MIT Presentation
MIT Presentation
MIT Presentation
Presentation On
Vulnerabilities : -
Directly or indirectly related to the development and utilization of new
technologies.
Vulnerabilities are the flaws, loophole or backdoors used by attackers to
manipulate or take control of the system.
There are multiple segments/services inherent in the architecture of any
Critical Information Infrastructure which are under continuous threat
from variously motivated malicious hackers/attackers Infrastructure like
SCADA, VPN services, e-mail, web services, network services etc.
In the case of CII, the attackers are more than likely to have strong state
support from any number of adversaries.
Issues and Challenges
Action Needed: -
Development of mechanisms to facilitate Identification of CII.
Protection of CII through a risk management approach.
compliance of NCIIPC policies, guidelines, advisories/ alerts etc. by CIIs.
Develop capabilities for real time warning system .
Lead and coordinate national programs and policies.
Establish national and international linkages .
Promote Indigenous Research and Development (R&D).
Issues and Challenges
Action Needed: -
Develop mechanisms to facilitate sharing of information on
Information Security breaches, incidents, cyber-attacks, espionage etc .
Facilitate thematic workshops and Information Security Awareness and
Training Programme through PPP.
Facilitate capacity building towards creation of highly skilled
manpower.
Establish Sectoral CERTs to deal with critical sector specific issues.
Issues and Challenges