• No results found

Cyber Security Initiatives in India

N/A
N/A
Protected

Academic year: 2021

Share "Cyber Security Initiatives in India"

Copied!
25
0
0

Loading.... (view fulltext now)

Full text

(1)

Cyber Security Initiatives in

Cyber Security Initiatives in

India

India

Nandkumar Saravade

Nandkumar Saravade

Director, Cyber Security and Compliance

Director, Cyber Security and Compliance

NASSCOM

(2)

Some Numbers: Internal and

Some Numbers: Internal and

External

External

(3)

Growth of Internet User Population

Growth of Internet User Population

(4)

Electronic Banking in India Trends

Electronic Banking in India Trends

ICICI Bank Illustration

ICICI Bank Illustration

Second largest bank in

Second largest bank in

India, after SBI

India, after SBI

Quants

Quants

Branches

Branches

450

450

ATMs

ATMs

1750

1750

Assets Rs.112,024

Assets Rs.112,024

crore

crore

Pioneer in Internet

Pioneer in Internet

banking

banking

Netbanking

Netbanking

user base

user base

in India: 46

(5)

India is not just a land of mystics and wonders

India is not just a land of mystics and wonders

India

India’’s GDP has grown at nearly twice s GDP has grown at nearly twice the global rate over past 20 years

the global rate over past 20 years

Steady annual growth in real GDP,

Steady annual growth in real GDP,

industrial production and domestic

industrial production and domestic

demand of 5

demand of 5--6%6%

Sustained real growth in foreign

Sustained real growth in foreign

investment inflows (FDI and FII) since

investment inflows (FDI and FII) since

economic liberalization (1991)

economic liberalization (1991)

Cumulative

Cumulative forexforex reserves of ~USD reserves of ~USD 200

200 bnbn

FY06 GDP Growth in India is Amongst the Fastest in the Region

Source: JM Morgan Stanley

(6)

A maturing economy led by high growth in

A maturing economy led by high growth in

services

services

Over the last few decades the Indian economy has transitioned fr

Over the last few decades the Indian economy has transitioned from an agrarian economy to om an agrarian economy to

a predominantly services based economy

a predominantly services based economy

Key services sectors

Key services sectors ––Personal services, trade, hotels, banking, communications and Personal services, trade, hotels, banking, communications and business services

business services

Growth in Key Services Segments

4.2% 6.7% 7.2% 4.8% 4.8% 13.5% 6.1% 11.9% 6.5% 5.9% 19.8% 13.6% 12.7% 9.3% 7.3%

Trade Hotels Banking Communication Business services 1950s-1970s 1980s 1990s Source: IMF Source: Citigroup

Changing Composition of India ’s GDP

Includes IT -ITES 0% 20% 40% 60% 80% 100%

FY80 FY90 FY02 FY06 Agriculture Industry Services

Growth in Key Services Segments

4.2% 6.7% 7.2% 4.8% 4.8% 13.5% 6.1% 11.9% 6.5% 5.9% 19.8% 13.6% 12.7% 9.3% 7.3%

Trade Hotels Banking Communication Business services 1950s-1970s

1980s 1990s

Growth in Key Services Segments

4.2% 6.7% 7.2% 4.8% 4.8% 13.5% 6.1% 11.9% 6.5% 5.9% 19.8% 13.6% 12.7% 9.3% 7.3%

Trade Hotels Banking Communication Business services 1950s-1970s 1980s 1990s Source: IMF Source: Citigroup

Changing Composition of India ’s GDP

Includes IT -ITES 0% 20% 40% 60% 80% 100%

FY80 FY90 FY02 FY06 Agriculture Industry Services

(7)

Indian IT

Indian IT

-

-

BPO sector growing at 28%; industry aggregate to

BPO sector growing at 28%; industry aggregate to

reach USD 47.8bn, direct employment to exceed 1.6 million in

reach USD 47.8bn, direct employment to exceed 1.6 million in

FY2007

FY2007

Tenfold growth over a decade

190,000 230,000 284,000 430,114 522,250 670,000 830,000 1,058,000 1,630,000 1,293,000 3.0 3.3 4.2 5.9 5.8 8.3 10.2 13.2 15.9 1.8 2.7 4.0 6.2 7.7 13.3 31.9 6.3 18.3 24.2 9.8

FY98 FY99 FY00 FY01 FY02 FY03 FY04 FY05 FY06 FY07E

DOMESTIC MARKET EXPORTS 1.2% 1.4% 1.8% 2.6% 2.8% 3.2% 3.6% 4.1% 4.7% 5.4% 4.8 6.0 8.2 12.1 13.5 16.1 21.6 28.5 37.4 47.8 of GDP USD Billion Direct Employment

(8)

1.7 2.5 3.0 4.8 8.4 2.6 6.2 9.6 17.7 31.3

FY99 FY01 FY03 FY05 FY07E FY10^

DOMESTIC MARKET* EXPORTS*

Industry is on track to reach the targeted USD 60 billion

Industry is on track to reach the targeted USD 60 billion

in software and services exports by 2010

in software and services exports by 2010

USD Billion 13-15 60 24.2% 24.2% 34.6% 34.6% 31.2% 31.2% 18.6% 18.6% 23.4% 23.4% 22.1% 22.1% 31.5% 31.5% FY00 FY00--0606 28.9% 28.9% FY00 FY00--1010 23.1% 23.1% FY06 FY06--1010 CAGR 10 YR TARGET ACHIEVED REQUIRED

* Includes IT Software and Services, ES and ITES-BPO

TOTAL PERIOD

(9)

SIGNIFICANT UNTAPPED DEMAND AND INDIA

SIGNIFICANT UNTAPPED DEMAND AND INDIA

S DOMINANT POSITION

S DOMINANT POSITION

SUPPORT THESE ASPIRATIONS

SUPPORT THESE ASPIRATIONS

US$ billion, 2005

* Includes addressable markets in currently offshoring industries ** Includes Philippines, China, Russia, Eastern Europe, Ireland, Mexico

Source: McKinsey Outsourcing & Offshoring practice; McKinsey Global Institute; Gartner 2005 database; IDC; NASSCOM Strategic Review 2005 Significant untapped demand for offshoring

Significant untapped demand for offshoring IndiaIndia’’s current dominant positions current dominant position

Other offshore locations*

Other offshore locations*

India

India

India

India’’ss

IT & BPO industries can

IT & BPO industries can

achieve US$60 billion in

achieve US$60 billion in

exports by 2010 exports by 2010 Current size Current size Total demand Total demand 9X 9X 18 18 150 150--180180 Current size Current size Total demand Total demand 12X 12X 11 11 120 120--150150

54

46

65

35

IT IT BPO BPO 100%=18 100%=18 100%=11 100%=11 IT IT BPO* BPO*
(10)

The Legal Framework

The Legal Framework

(11)

The US and the UK Approaches for Data Protection and Privacy

The US and the UK Approaches for Data Protection and Privacy

Health Insurance Portability and Accountability Act (HIPPA) – Health Care Sector

• Gramm-Leach-Bliley Act (GLBA) –

Financial Service Sector

• Right to Financial Privacy Act

(RFPA) – Personal Financial Records

• Other Indirect Laws - Computer Fraud and Abuse Act , Electronic Communications Privacy Act, etc.

The UK

The US

The US has sector specific laws both at federal and state levels while the UK has a

single law covering all sectors

Data Protection Act 1998 –

Personal data

Regulation of Investigatory

Powers Act 2000 – Interception of communication

Privacy and Electronic

Communications (EC Directive) Regulations 2003 –

Telecommunications Sector • Others - Computer Misuse Act

1990, Crime and Security Act 2001 and the Freedom of Information Act 2000, etc.

(12)

India

India

s Legal Framework Meets Most Requirements

s Legal Framework Meets Most Requirements

Indian IT Act,

2000

• Section 65 - Tampering with computer source code

• Section 66 - Hacking & computer offences

• Section 43 – Tampering of electronic records

Indian

Copyright Act

• States any person who knowingly makes use of an

illegal copy of computer program shall be punishable.

• Computer programs have copyright protection, but no

patent protection.

Indian Penal

Code

• Section 406 - Punishment for criminal breach of trust

• Section 420 - Cheating and dishonestly inducing

delivery of property

Indian Contract

Act, 1872

Offers following remedies in case of breach of contract:

• Damages

(13)

Proposed Amendments to the IT Act

Proposed Amendments to the IT Act

Changes in definitions and introduction of technology neutrality

Changes in definitions and introduction of technology neutrality

– IntermediaryIntermediary –

– Electronic SignatureElectronic Signature

Section 43A: Liability of companies

Section 43A: Liability of companies

– For not following For not following ‘‘reasonable security practices and proceduresreasonable security practices and procedures’’ –

– Defines Defines ‘‘sensitive personal data or informationsensitive personal data or information’’ –

– RecognisesRecognisesthe role of the role of ‘‘professional bodies and associationsprofessional bodies and associations’’

– UptoUpto RsRs50 million to each person wrongfully affected by the breach50 million to each person wrongfully affected by the breach

Section 66: More specific definition of data crimes

Section 66: More specific definition of data crimes

New offences introduced

New offences introduced

– Cyber stalking (section 66A)Cyber stalking (section 66A) –

– Privacy invasion Privacy invasion –

– Identity theftIdentity theft

Powers to direct interception or decryption (s. 69)

Powers to direct interception or decryption (s. 69)

Identification and protection of Critical Information Infrastruc

Identification and protection of Critical Information Infrastruc

ture (s.70)

ture (s.70)

Clarification of the role and liability of the intermediaries (s

Clarification of the role and liability of the intermediaries (s

. 79)

. 79)

Strengthening of investigation mechanism

Strengthening of investigation mechanism

– Delegation to junior officers (s. 78)Delegation to junior officers (s. 78) –

(14)

Other Government Measures

Other Government Measures

Information Security and Awareness Project

Information Security and Awareness Project

Introduction of information security curriculum at

Introduction of information security curriculum at

B.Tech

B.Tech

. and M. Tech. levels

. and M. Tech. levels

PhD

PhD

programme

programme

for research

for research

Exchange with CMU and other institutes

Exchange with CMU and other institutes

Train system administrators through diploma and certificate cour

Train system administrators through diploma and certificate cour

ses

ses

Information Security Awareness for the end user

Information Security Awareness for the end user

7 Resource

7 Resource

Centres

Centres

and 35 Participating Institute

and 35 Participating Institute

Five year project with $17.5 million outlay

Five year project with $17.5 million outlay

Digital forensics software project

Digital forensics software project

Alternative to disk imaging and analysis software

Alternative to disk imaging and analysis software

Executed by Centre for Development of Advanced Computing, Trivan

Executed by Centre for Development of Advanced Computing, Trivan

drum

drum

Cyber Security Research Centre, Chandigarh

Cyber Security Research Centre, Chandigarh

Partners: Chandigarh, NASSCOM and Punjab Engineering College

Partners: Chandigarh, NASSCOM and Punjab Engineering College

Regional Centre of Excellence

Regional Centre of Excellence

(15)

Trusted Sourcing Initiatives

Trusted Sourcing Initiatives

(16)

About NASSCOM

About NASSCOM

Premier trade body and the chamber of

Premier trade body and the chamber of

commerce of the Indian IT

commerce of the Indian IT--ITES industryITES industry

Global trade body with over 1100 members, of

Global trade body with over 1100 members, of

which nearly ~200 are global companies from

which nearly ~200 are global companies from

the US, UK, EU, Japan and China

the US, UK, EU, Japan and China

Primary objective

Primary objective ––to act as a catalyst for the to act as a catalyst for the growth of the Indian IT

growth of the Indian IT--ITES industry. ITES industry.

Facilitation of trade and business in software

Facilitation of trade and business in software

and services

and services

Encouragement and advancement of research

Encouragement and advancement of research

Propagation of education and employment

Propagation of education and employment

Providing compelling business benefits to

Providing compelling business benefits to

global economies by global sourcing

global economies by global sourcing

Partner with the Central and State

Partner with the Central and State

Governments in formulating IT policies and

Governments in formulating IT policies and

legislation

legislation

Partner with global stakeholders for promoting

Partner with global stakeholders for promoting

the industry in global markets

the industry in global markets

Strive for a thought leadership position and

Strive for a thought leadership position and

deliver world

deliver world--class research and strategic class research and strategic

inputs for the industry and its stakeholders.

inputs for the industry and its stakeholders.

Encourage members to uphold world class

Encourage members to uphold world class

quality standards

quality standards

Strive to uphold Intellectual Property Rights of

Strive to uphold Intellectual Property Rights of

its members

its members

Strengthen the brand equity of India as a

Strengthen the brand equity of India as a

premier global sourcing destination

premier global sourcing destination

Expand the quantity and quality of the talent

Expand the quantity and quality of the talent

pool in India

pool in India

Continuous engagement with all member

Continuous engagement with all member

companies and stakeholders to devise

companies and stakeholders to devise

strategies to achieve shared aspirations for

strategies to achieve shared aspirations for

the industry and the country

the industry and the country

NASSCOM is… Strategy

Objective

Vision: To establish India as the 21st century

Vision: To establish India as the 21st century

s software powerhouse

s software powerhouse

and position the country as the global sourcing hub for software

(17)

NASSCOM

NASSCOM

4E Framework for Trusted Sourcing

4E Framework for Trusted Sourcing

Engagement

Engagement

Education

Education

Enactment

Enactment

Enforcement

Enforcement

(18)

The 4-E Framework for Trusted Sourcing

Creation of Global and

National Advisory Boards on Security

ƒDefine the Charters for the

Global and National Advisory Board

Engaging Stakeholders

ƒIdentify Stakeholders and

actively engage them

E1: ENGAGE

Training & Awareness Campaigns

ƒIdentify Audience

ƒEvaluate possible tie-ups

with prospective trainers

ƒDevise training modes &

methodologies

ƒDevelop training modules

ƒConduct Training and

Awareness Sessions

ƒKey institutes to include

information security as a key course

E2: EDUCATE

Legal Framework Strengthening

ƒConduct Gap Analysis in Legal Scenario

ƒMandate Information Security Certification

Regulations & Coalitions Involvement

ƒIdentify and influence regulators in India and

abroad and Identify unique country-specific information security requirements

Information Security Assurance Framework

ƒEstablish the Security Framework maturity

model program

ƒEstablish ASSCOM Seal for InfoSec

Assurance

ƒEstablish Cyber-Cop Award

Instilling Best Practices in Member Companies

ƒInstitute Award for member companies

ƒInfluence Major Insurance Companies

ƒInfluence Government to offer tangible

benefits

E3: ENACT

Public-Private Initiatives

Propagation of The Mumbai Cyber Labs

Concept

E4: ENFORCE Enforcement Procedures

ƒInstitute the NASSCOM

Seal of InfoSec Assurance

ƒPerform Security Audits

and Certifications for members

ƒCreate an enforcement

body under the aegis of NAB

ƒPerform Yearly Review

ƒDevelop Incident

Response Database aka CERT

ƒDevelop a Database of

all IT/ITES employees

The Initial Roadmap

The Initial Roadmap

(19)

NASSCOM

NASSCOM

-

-

4E Framework

4E Framework

Education

Education

Focus on IT companies

Focus on IT companies

secure sourcing

secure sourcing

Research reports

Research reports

Model contracts,

Model contracts,

SLAs

SLAs

, best practices

, best practices

Software Asset Management seminars

Software Asset Management seminars

Educational collateral for law enforcement in India

Educational collateral for law enforcement in India

Two level approach

Two level approach

• Half day seminars for senior police officers to educate on cyberHalf day seminars for senior police officers to educate on cyber--securitysecurity •

• Six day basic training Six day basic training programmeprogrammefor investigate cyber crime for investigate cyber crime

Four Labs at Mumbai, Thane,

Four Labs at Mumbai, Thane,

Pune

Pune

and Bangalore

and Bangalore

Bangalore Lab with the support of

Bangalore Lab with the support of

Canara

Canara

Bank

Bank

Programmes

Programmes

conducted all over India

conducted all over India

Trained 3300+ police officials till July 2007

Trained 3300+ police officials till July 2007

Programmes

Programmes

for prosecutors

for prosecutors

Advanced training topics

Advanced training topics

India Cyber Cop Award 2005

India Cyber Cop Award 2005

Recognise

Recognise

outstanding work in technical investigations

outstanding work in technical investigations

Promote excellence in the emerging area of law enforcement

Promote excellence in the emerging area of law enforcement

(20)

NASSCOM

NASSCOM

-

-

4E Framework

4E Framework

Education

Education

-

-

II

II

Continuous media briefing around security and privacy

Continuous media briefing around security and privacy

Cyber Safety Weeks

Cyber Safety Weeks

– Mass awareness campaign for promoting information security amongMass awareness campaign for promoting information security amongendend--usersusers –

– Mumbai 2003, 2004 and 2005Mumbai 2003, 2004 and 2005 –

– Establish Establish ‘‘capable guardianshipcapable guardianship’’

– The The ‘‘Broken WindowsBroken Windows’’approachapproach –

– Hyderabad CSW: 20Hyderabad CSW: 20--22 July 200622 July 2006

• • 20,000 sq. ft. of publicity20,000 sq. ft. of publicity • • 100 kiosks100 kiosks • • 18 hoardings18 hoardings • • 100 banners100 banners • • 1000 posters1000 posters •

• 5000 students covered5000 students covered •

• 4 million page views of visibility4 million page views of visibility •

• 700,000 eyeballs visibility (for hoarding, kiosks etc)700,000 eyeballs visibility (for hoarding, kiosks etc) •

• 7 sponsors7 sponsors •

• 12 supporting associations12 supporting associations •

• 100,000 e100,000 e--mails sentmails sent •

• 32 speakers32 speakers •

• 4125 man hours of work4125 man hours of work

Information Security Awareness Portal

Information Security Awareness Portal

– www.indiacyberlab.inwww.indiacyberlab.in –

(21)

NASSCOM

NASSCOM

-

-

4E Framework

4E Framework

-

-

Enforcement

Enforcement

Working with members to enact secure practices

Working with members to enact secure practices

– High rate of ISO 27001 adoptionHigh rate of ISO 27001 adoption

• • JapanJapan 22562256 • • UKUK 317317 • • IndiaIndia 301301

Physical security

Physical security

access codes, et al

access codes, et al

Network security

Network security

technological solutions

technological solutions

Information security

Information security

– Employee background checksEmployee background checks –

– No access to internet, cell phones, email, instant messaging, noNo access to internet, cell phones, email, instant messaging, not even paper and penst even paper and pens –

– Stringent customer audits to ensure compliance with GLBA, HIPAA,Stringent customer audits to ensure compliance with GLBA, HIPAA,and other and other regulatory provisions

regulatory provisions

Few cases of infringement

Few cases of infringement

inter

inter

-

-

agency co

agency co

-

-

operation between FBI and CBI

operation between FBI and CBI

cases in court

cases in court

Partnership with Business Software Alliance, toll

Partnership with Business Software Alliance, toll

-

-

free numbers to report software

free numbers to report software

piracy

piracy

National Registry of IT & BPO employees

National Registry of IT & BPO employees

Self Regulatory Organization: to educate and enforce

(22)

National Skills Registry

National Skills Registry

Database of pre

Database of pre

-

-

verified resumes.

verified resumes.

– Data ownership with IT Professional.Data ownership with IT Professional. –

– Finger Print for unique identification.Finger Print for unique identification. –

– Operated by NSDL, which is a capable database companyOperated by NSDL, which is a capable database company

Web based secure interface

Web based secure interface

Subscriber

Subscriber

– Image EnhancementImage Enhancement –

– Pool of countryPool of country’’s IT Skillss IT Skills –

– Safer & Efficient RecruitmentSafer & Efficient Recruitment –

– Standard Verification ProcessStandard Verification Process –

– Cost & Time SavingCost & Time Saving

IT Professionals

IT Professionals

– Reduced Recruitment TimeReduced Recruitment Time –

– Transparent Verification ProcessTransparent Verification Process

Current Status (Updated)

Current Status (Updated)

– 40 large employers have pledged to recruit through NSR40 large employers have pledged to recruit through NSR –

– Enrolments till beginning of June 2007: 122 thousand Enrolments till beginning of June 2007: 122 thousand –

(23)

Data Security Council of India

Data Security Council of India

Self

Self

-

-

Regulation

Regulation

– Industry best position to regulate itselfIndustry best position to regulate itself –

– Greater knowledge of data privacy and security standardsGreater knowledge of data privacy and security standards –

– Better understanding of the commercial issues involvedBetter understanding of the commercial issues involved

Adoption of best global practices:

Adoption of best global practices:

– Drawing on the experience in other countriesDrawing on the experience in other countries –

– Different variants for different verticalsDifferent variants for different verticals –

– Increasing maturity levelsIncreasing maturity levels

Independent Oversight:

Independent Oversight:

– Board of Directors a balanced mix of industry, government and inBoard of Directors a balanced mix of industry, government and independent directors.dependent directors.

Focused Mission:

Focused Mission:

– Establish itself as a body catering to the entire crossEstablish itself as a body catering to the entire cross--section of the industrysection of the industry –

– Promote a culture of privacy and security through education and Promote a culture of privacy and security through education and outreach. outreach.

– EducationEducation--led, enforcementled, enforcement--backedbacked

Enforcement Mechanism:

Enforcement Mechanism:

– Voluntary complianceVoluntary compliance –

– Graduated penalties, ranging from warning, corrective action, diGraduated penalties, ranging from warning, corrective action, disgorgement, fine, sgorgement, fine, suspension or expulsion from membership

suspension or expulsion from membership

– Specifically, pursuant to wellSpecifically, pursuant to well--defined procedures, DSCI might refer certain egregious defined procedures, DSCI might refer certain egregious

violations to the government for its review.

(24)

More details

More details

Other features

Other features

Whistle

Whistle

-

-

blower mechanisms

blower mechanisms

Commission/promote research on security issue

Commission/promote research on security issue

Benefits:

Benefits:

Help assuage the growing concerns internationally regarding how

Help assuage the growing concerns internationally regarding how

personal

personal

information is safeguarded in India

information is safeguarded in India

Help the Indian ITES

Help the Indian ITES

-

-

BPO industry distinguish itself and meet competition

BPO industry distinguish itself and meet competition

from a growing number of regions around the globe. It

from a growing number of regions around the globe. It

ll provide a

ll provide a

competitive advantage vis

competitive advantage vis

-

-

à

à

-

-

vis alternate destinations for outsourcing

vis alternate destinations for outsourcing

Key objective: Raise the floor when it comes to strengthening In

Key objective: Raise the floor when it comes to strengthening In

dia as a

dia as a

secure outsourcing destination, across the IT Industry

(25)

Thanks.

Thanks.

Nandkumar Saravade

Nandkumar Saravade

saravade@nasscom.org

saravade@nasscom.org

References

Related documents

rozsah transakcí se sobě odpovídajícími podniky, apod. Reálný trh umožňuje ocenit tržní hodnotou alespoň omezenou část akciového kapitálu. Z tohoto důvodu je za

And nothing triumphs over poor and inconsistent sound better than a total audio solution from the world leader in audio and electronic products, Telex Communications and its brands:

While earlier solutions for high speed LU factorization required the use of multiple CPUs, scheduling overhead, and communication time typically encountered in parallel

But a series of query examples will show that the modelling approach using sets leads to VDM-SL expressions that are semantically quite similar to SQL statements, and so the

By considering the 2018 boycott in Morocco, this paper seeks to explore these questions: (1) do social media users exploit Facebook, YouTube, Twitter and Instagram for social

In the case of the Interlake Formation at the Esterhazy site, the lower aquifer permeabilities observed as well as the substantially higher overall injection rates resulted in

• E-Learning: INP065 Nurse Managing Orders • E-Learning: INP067 Nurse Reviewing the chart • E- Learning: INP069 Nurse Specimen collection • E-Learning: INP072 Use

Ques: Data analysis vs machine learning vs statistics vs theory of algorithms vs artificial intelligence (vs scientific computing vs?. computational mathematics vs