secureit 2013 event report

Upload: eletsonline

Post on 04-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 SecureIT 2013 Event Report

    1/8

    EVENT SecureIT 2013

    58 egov / egov.eletsonline.com / April 2013

    Te 4thSecureI 2013, the National Conerence on IC in Public Saety, Security and Disaster Management, took place at Te Oberoi,New Delhi, on March 8, 2013. Te conerence was presented by eGov Magazine and jointly organised by Elets echnomedia Pvt Ltd andCentre or Science, Development and Media Studies (CSDMS).

    Te SecureI 2013 saw healthy debate on new technology applications and services that are already being or will be deployed in utureto improve national security and moderate the afermath o natural and manmade disasters. Tere were discussions on critical issuessuch as threat o cyber terrorism, data security, security against malware and use o IC in border security.

    National Security is a vast subject, but the SecureI 2013 did manage to bring to light some o the most innovative ideas or nationalsecurity and effective disaster management.

    Developing a road map for NationalSecurity and Disaster Management

    EVENT SecureIT 2013

    58 egov / egov.eletsonline.com / April 2013

  • 8/14/2019 SecureIT 2013 Event Report

    2/8

    SecureIT 2013 EVENT

    59April 2013 / egov.eletsonline.com/ egov

    Te concept o state has originated rom security because people want tohave security. In due course o time that concept became the concept ostate and kingdom. Tere are three type o security physical security,security in the financial wealth and the intellectual property.

    In physical security each and every person should be well protected

    against all kinds o problems and aggression. Secondly, there is the aspecto security in the field o finances; this means that each and every personshould be able to secure his or her wealth, whether it is in digital ormor in physical orm. And the intellectual property. We have to ensurethat intellectual property is also secured. In all these three areas IC canplay a very important role. We got to create large number o awarenessamong people regarding cyber security.

    I we want to grow, the citizens o that society must have the sense osecurity. oday IC is playing a vital role in creation o security systemsbeing used around the world. We have to try to come with a mechanismthat will ensure that all human beings are secured.

    In case o terrorism and anti-social elements, we can make use o digi-

    tal cameras, we can make use o UAVs. In all these systems IC can playa very very important role. Te MHA and lot o other departments andorganisations are working on this area and i we can create a collaborativeplatorm where academia, industry, bureaucracy and the implementingagencies get together, we may find solutions to many o these problems.

    Te nature o external threat has changed over the years. Tesecurity threat due to cyber aspects have become ar moreimportant as compared to the physical aspects. We have to takethe new technological developments into account and accordinglyorumate our strategies.

    I think there is need or much greater awareness, consciousnessand preparedness in our security ramework. Tis is true on aglobal scale. Governments are starting to become aware o thethreats that emanate rom cyber verticals. In order to saeguard ournational interests we have to prepare ourselves ully or meetingnew challenges in the cyberspace.

    I think there is need or much greater awareness, consciousness

    and preparedness at all levels at the operational level, strategiclevel and policy level. Tere needs to be awareness about theimplications o cyber security, how it is transorming the nature owarare, the nature o threats internal and external.

    In February 2013, the European Union issued ComprehensiveNew Cyber Security Directives, which mandate all its membercountries to put in place new and comprehensive cyber securitymeasures. India too needs to update its systems or meeting thecyber security threats.

    Shankar Agarwal

    Additional secretary, Ministry of Defence,

    Government of India

    Rajiv Gauba

    Additional Secretary, DeitY, Ministry of

    Communications & IT, Government of India

  • 8/14/2019 SecureIT 2013 Event Report

    3/8

    EVENT SecureIT 2013

    60 egov / egov.eletsonline.com / April 2013

    e-Governance is

    All about Inclusive

    Growth????

    When you monitor everybody, you and me are also getting monitored

    and then we come to the privacy issues. We come to the question of

    who is going to monitor the people who are monitoring us? Because

    so long as the crooks are doing it, we have the police to sort them out.

    And when look at privacy issues I think these issues are of very serious

    concern. It involves human rights.

    Maj Gen Dhruv C Katoch,SM, VSM (Retd), Director, Centre for

    Land Warfare Studies (CLAWS)

    By 2001 and 2002 we found that most of the crimi-

    nal elements and most of the terrorists are making

    use of the Internet, which we could not follow at

    that point of time. Technological preparedness can

    do more for securing the nation than our physicalpresence at the borders. We have now started

    taking a serious look at the issues of cyber security

    for securing the nation on this new frontier.

    ArunChaudhar

    y

    DirectorGenera

    l,

    SashastraSeem

    aBal

    Dr Ashwini Kumar Sharma

    Managing Director, NIELIT

    Cyber-crimes are new class of

    crimes. The government of India is

    planning that services have to be

    delivered at the doorstep of the citi-

    zens. It has to be ensured that it is

    done in a transparent way. Now we

    have to go for a system where we

    can go for periodic or non-periodic

    survey of making a system secure.

    Alok Tripathi

    Joint-Director, NIELIT

    Capacity building in IT security

    and cyber crime and forensic is

    quite different from the traditional

    IT environment. For traditional IT

    environment, we need IT infra-

    structure, we require people to be

    trained, we require software and

    tools and then the trainer has to

    train the people.

    A K Sharma

    Director, Delhi Fire Service

    Saving life in a blazing fire situa-

    tion is a tedious task. Technology

    can make the work of firefighters

    much safer. Fire services must

    utilise the latest technology in the

    field. GPS and GIS can be put effec-

    tively in our day-to-day activities.

  • 8/14/2019 SecureIT 2013 Event Report

    4/8

    SecureIT 2013 EVENT

    61April 2013 / egov.eletsonline.com/ egov

    We have very regular dialogue with the homeland security department.

    Ministry of Home Affairs is the nodal agency for dialogue on various

    aspects of airport security, counter terrorism or border management. It

    is happening regularly between India and Washington and we learn lot

    of things from them. We learn about how systemically they have made

    changes in their processes, all this is very helpful to us.

    Loknath Behra,Inspector General of Police, National

    Investigating Agency

    Security is never perfect. The matter is how do we

    secure our things with available technologies. There

    will always be a next generation technology, more

    powerful, more costly. Privacy and security comes

    at the cost of the other. These are the huge chal-lenges that we must address in the coming years.

    DrGovind

    SeniorDirector,

    DeitY

    ,

    GovernmentofIndiaand

    CEO

    ,NationalIn

    ternet

    ExchangeofInd

    ia(NIXI)

    Dr Hanuman Prasad Shukla

    Director, National Institute ofElectronics and Information

    Technology (NIELIT)-Gorakhpur

    We need to implement innovative

    strategies for safeguard the nation.

    We have to out-think the attacker

    and predict his next step.

    Maj Gen (Dr) J K Bansal

    Member, National DisasterManagement Authority

    Disaster management definitely

    needs technology. Whatever

    technology we develop, it should

    be used and implemented. First

    and foremost, technology should

    be made available to all those

    who are involved in disaster

    managemet.

    Col KPM Das

    Vice President, National Secu-rity Solutions, Cisco Systems

    The proposition here is that while

    the systems are getting deployed,

    there should be an underlying

    assurance that all the security

    related systems are being imple-

    mented. The gaps in the network

    level should not be exploited by

    criminals and aliens.

  • 8/14/2019 SecureIT 2013 Event Report

    5/8

    EVENT SecureIT 2013

    62 egov / egov.eletsonline.com / April 2013

    For tidal observation we have got 125-year old data. In most of the

    sea ports there is tidal observatory. These are online transmitted to a

    national data centre and integrated with the national GPS data centre

    so that the locations and data are located in real time and it is available

    to all user groups in real time.

    Major General Ramesh Padhi

    Military Survey (MoGSGS)

    The whole idea of passport seva project is people

    centric. It is service oriented project. This has

    set a high benchmark for the country to emulate

    in terms of swift project execution. It is a truly

    universal and global project. It can happen in

    India or Guatemala, where we have our embassy

    or consulate, you will serviced through the same

    application and same portal. The project has thus,

    global footprint.

    MukteshKPardeshiJoint

    Secretary(PSP)

    &Chief

    PassportOfficer,Ministry

    ofExternalAffairs

    ,Govern-

    mentofIndia

    M Moni

    Deputy Director General ,National Informatics Center,

    Government of India

    National animal disease reporting

    system and the other one is national

    database on fishing vessels. There

    are 200,000 fishing vessels which are

    operational and this database is being

    used by Navy, coast guards, marine

    police and is being used by all organisa-

    tion associated with marine fishing.

    Lt General Rajesh Pant

    VSM, Commandant, MilitaryCollege of Telecommunication

    Engineering

    The three issues of concern for the

    future of information security profes-

    sional the first one is a convergence

    of the electronic warfare and cyber

    security. Second aspect is related to

    embedded malware. And the third one

    is insider attack, or the man in the

    middle becoming a vehicle for attack.

    Dr Rajendra Kumar

    Joint Secretary, DeitY,Government of India

    Now that we have multiple serviceproviders, vendors, implementers,

    we are grappling with major securityrelated issues. Different vendors may

    enter at different points of time andthey may follow different procedures,

    which may be relevant at that pointof time, but with passage of time they

    lose relevance. These proceduresneed to be changed and advanced.

  • 8/14/2019 SecureIT 2013 Event Report

    6/8

    SecureIT 2013 EVENT

    63April 2013 / egov.eletsonline.com/ egov

    We cannot say that we can eliminate threat or breaches. These things

    will always be there no matter how secure we become. But we have to

    see that the breach, which has been done in any organization cannot

    harm the organisation.

    Ruchin Kumar

    Security Evangelist, SafeNet India Pvt Ltd

    Cyberspace does not require a passport, it does

    not have a national boundary. The risk today is

    huge; the consequences of any criminal activity

    can be quite significant and even disastrous. This

    is because the systems are being managed andrun through software soloutions. These software

    solutions can be targetted remotely leading to lot

    of damage.

    RaviSaxena

    AdditionalChief

    Secretary

    ,Department

    ofScience&Tec

    hnology

    ,

    GovernmentofGujarat

    Rajesh Agarwal

    Secretary IT, Government ofMaharashtra

    Mostly we think of cyber security

    as something that is equivalent to

    fighting an external attack, but the

    truth is that the cyber security is

    being fought within the systems.

    Today any database in the country

    is purchaseable, and that is the

    reality.

    Renu Budhiraja

    Sr Director & HOD State DataCentres, e-Governance, DeitY,

    Government of India

    When you talk about e-Governance

    scenario, the security has to be dealt

    end-to-end. It is a big challenge.

    The number of infected computers

    is enormous, 20 lakh plus. That is

    the challenge we need to look and

    address. There is also issue regarding

    implementation of security policies.

    Ram Narain

    Deputy Director General(Security), Department of

    Telecom, Ministry of Communi-

    cation and Information Technol-

    ogy, Government of India

    We have one philosophy and

    principle. The philosophy was that

    let us build in security into the

    system rather than having add-on

    feature into it.

  • 8/14/2019 SecureIT 2013 Event Report

    7/8

    EVENT SecureIT 2013

    64 egov / egov.eletsonline.com / April 2013

    For the last three years, I had been managing Delhi traffic. The traffic

    police is prosecuting around 10,000 people every day and the act,

    which governs traffic enforcement is Motor Vehicle Act 1988 and I think

    it looks ridiculous that every time a traffic offender is caught he is

    caught as a first offender because there is no digitization of facts.

    Satyendra Garg

    Inspector General of Police, Mizoram

    I look at cyber security from three different

    angles one is application security and

    the user, second is system security and the

    third is network security. If we have to have

    secured networks, it is essential we haveend-to-end security. It is essential for each

    user to be fully educated.

    LtGeneralSP

    Kochhar

    AVSM

    ,SM

    ,VSM

    ,Signal

    Officer-in-C

    hief

    &Senior

    ColonelComma

    ndant

    S Suresh Kumar

    Joint Secretary (Centre-State),Ministry of Home Affairs,

    Government of India

    Looking at a country like India, with

    different culture, different milieu,

    If anyone wants to do a project, he also

    has to look at in terms of what is going

    to be the evolving technologies, can you

    do it within three years in a very very

    very close fashion. Any optimism and

    ambition in that process is not called for.

    Subrata Das

    Industry Director, PublicServices, SAP India

    SAP tries to address community

    preparedness, volunteer manage-

    ment and critical area infrastruc-

    ture management.

    Sajan K Paul

    Director Systems Engineer-ing India & SAARC, Juniper

    Networks

    We are doing device tagging, we

    are going beyond IP address. If the

    hacker is coming from website, we

    can actually inject (even with his

    privacy settings on) around 20 plus

    cookies into his browser and then

    track him from other areas.

  • 8/14/2019 SecureIT 2013 Event Report

    8/8

    SecureIT 2013 EVENT

    65April 2013 / egov.eletsonline.com/ egov

    V L Kantha Rao

    President & CEO,

    National e-Governance

    Division (NeGD), DeitY,

    Government of India

    We have lot of infrastruc-

    ture and applications in

    the e-governance domain.

    We have realised that

    the measures regarding

    the cyber security in the

    egovernance domain is

    piecemeal.

    Vikas Yadav

    Senior Sales Engineer,

    Websense

    We should have modern

    security for modern

    threats. Threat comes

    from outside to inside, we

    should also analyse what

    is going from inside to

    outside.

    BJ Shrinath

    Senior Director, CERT-

    In, DeitY, Governmentof India

    Awareness about cyber

    security can make a lot

    of difference and I think

    thats what w all should

    be doing. Technology in

    one hand gives you the

    freedom but on the other

    hand it immediately takes

    away your freedom that

    you will not realize.

    Puneet Ahuja

    Senior TechnicalConsultant, Juniper

    Networks

    The security threat

    approach has to be two-

    leveled approach one is

    the service provider level

    and second at the enter-

    prise level. Data passing

    from one organization to

    another should be logged

    somewhere.

    We are looking for location finders. Once we get the exact location

    through GPS it is not difficult for us. So technology and innovation

    can make a great difference in disaster response and disaster pre-

    vention. There is a lot to be done in integrating technology with the

    security system.

    PM Nair

    IPS, Director General, National Disaster Response Force

    The statistic shows that insider attacks count

    for as much as 85 percent of computer

    internet related crime. Out of these majority

    of the insiders are priviledged users and

    a large number of attacks occur throughthem. Most of the attacks are due to weak

    authentication. Authentication in the security

    arena is a very big player.

    VibhaAgrawal

    VicePresident,

    GovernmentVertical,

    CATechnologies