Cyber security initiatives and projects in India are very less in numbers. Even if some projects have been proposed, they have remained on papers only.
The list is long but sufficient is to talk about the projects like National Critical Information Infrastructure Protection Centre (NCIPC) of India, National Cyber Coordination Centre (NCCC) of India, Tri Service Cyber Command for Armed Forces of India, Cyber Attacks Crisis Management Plan Of India, etc. None of them are “Coordinating” with each other and all of them are operating in different and distinct spheres. Recently, the National Technical Research Organization (NTRO) was entrusted with the responsibility to protect the critical ICT infrastructures of India.
India has already launched esurveillance projects like National Intelligence Grid (NATGRID), Central Monitoring System (CMS), Internet Spy System Network and Traffic Analysis System (NETRA) of India, etc. None of them are governed by any Legal Framework and none of them are under Parliamentary Scrutiny. Thus, these projects are violate of Civil Liberties Protection in Cyberspace and provisions of National Informatics Centre (NIC) has been formed which provides network backbone Manages IT services, E GOV initiatives to central and state governments.We should have backup of important data. Our devices should be protected by passwords and there should be restricted access to sensitive data on our devices. And above all, we should aspire for more computer literacy to understand the safety issues related to our cyber space. At the same time we need to utilise the specialisation of private sector in the field of cyber security and government should promote more PPP projects for the national cyber space.
Learning from other countries
What is China’s Great Firewall?
The GF is built over the years by China to regulate the Internet content and restrict access to all the banned contents including access to global social media sites like Twitter, Facebook, Youtube and Google.
What necessitated this move?
There are 700 million Internet users in China, more than half of its population, and Internet news circulated by social media platforms like Weibo has become more popular than the state-controlled mainstream media making the ruling Communist Party of China (CPC) to beef up controls on the Internet to ensure that its monopoly over power is not challenged.
While VPNs are used widely by diplomatic and foreign media in China to access worldwide Internet, the special applications designed to beat the GF being marketed by several Internet firms abroad are becoming popular among Chinese too.
Also, China pitches for “cyber sovereignty” moving away from global Internet.
quantum satellite to transmit potentially unhackable data
In Aug 2017, China has demonstrated a world first by sending data over long distances using satellites which is potentially unhackable, laying the basis for next generation encryption based on so-called quantum cryptography.
- Last year, China launched a quantum satellite into space. Using this satellite, Chinese researchers at the Quantum Experiments at Space Scale (QUESS) project, were now able to transmit secret messages from space to Earth at a further distance than ever before.
quantum key distribution (QKD)
The technology is called quantum key distribution (QKD). Typical encryption relies on traditional mathematics and while for now it is more or less adequate and safe from hacking, the development of quantum computing threatens that. Quantum computing refers to a new era of faster and more powerful computers, and the theory goes that they would be able to break current levels of encryption. QKD works by using photons — the particles which transmit light — to transfer data.
QKD allows two distant users, who do not share a long secret key initially, to produce a common, random string of secret bits, called a secret key. Using the one-time pad encryption this key is proven to be secure to encrypt and decrypt a message, which can then be transmitted over a standard communication channel.
Significance of this technology:
- The encryption is “unbreakable” and that’s mainly because of the way data is carried via the photon. A photon cannot be perfectly copied and any attempt to measure it will disturb it. This means that a person trying to intercept the data will leave a trace.
- Any eavesdropper on the quantum channel attempting to gain information of the key will inevitably introduce disturbance to the system, and can be detected by the communicating users.
- The implications could be huge for cybersecurity, making businesses safer, but also making it more difficult for governments to hack into communication.