Page 7 - Lesson 15.xps
P. 7
Module -V
Cyber Warfare
Warfare and
15.5.3 Remedial Measures Its Types
Although you may not be able to catch the indications of your computer being infected,
there are certain precautions you can observe to keep your systems safe from attack.
These are -
(a) Install Latest Patches for OS: Install latest patches for the OS and application
being used from a trusted website only. A good Firewall would act as the first Note
line of defence to alert the user if any application / programme is trying to connect
to his PC over the internet. However, a firewall has the following limitations:-
(i) It cannot protect your computer against malicious insiders i.e., spoofing
attacks.
(ii) It cannot protect against connections that don't go through OS (i.e.,
backdoors).
(iii) It cannot protect against viruses which are e-mail borne.
(b) Install a Good Internet Security Suite: Nowadays various Internet security
suites are available in the market. They combine the functionality of antivirus,
antispyware, firewall, parental controls etc. Alternately, as a user, you must install
an antivirus as well as an antispyware programme and must download latest
virus signature periodically (preferably daily).
15.5 CERT and National Cyber Security Policy
The Department of Information Technology created the Indian Computer Emergency
Response Team (CERT-In) in 2004 to thwart cyber-attacks in India. That year, there
were 23 reported cyber security breaches. In 2011, there were 13,301. In response,
the government created a new subdivision, the National Critical Information
Infrastructure Protection Centre (NCIIPC) to thwart attacks against energy, transport,
banking, telecom, defence, space and other sensitive areas. India had no cyber security
policy before 2013. The government unveiled a National Cyber Security Policy 2013
on 2nd July 2013. The National Cyber Security Policy is a policy framework by
Department of Electronics and Information Technology.
The Cyber Security Policy aims at protection of information infrastructure in cyberspace,
reduce vulnerabilities, build capabilities to prevent and respond to cyber threats and
minimize damage from cyber incidents. This is achieved through a combination of
institutional structures, people, process, technology and cooperation. The objective of
this policy is to create a secure cyberspace ecosystem and strengthen the regulatory
framework.
The Computer Emergency Response Team (CERT-In) has been designated to act as
63
MILITARY STUDIES 63