Cybersecurity

India’s Increasing Vulnerability Leads to Cyber Sabotage

S Akash

Cyber sabotage of a censorious infrastructure is a new-age threat that has erupted majorly in the last decade. As weird as it may sound, it is a reality that has become so invasive that even the common man has started feeling its heat. It is important to know how our lawmakers are dealing with this threat.

An effort has been made to inspect the existing legal framework and identify the markers making it inefficient. Cyber sabotage is a term that involves state and non-state actors targeting the computing systems and controlling the censorious infrastructure of a nation. The sabotage can be for a variety of purposes ranging from mere disruption in public services to creating disruptions to demands of ransom and observations by enemy nations.

The Government's tranquillity and lack of transparency in communicating incidents of cyber-sabotage on the country's censorious infrastructure is the primary reason for the wrong estimation of this 21st-century threat. To explain the depravity of the situation, a few statistics should be brought to light.

As per the information conferred by the union home ministry based on data reported by the Indian Computer Emergency Response Team ('CERT-In'), India's nodal cyber-security agency to the Parliament in March 2021, the country saw a huge 1.15 million cyber-attacks in 2020.

Most attacks aim at censorious infrastructure followed by banking, defense, and then manufacturing sectors. In censorious infrastructure, oil and natural gas prerequisites are targeted the most. During the pandemic, there has been a vital increase in attacks on India's critical healthcare infrastructure and pharma companies. Ransomware attacks on the pharma sector have intensified the most. It has been observed that the cyber-attacks on India's censorious infrastructure are increasing, calling for more strong prevention, detection, and reaction policy.

For dealing with the existing and emerging threats of cyber sabotage, the policy framework is required to be split into three key elements.

• Detection of cyber-attacks

• Fast reaction for limiting future damage

• Prevention mechanism including strong systems that will strengthen software and hardware used in censorious infrastructure.

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

                                                                                                       _____________                                             

Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.

Next-Level Cryptos: How Qubetics Stacks Up Against Ripple and Polkadot This November

Which Utility Altcoin Will Hit $1 First: Cardano (ADA) vs Dogecoin vs IntelMarkets

Dogecoin Price Breakout Imminent, Rival Undervalued Altcoin Ready for 19,403% Gains in December 2024

DTX Exchange Exceeds Hype With 100K Downloads for Phoenix Wallet: SUI and RENDER Dump

Crypto Experts Agree - Top 9 Picks of the Best Cryptos to Buy Now!