wordpress blog stats
Connect with us

Hi, what are you looking for?

Cybersecurity implications for the post COVID-19 era

cyber crime

By Subhodeep Jash

As COVID-19 reshapes social interactions and transforms our work environments to more digital settings, the threat landscape on the cyberspace is also evolving with new vulnerabilities emerging. Whether its cyber criminals looking to sell the Statue of Unity for $4 billion or a fake UPI handle that dupes monetary donations to the PM CARES Fund, policy efforts to “flatten the curve” on cyber crime leave a lot to be desired. Security flaws in platforms such as the videoconferencing tool, Zoom highlight the need for adequate cybersecurity preparedness, both amid enterprises and individuals.

With the emergence of a new wave of internet users from rural and semi-urban India, digital financial inclusion initiatives are most susceptible to data breaches that involve consumer frauds such as phishing and skimming. This is aptly highlighted in a recent Netflix web series ‘Jamtara that delves into a phishing cottage industry set in Jharkhand wherein fake callers on the pretence of calling on behalf of a bank seek to gain access to private financial information.

The Governance Fault Line

Addressing some of the fault lines require a coordinated and robust institutional framework that may be drawn up with the upcoming National Cyber Security Strategy 2020, especially as the earlier 2013 policy had several implementation gaps.

The Indian Computer Emergency Response Team, known as CERT-In, is the nodal agency on responding to cybersecurity incidents and publishes annual reports that tracks various forms of malicious cyber incidents. The regulatory capacity of CERT-In has been questioned for the quality of its advisories or its periodic reports, and for its interaction with other sectoral regulators such as RBI or SEBI.

Advertisement. Scroll to continue reading.

It hasn’t been evident, from the perspective of the security community, that CERT-In has a proactive channel of communication with its counterpart on protection of the critical information sectors — the National Critical Information Infrastructure Protection Centre (NCIIPC). In a recent parliamentary disclosure, the Ministry of Finance clarified that the securities regulator SEBI had not furnished an furnished any reports regarding cyber attacks on security markets during the last few years.

The new Cyber Security Strategy 2020 must place CERT-In on a stronger footing in order to equip a more contemporary agency that is dynamic and consistent in its response to cyber security threats, especially in matters concerning proactive security. The data breach reporting mechanisms can be a supporting bulwark for CERT-In that can be addressed via appropriate legal frameworks, in the data protection law and allied Information Technology Act provisions.

Healthcare as Critical Information Infrastructure

The government has identified six sectors as critical information infrastructure: transport, power and energy, telecom, government, financial services, and strategic and public enterprises. Typically, those infrastructure areas that are highly significant in ensuring important social functions, be it the power grid or our payment systems, are accorded this status. The failure or damage to such systems can have severe effects on the health, security and socio-economic well-being of a population.

As India recognises the role of leveraging technology in improving critical processes for healthcare delivery, especially in areas such as telemedicine, policymakers have begun coming to terms with the importance of governing data security in the healthcare sector. The Health Ministry in 2018 had proposed a draft Digital Information Security in Healthcare Act, which is still to be firmed up. Given the imperative of data networks woven around our hospitals, testing labs, scanning centers, we need to ensure that healthcare is designated as a critical information sector to ensure adequate business continuity and mandating breach notifications.

Silos of public private collaboration

Several essential parts of our critical information infrastructure, whether they be in banking, energy or telecom, are owned by the private sector. The WannaCry and NotPetya incidents showed that attacks targeting the digital elements of utility infrastructure such as power plants, assets such as banks or hospitals servers, and devices including mobiles and personal computers, have damaged critical national assets.

Be it a cloud computing architecture or a VPN server, the owners and operators of critical infrastructure need to have a stratified information sharing mechanism with the government given the varying degrees of maturity in security practices among different entities. The role of NCIIPC, which was set up with a fairly specific mandate, becomes imperative here, with enforcing supervision over the best practices and guidelines issued for these critical sectors.

Advertisement. Scroll to continue reading.

The scope of this information sharing must be wide, encompassing threat information, incident reporting, best practices, vulnerability or audit notes along with other areas of coordination. Even, in the United States, a recently released Cyberspace Solarium Commission report observes that public and private sector cybersecurity remains inadequate thus far.

In India, the remit of public private collaboration has been fairly limited to just the context of education and awareness programs, such as the Cyber Shikshaa project for skilling women engineering graduates. This must be expanded towards creating self-governed coordinating sector councils known as Information Sharing and Analysis Centers (ISACs) that facilitate early warning systems and crisis management, not just within these sectors, but as cross-sectoral coordination.

Digital Immunity for the Future

The synapse between the COVID-19 pandemic and cybersecurity imperatives can be addressed with a call to action that the new Cyber Security Strategy on the anvil can address. New red lines that have emerged only draws to us the reality that it isn’t possible to hermetically seal our societies or the networks. The new policy must be in sync with these modern realities and look to adapt to future disruptions in reinvigorating trust and boosting our digital immunity.

 *

Subhodeep Jash is a policy professional working with a US-based business advisory firm. He has previously worked at the Ministry of Commerce and has been a Fellow at the think tank, New America. The views expressed herein are in a personal capacity.

Advertisement. Scroll to continue reading.
Written By

MediaNama’s mission is to help build a digital ecosystem which is open, fair, global and competitive.

Views

News

Is it safe to consider all "publicly available data" as public?

News

PhonePe launched an e-commerce buyer app for ONDC called Pincode. We, however, believe that it should also launch a seller app.

News

Amazon announced that it will integrate its logistics network and SmartCommerce services with the Open Network for Digital Commerce (ONDC).

News

India's smartphone operating system BharOS has received much buzz in the media lately, but does it really merit this attention?

News

After using the Mapples app as his default navigation app for a week, Sarvesh draws a comparison between Google Maps and Mapples

You May Also Like

News

Google has released a Google Travel Trends Report which states that branded budget hotel search queries grew 179% year over year (YOY) in India, in...

Advert

135 job openings in over 60 companies are listed at our free Digital and Mobile Job Board: If you’re looking for a job, or...

News

By Aroon Deep and Aditya Chunduru You’re reading it here first: Twitter has complied with government requests to censor 52 tweets that mostly criticised...

News

Rajesh Kumar* doesn’t have many enemies in life. But, Uber, for which he drives a cab everyday, is starting to look like one, he...

MediaNama is the premier source of information and analysis on Technology Policy in India. More about MediaNama, and contact information, here.

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ

Subscribe to our daily newsletter
Name:*
Your email address:*
*
Please enter all required fields Click to hide
Correct invalid entries Click to hide

© 2008-2021 Mixed Bag Media Pvt. Ltd. Developed By PixelVJ