America claims that China is engaged in commercial and geopolitical digital espionage and is attempting to get sensitive national security and economic information. According to China's position on this issue, the United States has been accused of defacing websites, misusing networks, and waging service denial attacks on their behalf. Distrust grows and suspicions about the other state are fueled in both countries as a result of this kind of situation. It is becoming more common for nations to replicate their diplomacy and relationships with one another in the virtual world. These days, states have to take a more active role in protecting their borders. There was a pressing need to use internet technologies and methods in order to serve their national and community objectives. Many countries, including India, have had cyber security issues since 2010, and India is no exception. Saudi Arabia's "Saudi Aramco" oil company had 30,000 of its computers hacked by alleged Iranian hackers in 2012, rendering them unusable. The purpose of this hack was to stop Saudi oil from flowing. Similar attacks were made against the world's largest supplier of liquefied natural gas, "RasGas," a joint- stock company managed by Qatar Petroleum and ExxonMobil. Additionally, in March 2013, North Korea launched a digital destruction campaign against three South Korean television stations and three banks. This has led to an increase in cyber security attacks over the last decade, many of which

CYBERSECURITIES ISSUES

Everyone, not only the Indian government, huge businesses, and law enforcement, is affected by internet safety today. Consumers are getting more worried about the problems they face, but they are also becoming less aware about the solutions provided by technology. The following are some of the most pressing cyber-security issues, as well as the solutions that must be found: [2]

Data protection and privacy

On the internet, a person's personal data is almost as valuable as cash. As public attitudes about privacy evolve, so does the challenge of safeguarding individual people' private information. The definition of privacy is always changing. The term "privacy" used to refer to the practise of not giving personal information to anybody save a close friend or relative. When users upload their personal information on social media, issues arise regarding how that information is used after it is published. Facebook and Google have come under fire from users who don't want their data to be used in ways they didn't intend or agree to, but don't mind that these sites already have it. [3]

Better software

Cybercrime is often caused by software bugs and design flaws. As a result of Microsoft's security weaknesses, a whole IT industry has sprung up. Software product testing and industry collaboration may assist to reduce hacker possibilities. Too much consumer software has already been built without regard for security, as seen by the emergence of early viruses based on iPhone apps." India's 2015 Cyber Security Policy Must Be Created by Narendra Modi. Finally, it's over: CECSRDI young man had hacked our country's most important website. For cyber security, preventing unintended or unauthorised data loss is the most important aim (also known as information technology security).[3]

WHO IS AN INTERNET SERVICE PROVIDER?

An Internet service provider (ISP) is any corporation or organisation that facilitates users' access to, use of, or participation in, the Internet (ISP). Internet service providers may operate as for-profit, community-owned, non-profit, or any combination of these. In order to access to the internet, an ISP offers a variety of services, including website building and virtual hosting (Internet service provider). ISPs are businesses that offer their customers with access to the public internet using a number of methods (such as dialup, cable, DSL, ISDN, T3, etc.). Send an email to hosting Internet service providers (ISPs). Web hosting, virtual machines, cloud computing, and physical servers all come under the umbrella term of FTP (File Transfer Protocol) (FTP).

[4]

Virtual Internet Service Providers (VISPs) Other Internet service providers should be used to get the required services. If you're looking for a free Internet service provider (ISP) that doesn't charge you a fee, go no further than freenets. You'll need an Internet Service Provider (ISP) to go online. In order to access the Internet, you or your parents must pay a monthly subscription fee to the service provider. Dial-up modems create a point-to- point protocol (PPP) connection with the ISP's

provider. From there, you may access information from all over the globe through the Internet "backbone," which is connected to one of the ISP's routers. However, after the first connection, you're constantly connected with cable modems. [5]. An intermediary may also be referred to as an internet service provider. The Internet Service Providers Association of India was established in 1998 with the goal of making the Internet accessible to the general public in the country's cities and towns. As a representative of the internet community, ISPAI serves as a voice for Internet service providers (ISPs). For many years, ISPAI's purpose has been to help ISPs and Internet service providers develop and grow their companies in a friendly and enabling environment." In today's world, ISPAI is the leading group for Indian Internet service providers. ISPAI is often consulted on Internet development and growth challenges because of its connections to international organisations and platforms. ISP members have the ability to broaden their networks and discover new economic opportunities by making travel for business delegations and visitors from across the globe easier. Through personal meetings and events sponsored by or supported by ISPAI, the Solution Provider's community is given a platform to get easy access to ISP consumers and to market products and services. [6]

SERVICE PROVIDERS‘ LIABILITIES FOR INFRINGEMENTS

"Security providers and Internet Service Providers must be held accountable for their actions, whether contractual or tortious. Since the foreseeability components of carelessness may no longer function in the digital age, it's necessary to reconsider the notion."

[7]

How do you know when an intermediary isn't liable? 67C of the IT Act specifies that intermediaries must conform to the federal government's standards for the preservation and retention of information for the indicated time period, in the necessary format, and in the way specified. In the event that an intermediary fails to do so, they might face a three-year prison sentence and a $250,000 fine. Service providers and intermediaries are required by Section 70A to supply the agency with information on critical infrastructure and its protections.[8] When an intermediary conspired, encouraged, assisted, or influenced the performance of an unlawful act in any way (including by threats and promises), that person is not free from criminal liability under Section 79. "upon gaining actual knowledge or when told by an authorised government agency that any information the intermediary fails to rapidly remove," the new clause declares in Provision

79.

To be successful, Internet service providers (ISPs) must play an important role in enabling transactions and communication among end customers. Concerning ISP liability for third- minor details, without which ISPs and the internet as a whole may suffer. Service providers' standards of liability were unable to be agreed upon by the courts. Under Indian law, there are no explicit regulations that regulate the ISP's accountability for breaches, which necessitates creating particular legislation or amending existing laws. ISP liability law in the country of India must handle several challenges in order to be reliable: [10]

  • The term "Internet Service Provider" must be

defined. It would be impossible to tell who is in command of what without this kind of behaviour. "Due diligence" must be specified as well.

  • Using DCMA, for example, is a viable option.

The responsibilities of Internet service providers (ISPs) should be clearly defined using a variety of effective methods.

  • If the Information Technology Act requires it,

ISPs must shut off service to clients who repeatedly break their contract terms. Since Title III of the Digital Millennium Copyright Act specifies that Internet service providers (ISPs) may be held liable for copyright infringement, the Copyright Act of 1957 needs to include this language explicitly (DMCA). "Red Flag Test," which contains both subjective and objective components, was utilised by the court to determine whether or not YouTube is aware of illegal material." To see whether the service provider was made aware of the situation "Find out what the service provider's perspective is on the relevant facts or events you're interested in. Any infringing behaviour would have been detected by a reasonable person acting in the same or similar conditions, hence the objective test should be employed to assess if these facts and circumstances constitute a red flag "As a matter of fact,. [10] Laws and the internet have created a number of challenges and anxieties. "Many issues and precedents have yet to be established due to the internet's immaturity and lack of maturity." " Cybersecurity threats are growing increasingly common throughout the world, and India is no exception. The Narendra Modi government has a number of cyber security issues that must be addressed as a matter of urgency. The lack of cyber security expertise in India has been a problem. In addition, domestic software and hardware production falls far short of what is expected. [11] "Cyberspace has become a dangerous place to be these days. Our approach should be guided by the reality that it is full of opportunities and challenges. The state of India's cyber security is alarming, and the country's leadership must move rapidly to address the issue. As a result, the country's internet infrastructure is now unprotected. [11] As a result, the country's critical infrastructure is vulnerable to cyberattacks. International legal issues related to cyber security have become more difficult due to the proliferation of conflicting regulations in cyberspace. Because of the current state of affairs, India is in a situation where she can make little difference. [12] India requires both offensive and defensive cyber security expertise, as well as a well implemented cyber security strategy, according to him. Cybersecurity is a major concern for India's most prominent scientist, Dr. A.P.J. Abdul Kalam. A country's ability to conduct offensive and defensive cyber operations is just as critical as its nuclear arsenal. Only two kinds of governments will exist in a few years: those that can both attack and defend against cyberattacks (and those that can't) will exist, he said.

advent of future technologies that may digitally represent key identifiers like a retinal or fingerprint scan. As a part of an individual's bodily constitution, biometric features are impenetrable in real space. This has disappeared off the face of the planet. Cyberspace users require a technique that enables them to verify their identification without exposing the digital representation they have in the virtual world [13] We cannot stress the importance of science and technology to the ever-growing global community. Many benefits, but it also has a bad side that must be ignored. Every day, more and more information technology is being used illegally. [14] Chat rooms, emails, bulletin boards, groups, and SMS/MMS are all examples of cybercrimes. According to Forbes, some of the most common cybercrimes include hacking and identity theft; DDoS assaults; viruses; IPR violations; and cyber terrorism. Child pornography is included under the term "internet pornography," which is defined as "the depiction of erotic behaviour (in image or text) intended at stimulating sexual desire." Because of globalisation, pornography has become one of the greatest and most critical corporate issues in society. [15] "Regardless of their age, kids love this. It is illegal in India to sell pornography-related drugs to minors under the Information Technology (Amendment) Act of 2013. Most of the time, it's done in order to illegally earn money and get an unfair edge over others, such blackmailing them. Computer hackers use a variety of electronic equipment to carry out their illicit activities, some of which may be located in the same nation as other devices. When an Indian person or piece of property is harmed by a crime committed outside of India, the issue of jurisdiction arises. National standards and rules vary widely, which causes this problem (what one nations considered as crime, may not be considered by the other nation). Pornographic of India in a country where pornography is legal. [16] As Pawan Duggal explains, the difficulties in eliminating pornographic websites is due to the fast evolution of technology (a cyber-law expert quoted in a newspaper clipping). A deterrence when India's government attempt to criminalise it. Globalization and strict internet rules make it difficult for India's government to effectively tackle pornography. The Copyright Act of 1976 grants a wide range of exclusive rights to the copyright holder. A website's textual material and computer programmes are examples of copyrighted content. Copyright protects a wide range of creative works, including music, visual art, theatre, film, and other audiovisual media. The copyright holder is responsible for ensuring that the copyrighted work is not used in a way that the copyright holder has not authorised. [17] Google, social media platforms, and government websites have recently been targeted by hackers because of their inability to defend themselves against Internet-enabled assaults. Criminal hackers target these programmes and steal client data by using the same technology that powers online banking, entertainment, and a slew of other communication services. [18] Secure connections on hacked computers are often breached by attackers, who then utilise the compromised machines as proxies to launch assaults throughout the globe. However, such assaults are a global concern. [19] "Attribution is the most difficult part of determining the origin of these assaults." The source and destination addresses of every Internet data packet are included in each packet. Unfortunately, identical methods may be used maliciously. The source field may be tampered with by an attacker to make it seem as if the data is coming from another site. A network (also known as a "zombie" network). "It's far more difficult to put it all together" in court since proxies are routinely used in multiple countries, says Nicol. The fact that an assault seems to have been orchestrated by a certain server or computer does not establish that it originated there, according to Nicol. When it comes to investing, hedging is a low-risk, low-return strategy that prioritises safety above risk, while surfing takes advantage of shifting currents and forges forward with the greatest amount of effort, risk, and reward. Shivshankar Menon, head of the National Security Agency, said that hedging is no longer safe in the Indian context since we cannot manage our own environment. [20] Users' access to these facilities may be threatened by assaults in cyberspace, which is a distinct battlefield. Cyberspace security needs particular attention. The borders of the country's land, sea, and air defences have been clearly defined. Cyberspace is more intimate in comparison to the vastness of the cosmos. From the standpoint of national interest, they are fundamentally international. Cybersecurity should be taken into consideration while designing security and risk management strategies, according to this article. In order to stimulate public debate, this study depends on publicly accessible data since it is aimed at the broader security community. It is becoming more difficult to safeguard a corporation against cybercrime using technology-based defences. An activity that was formerly vertically integrated and individualistic has evolved into a veryorganised, dispersed industry where stolen data is exchanged on exchanges, and highly specialised specialists are becoming involved. In the past, malware was transmitted by "script kiddies" or copycats via virus exchanges. In the modern day, cybercrime is perpetrated by high-level experts who are capable of causing tremendous harm." " As a consequence, cyber-attacks are often seen as an IT issue that can be be less safe. The "people" part is critical to a solid defence, despite the fact that it is often overlooked. When it comes to cybercrime, it's not only about keeping you protected from hackers. Keeping a sense of security is important, but it's only one piece of the puzzle. Fire barriers are an expensive investment for many firms, but they are seldom used to keep tabs on other potential dangers, such as those that may arise from inside or from the outside. [21]

CONCLUSION

Even while India has taken a number of hopeful steps, it still has a comparatively low number of cyber security initiatives and activities compared to other developed nations. Even some of the Indian government's planned efforts are still only paper plans. It is also critical to protect critical infrastructure in India from cyber assaults. Examples of this critical infrastructure include financial institutions, satellite systems, automated electrical grids and large-scale thermal power plants.

REFERENCES

1. NIR KSHETRI, CYBERCRIME AND CYBERSECURITY IN THE GLOBAL

SOUTH (Palgrave Macmillan. 2013). 2. Howard F. Lipson, Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues (Software Engineering Institute 2002).

3. JULIE E. MEHAN, CYBERWAR, CYBERTERROR, CYBERCRIME: A GUIDE TO THE ROLE OF STANDARDS IN AN ENVIRONMENT OF CHANGE AND

DANGER (IT Governance Publishing.

2008). 4. ROBERT MOORE, CYBERCRIME: INVESTIGATING HIGH-TECHNOLOGY

COMPUTER CRIME (Anderson Publishing 2011).

Implications, in IN ATHENA'S CAMP:

PREPARING FOR CONFLICT IN THE

INFORMATION AGE (John Arquilla& David Ronfeldt eds., 1997). 6. Ellen S. Podgor, International Computer Fraud: A Paradigm for Limiting National Jurisdiction,

35 U.C. DAVIS LAW REVIEW (2002).

7. David Satola& Henry L. Judy, Towards a Dynamic Approach to Enhancing International Cooperation and Collaboration in Cybersecurity Legal Frameworks: Reflections on the Proceedings of the Workshop on Cybersecurity Legal Issues at the 2010 United Nations Internet Governance Forum 37

WILLIAM MITCHELL LAW REVIEW (2011).

8. Michael N. Schmitt, Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press 2013). 9. Peter M. Shane, Cybersecurity: Toward a Meaningful Policy Framework, 90 TEXAS LAW

REVIEW (2012).

10. Mathhew J. Sklerov, Solving the Dilemma of State Responses to Cyber-attacks: A Justification for the Use of Active Defenses Against States Who Neglect Their Duty to Prevent, 201 MILITARY LAW REVIEW (2009). 11. Clarke, Roger, Information Privacy on the Internet Cyberspace Invades Personal Space. 12. Carroll, John B. 1993. Human Cognitive Abilities: A Survey of FactorAnalytic Studies. Cambridge, Eng.: Cambridge University Press. 13. CHEN, JIE-QI; KRECHEVSKY, MARA; and VIENS, JULIE. 1998. Building on Children's Strengths: The Experience of Project Spectrum. New York: Teachers College Press. 14. Davey, F.N. (2001). The relationship between Engineering and Young Women‘s occupational priorities. Canadian Journal of Counseling Psychology 35: 221-228. About the EU General Data Protection Regulation, Wordstrem. 16. David Banisar& Simon Davies, Global Trends in Privacy Protection: An International Survey of Privacy, Data Protection, and Surveillance Laws and Developments, 18 J. Marshall J. Computer & Info. L. 1, 108–09 (1999). 17. DEARY, IAN J. 2001. Intelligence: A Very Short Introduction. New York: Oxford University Press. 18. Denga, D. (1986). Effects of Counseling on Development of Children Self Concept: A pilot study. The Journal of Education in Africa 2: (1): p.110- 118 19. Ekennia, C.C. (2011). Career Interest Inventory (CII) User‘s Manual. Federal Government of Nigeria: Federal Ministry of Education, Basic and Secondary Education Department, School Support www. leena- luna.co.jp P a g e | 47 Division, Guidance and Counseling Branch. Chin and Chis Resource Concept Ltd Owerri, Imo State. 20. Emma S. Rice, Corresponding authors Emma Haynes, Paul Royce, and Sandra C. Thompson, Social Media and Digital Technology Use Among Indigenous Young People in Australia: A Literature Review. 21. Federal Republic of Nigeria (2004).National Policy on Education. Lagos: Federal Ministry of Education. Terrod Press, Yaba Lagos.

Corresponding Author Anita Yadav*

Research Scholar, School of Law, Shri Venkateshwara University