E-Security Background IT Infrastructure in Sikkim Current Status of Cyber Security& Cyber Crime in SIkkimCurrent Status of Cyber Security& Cyber Crime.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
Khammar Mrabit Director Office of Nuclear Security
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
National ICT Policy 2009 A Case Study of Policy Design & Implementation SHAMSUZZOHA (MEP12216)
EForms and Service Delivery through State Portal & SSDG Kavita Bhatia.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
SEPARATION OF DUTIES CONFLICT OF INTEREST POTENTIAL FRAUD 1.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
International Cloud Symposium 2011 October DITTON MANOR Rajagopalan CDAC CLOUD Initiative 1.
1 July 08, 2010 Information Security Officer Meeting.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
First Practice - Information Security Management System Implementation and ISO Certification.
OU INFORMATION SECURITY & RISK MANAGEMENT ISA – February 4, 2015.
Information Security Training for Management Complying with the HIPAA Security Law.
Engaging Contractors in the Environmental Management System (EMS) Department of Energy EMS Workshop: Implementation, Lessons Learned, and Best Practices.
North Shore Schools OUR CHILDREN’S HEALTH AND SAFETY COME FIRST!
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Best Practices: Financial Resource Management February 2011.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
PRESENTATION ON THE IMPLEMENTATION OF THE OLDER PERSONS ACT, FEBRUARY
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
EForms Project Details and Implementation Shri Shankar Aggarwal, Joint Secretary, National eGovernance Plan.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
HIS Impact Story: Strengthening national HIS through multi-sectoral coordination and collaboration Crispinita A. Valdez Director Information Management.
1 Information and communication rules for EU Cohesion policy INFORM meeting, 7-8 December 2011 Directorate General for Regional Policy, Communication.
CIVILIAN SECRETARIAT FOR POLICE STATUS REPORT ON IMPLEMENTATION OF THE CIVILIAN SECRETARIAT FOR POLICE SERVICE ACT 2 OF 2011 PORTFOLIO COMMITTEE ON POLICE.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
INTERTANKO LATIN AMERICAN PANEL MARITIME SECURITY: LATEST DEVELOPMENTS LATEST DEVELOPMENTS AT IMO JOSEPH J. ANGELO DIRECTOR, REGULATORY AFFAIRS AND THE.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
The implementation programme for the 2008 SNA and supporting statistics UNECE special session on National Accounts for economies in transition Geneva,
Information Security Awareness and Training Department of Commerce NOAA WebShop Conference November 13, 2007.
Paul Kelly Facility Research Compliance Officer for the Ralph H. Johnson VA Medical Center.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Legacy Report of Select Committee on Finance By: Zolani Rento Date: 09 July 2014.
31 October The African Policing Civilian Oversight Forum (APCOF) is a network of state and civil society African practitioners active in policing.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
06 Sep 2006 Cyber security Cyber Security for Protection of Critical Information Infrastructure B J Srinath Director & Scientist ‘ F ’, CERT-In Department.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
To Learn & Develop Christine Johnson Lead Nurse Safeguarding (named nurse) - STFT Health Visitors Roles and Responsibilities in Domestic Abuse.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Road Safety Auditors – The EU Directive and other developments Libby Sands MSc, MIHT, FSoRSA Technical Director.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unify/Fusion Marketing Campaign 1. Fusion Upgrade Communications 2.
Information Security Officer Meeting
Progress on Implementation of Transparency Requirements of TBT Agreement in Uganda EAC Public-Private Sector Workshop on WTO Transparency Requirements.
National Workshop on Cyber Crimes and Cyber Laws
Cyber Defence Intelligence
Training and Outreach Materials
FAOSD Programme Administrative and Programme Participation Terms & Conditions Roles and Responsibilities.
Progress on Implementation of Transparency Requirements of TBT Agreement in Uganda EAC Public-Private Sector Workshop on WTO Transparency Requirements.
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Hungarian Integrity Management Development
Cyber Security professions Overview
High level seminar on the implementation of the
Challenges and Successes in the Zambian ICT Security Sector
Role of State Audit Bureau of Kuwait in promoting and audit of IT Security  
Thames Valley Chamber / Claire Logic
Presentation transcript:

E-Security Background IT Infrastructure in Sikkim Current Status of Cyber Security& Cyber Crime in SIkkimCurrent Status of Cyber Security& Cyber Crime in SIkkim Strategic Approach undertaken by IT Department, Govt. of SikkimStrategic Approach undertaken by IT Department, Govt. of Sikkim Future Plan of ActionFuture Plan of Action

Background There is no doubt that e-Governance will making life easier for the citizens. However this involves putting important and critical information on the cyber space and exposes the IT infrastructure to hackers But this not make us complacent. With the State Data Centre (SDC) has been operationalised, the State Wide Area Network (SWAN) is functional and preliminary work on State Service Delivery Gateway (SSDG) also taking place, a lot of information is going to be available in cyber space. We have already started taking preemptive measures to minimize the incidence of cyber attacks on our IT infrastructure.

IT Infrastructure in Sikkim State Data Centre (SDC) State Wide Area Network (SWAN) Common Service Centers (CSC) –45 CSCs all across state –Basically an internet café

Current Status of Cyber Security& Cyber Crime in SIkkim Fortunately Sikkim has not had many cases of cyber crime. Till date a total of 2 (two) government website have been reported to be hacked in Sikkim. As of now the Cyber Security threats are related to defacement of websites. Only 1 case has been registered under IT Amendment Act 2008, 66A, 67 with the Crime branch- cyber cell. The case relates to hacking of the facebook account of complainant, a resident of Gangtok. The hacker (unknown) hacked his facebook account and posted obscene pictures and abusive languages to all the friends listed in his account. The motive judged was to defame the complainant. The case has been registered with the Cyber cell, Crime branch, Police HQ.

Strategic Approach undertaken by IT Department, Govt. of Sikkim 1.Formulation of Cyber Security Policy 2.Notification of Cyber Café Rules 3.Capacity Building & Training 4.Awareness & Advocacy 5.Coordination with Govt. of India for Technological Support

CYBER SECURITY POLICY As per the guidelines of the Government of India, the State Government has formulated the Cyber Security Policy The Cyber Security Policy will define a set of minimum information security requirements that shall be met by all the departments; formation of Cyber Security Task Force Committee and each department is headed by Information Security Officer This includes a physical visit by the Cyber Task force to all Departments to inspect the computer systems and check for vulnerability.

CYBER CAFÉ RULES The department has notified the Cyber Café Rules (2009) which aims to regulate, govern and control the use of the Cyber Café centers in the State. The rules impose a social responsibility on Cyber Café owners and authorizes them to keep a record of the usage of the cyber café in a log book. Users are required to show a proof of identity before they can use the facility in the cyber café. Further it empowers the Cyber Cell of the Crime Branch to inspect the Cyber Cafes and ensure that they are complying with the provisions of these rules. Recently a team from Cyber Cell, Crime Branch visited all the cyber cafes in Gangtok to ensure the compliance of the rules. These measures it is hoped will go a long way in preventing the use of Cyber cafes by unsocial and anti-national elements.

WORKSHOPS AND TRAININGS ON CYBER SECURITY 1.Conducted a workshop for Cyber Café Owners in the year 2006 related to the security issues. 2.CERT-In conducted a workshop on Cyber Security during SIKITEX-2009 for Cyber Café owners and public. 3.Information Technology, Government of Sikkim conducted a workshop on Cyber Café Rules in association with the Crime Branch, Sikkim Police during IT Exhibition and Conference SIKITEX 2010 at Gangtok which was attended by the Cyber Café owners and the Police officers. 4.A Seminar related to Hacking was organized in the Department of IT, Government of Sikkim by the IL&FS 5.Three candidates were sponsored for attending a six months training on Ethical Hacking and thereafter a three days workshop at Guwahati. Their services are requisitioned for Cyber Security whenever the requirement arises.

Other Important Activities STANDING COMMITTEE ON INFORMATION TECHNOLOGY –The main discussion during the Standing Committee on Information Technology held from 4 th July to 7 th July 2011 at Gangtok on the subject of Cyber Crime, Cyber Security and Right to Privacy. Awareness in the Investing Agencies –The officers of the Investigating agencies have been attending various programmes and workshops organized by the Government of India related to Cyber Security and related issues. As a result the level of awareness is fairly good.

TECHNICAL SUPPORT FROM GOVERNMENT OF INDIA CERT-In sends us advisories monthly alerting the department of the attacks taken place and measures to secure web applications and web servers. CERT-In has been engaged for conducting seminars and workshops during Annual IT Exhibition and conference SIKITEX at Gangtok, organized by the Department of IT, Government of Sikkim. Participants in the workshop have been the general public, Cyber Café owners and the state government employees including the Police.

FUTURE PLAN OF ACTION Proposal to conduct many more short courses on Cyber Security for all Government employees & Internet Safety courses for School Students Mock drills planned Sikkim Police will be establishing a Cyber Forensic Lab for the State shortly. ISO Certification for the State Data Centre Strict Implementation of IPv6 as per Government of India Guidelines.

Thank you T. Samdup Jt. Director, IT Department, Government of Sikkim (mobile)