Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

INDIA

IN THE
CYBERWAR

BATTLEGROUND
PRESENTED BY:-
SIMRANDEEP SINGH
B.A. LL.B (3rd Sem)
INTRODUCTION
 Cyberwarfare  is the use of computers,
online control systems and networks in
a battlespace.

 Powers have been developing cyber capabilities


and engaged in cyber warfare, both offensively
and defensively.
WHAT IS A CYBERWAR ?
 Cyberwarfare is computer or network based conflict by
a nation-state on another nation-state. In these types of
attacks, nation-state actors attempt to disrupt the
activities of organizations or nation-states, especially
for strategic or military purposes and cyberespionage.

 Cyberwarfare generally refers to cyberattacks


perpetrated by one nation-state on another, it can also
describe attacks by terrorist groups or hacker groups
aimed at furthering the goals of particular nations.
TYPES OF CYBER ATTACKS

 Espionage - It is the practice of spying,


 typically by governments to obtain political and
military information.

 Sabotage – It is deliberately destroy, damage, or


obstruct (something), especially for political or
military advantage.
 Hacking - In simple words, hacking is an act
committed by an intruder by accessing your
computer system without your permission.

 Virus dissemination - Viruses are computer


programs that attach themselves to or infect a
system or files, and have a tendency to circulate to
other computers on a network. They disrupt the
computer operation and affect the data stored
 Denial-of-Service attack - A Denial-of-Service
(DoS) attack is an explicit attempt by attackers to
deny service to intended users of that service. It
involves flooding a computer resource with more
requests than it can handle consuming its available
bandwidth which results in server overload.

 Phishing - This a technique of extracting


confidential information such as credit card
numbers and username password combos.
NATION-STATES IN
CYBERWARFARE
 China - China is using access to Microsoft
source code and 'harvesting the talents of its
private sector' to boost its offensive and
defensive capabilities.

China continues to be held responsible for a


string of cyber-attacks on a number of public
and private institutions in the United States,
India, Russia, Canada, and France, the Chinese
government denies any involvement in cyber-
spying campaigns.
 Russia -When Russia was still a part of the Soviet
Union in 1982, a portion of its Trans-Siberia
pipeline within its territory exploded, allegedly due
to computer malware implanted in the pirated
Canadian software by the Central Intelligence
Agency. The malware caused the SCADA system
running the pipeline to malfunction. This caused the
"most monumental nonnuclear explosion and fire
ever seen from space." However, the Soviet Union
did not blame the United States for the attack.
 South Korea - In July 2009, there were a series of
coordinated denial of service attacks against major
government, news media, and financial websites
in South Korea and the United States. While many
thought the attack was directed by North Korea, one
researcher traced the attacks to the United Kingdom.

In July 2011, the South Korean company SK


Communications was hacked, resulting in the theft of
the personal details (including names, phone
numbers, home and email addresses and resident
registration numbers) of up to 35 million people. A
trojaned software update was used to gain access to
the SK Communications network.
 Germany - In 2013, Germany revealed the existence of their 60-
person Computer Network Operation unit. The German
intelligence agency, BND, announced it was seeking to hire 130
"hackers" for a new "cyber defence station" unit.

 Sweden - In January 2017, Sweden's armed forces were


subjected to a cyber-attack that caused them to shutdown a so-
called Caxcis IT system used in military exercises.

 Iran - Iran has been both victim and predator of several


cyberwarfare operations. Iran is considered an emerging military
power in the field. In September 2010, Iran was attacked by
the Stuxnet worm, thought it specifically targeted Natanz nuclear
enrichment facility.  It was a 500-kilobyte computer worm that
infected at least 14 industrial sites in Iran, including the Natanz
uranium-enrichment plant
 USA - Cyberwarfare in the United States is a part of the
American military strategy of proactive cyber defence and the use of
cyberwarfare as a platform for attack.

In 2009, president Barack Obama declared America's digital


infrastructure to be a "strategic national asset," and in May 2010 the
Pentagon set up its new U.S. Cyber Command (USCYBERCOM),
headed by General Keith B. Alexander, director of the National Security
Agency (NSA), to defend American military networks and attack other
countries' systems.

In February 2010, top American lawmakers warned that the "threat of a


crippling attack on telecommunications and computer networks was
sharply on the rise

In August 2010, the U.S. for the first time warned publicly about the
Chinese military's use of civilian computer experts in clandestine cyber
attacks aimed at American companies and government agencies
INDIA
IN THE
CYBERWARFARE
 High-profile cyber attack on 12 July 2012 breached the email
accounts of about 12,000 people, including those of officials from
the Ministry of External Affairs, Ministry of Home
Affairs, Defence Research and Development Organisation
(DRDO), and the Indo-Tibetan Border Police.

On 26 November 2010, a group calling itself the Indian Cyber


Army hacked the websites belonging to the Pakistan Army and
the others belong to different ministries, including the Ministry of
Foreign Affairs, Ministry of Education, Ministry of Finance,
Pakistan Computer Bureau, Council of Islamic Ideology, etc. The
attack was done as a revenge for the Mumbai terrorist attacks.

On 4 December 2010, a group calling itself the Pakistan Cyber


Army hacked the website of India's top investigating agency,
the Central Bureau of Investigation (CBI).
WHAT ARE CYBERLAWS ?
“Cyberlaw or Internet law is a term that deals with the legal
issues related to use of the Internet. Cyberlaws, same as any other
branch of law, help define what is legal and illegal, and stipulate
mechanisms to detect, convict and punish offenders, and protect
electronic property and its rightful use.

Cyberlaws pertain to diverse aspects of the electronic world such


as:
 
 software licences, copyright and fair use
 unauthorized access, data privacy and spamming
 export of hardware and software
 censorship

WHAT ARE MoU’s ?
An MOU is a formal written document specifying the mutually agreed terms
and conditions between two individuals or organizations seeking to achieve a
common objective. It is also known as Letter of Intent or Memorandum of
Agreement.

MOU is different from contract containing lesser complexities and fewer details
whereas a contract is a binding agreement involving an exchange of money.
MOU does not entail rigidity or exchange of money at the time of breach of
agreement. MOU can be framed for both domestic and international purposes.

MOU’s are non binding written agreements specifying the roles and
responsibilities of the parties involved in the agreement. They are usually less
time consuming and avoid the legal implications as involved in a contract. This
is because a legal agreement contains the risk, warranties and indemnifications
because of the nature of the contract involving exchange of money or other
considerations to validate it. 
INDIAN
MoU’s
S. No. Countries with MoU For Date of Signing and
which MoU was Date of Expiry
signed

1. Bangladesh  MOU on Coperation 8 April, 2017


in the field of to
Information 7 April, 2022
Technology and
Electronics

2. Canada MoU on cooperation 06/11/2012


in the field of to
Information 05.11.2017
Communication
Technology and
Electronics

3. China MoU on cooperation 18.03.2014


in the field of ICT to
17.03.2019
S. No. Countries with MoU For Date of Signing and Date
which MoU was of Expiry
signed

4. France MOU on Mutual 28.09.2000


cooperation on
Information
Technologies and
Services

5. Germany Joint Declaration of 30.05.2017 


Intent on to
Cooperation in the 29.05.2022
Field of
Digitalization -
Empowerment and
Economic Impact

6. Japan  MoU on 7th Dec. 2015


cooperation in to
Cyber Security 6th Dec 2020
S. No. MoU for Date of Signing and Date
Countries with of Expiry
which MoU was
signed

7. MoU on 16 May 2017


cooperation in the to
field of IT and 15 May 2022
Palestine Electronics

8. MoU on 24th Nov 2015 


cooperation in the To
field of Cyber 23rd Nov 2017
Singapore Security

9. South Africa MoU on 08 July 2016


Cooperation in the To
field of ICT 07 July 2021
S. No. MoU For Date of Signing and
Date of Expiry 
Countries with which
MoU was signed

10. MoU on Cooperation 11.1.2017


in the field of Cyber to
Security 10.1.2020
United States

11. Vietnam MoU on Cooperation 3 Sept 2016


in the field of Cyber to
Security 2 Sept 2021

12. Indo-Brazil-South Framework for 13.09.2006


Africa (IBSA) cooperation on the
Forum Information Society
INDIAN CYBER
DEFENCE
STRATEGIES
IT Act, 2000
The Information Technology (IT) Act, 2000 was passed by the
Indian Parliament in May 2000 and came into force in October
of the same year. Its prime purpose is to provide the legal
infrastructure for e-commerce in India. It was the first legal
instrument to provide legal sanctity to electronic records and
contracts expressed through electronic means of communication.

The bill was passed in the budget session of 2000 and signed
by President K. R. Narayanan on 9 May 2000. The bill was
finalised by group of officials headed by then Minister of
Information Technology, Pramod Mahajan.
 The Act provides legal framework for electronic
governance by giving recognition to electronic records
and digital signatures. The formations of Controller of
Certifying Authorities was directed by the Act, to
regulate issuing of digital signatures. It also defines
cyber crimes and prescribed penalties for them.

 It also established a Cyber Appellate Tribunal to resolve


disputes rising from this new law. The Act also amended
various sections of Indian Penal Code, 1860, Indian
Evidence Act, 1872, Banker's Book Evidence Act, 1891,
and Reserve Bank of India Act, 1934 to make them
compliant with new technologies.
National Cyber Security Policy
2013
India had no Cyber security policy before 2013.

National Cyber Security Policy is a policy framework


by Department of Electronics and Information Technology
(DeitY). It aims at protecting the public and private infrastructure
from cyber attacks. The policy also intends to safeguard
"information, such as personal information (of web users),
financial and banking information and sovereign data“.

Its mission is to protect information and information infrastructure


in cyberspace, build capabilities to prevent and respond to cyber
threat, reduce vulnerabilities and minimize damage from cyber
incidents through a combination of institutional structures, people,
CRISIS MANAGEMENT PLAN
 The purpose of this plan is to establish the strategic framework
and guide actions to prepare for, respond to, and begin to
coordinate recovery from a cyber incident.

 It covers different type of cyber crisis, possible targets and related


impact, actions and responsibilities of concerned stakeholders,
cyber incident response coordination among Ministries or
Departments of Central Government, its agencies and Critical
Information Infrastructure organizations to deal with cyber crisis
situations.

 The field of cyber security is technology intensive and new


vulnerabilities emerge with progress in technology giving rise to
new types of incidents.
Computer Emergency
Response Team
 The Department of Information Technology
created the Indian Computer Emergency
Response Team (CERT-In) in 2004 to stop cyber
attacks in India.[That year, there were 23 reported
cyber security breaches.
National Critical Information
Infrastructure Protection Centre

 In 2011, the government created a new


subdivision, the National Critical Information
Infrastructure Protection Centre (NCIIPC) to
stop attacks against energy, transport, banking,
telecom, defence, space and other sensitive areas.
CONCLUSION
 Hence, we can conclude that, cyber war is network-based attacks
by one nation state on another. In these type of attacks nation
attempt to disrupt the activities of organizations or nation-states,
especially for strategic or military purposes and cyberespionage.

 With the increased dependency on the use of technology need for


cyber law was felt by India, so India adopted some cyber laws to
protect itself from becoming a prey of nation-states attempting to
destroy or affect India’s peace. Information Technology Act,
2000 was introduced as the Indian IT law and set way for
evolution of cyber law. National Cyber Security Policy, 2013 had
also been introduced by India government to protect and secure
individual’s personal data and controversial data. Cyber Crisis
Management Plan has also resulted in success.
REFERENCES
 See at
https://www.digit.in/technology-guides/fasttrack-to-cyber-
crime/what-is-cyber-crime.html
 
 See at
https://searchsecurity.techtarget.com/definition/cyberwarf
are
 
 See at http://meity.gov.in/content/active-mous
 
 See at http://www.madaan.com/cyberlaw.html
 

You might also like