NATIONAL CYBER
SECURITY POLICY - 2013
SANTOSH KAHDASRE
PREAMBLE
SANTOSH KHADSARE 2
Complex environment of integrations between people,
software and services
Common pool used by citizens, businesses , critical
information infrastructure ,military and groups
Vulnerable to a wide range of incidents, whether intentional
or accidental, manmade or natural, and the info can be
exploited by both nation states and non state actors
SANTOSH KHADSARE 3
CYBERSPACE IS…..
Caters to the whole spectrum of ICT users and
providers and is an evolving process
IT SERVES AS AN UMBRELLA FRAMEWORK FOR
DEFINING AND GUIDING THE ACTIONS RELATED
TO SECURITY OF CYBER SPACE
It also enables the individual sectors and org in
designing appropriate cyber security polices to suit
their needs
SANTOSH KHADSARE 4
CYBER SECURITY POLICY
TO BUILD A SECURE AND RESILIENT
CYBERSPACE FOR CITIZENS,
BUSINESSES AND GOVERNMENT
SANTOSH KHADSARE 5
VISION
SANTOSH KHADSARE 6
MISSION
SANTOSH KHADSARE 7
OBJECTIVES
Create a secure
cyber ecosystem
Create an assurance
framework
Strengthen the
regulatory
framework
Enhance and create
national and
sectorial level 24x7
mechanisms for
info gathering
Enhance protection
and resilience of CII
by operating 24x7
NCIIPC
Develop indigenous
security
technologies
SANTOSH KHADSARE 8
OBJECTIVES
Est infrastructure
for testing &
validation of
security of such
products
Create workforce of
500,000
professionals in
next five years
Fiscal benefits to
businesses for
adoption of std
security practices
and processes
Enable effective
prevention ,
investigation and
prosecution of
cyber crime
Create culture of
cyber security
Develop public pvt
partnerships and
enhance global
cooperation
Designate a national nodal agency to coordinate matters(cyber
security) with clearly defined roles and responsibilities
designate CISO in every org who will be responsible for cyber
security efforts and initiatives
Org to devp info security policies and implement them as per
international best practices
Org to earmark a specific budget for cyber security
SANTOSH KHADSARE 9
STRATEGIES : CREATING A SECURE
CYBER ECO SYSTEM
Provide fiscal schemes and initiatives to encourage entities to
install and upgrade info infrastructure fro cyber security
Prevent occurrence and recurrence of cyber incidents
(proactive actions)
Est mechanism for sharing info
Procurement of trustworthy indigenously manufactured ICT
products
SANTOSH KHADSARE 10
STRATEGIES : CREATING A SECURE
CYBER ECO SYSTEM
Promote adoption of global best practices in info security and
compliance.
Create infrastructure for conformity assessment and
certification of compliance to cyber security best practices, std
and guidelines (e.g ISO 27001 ISMS certification).
Enable implementation of global security best practices for risk
management.
Identify and classify info infrastructure facilities and assets.
SANTOSH KHADSARE 11
STRATEGIES : CREATING A
ASSURANCE FRAMEWORK
Encourage secure appln/software devp processes.
Create conformity assessment framework for periodic
verification of compliance to best practices, std and guidelines
on cyber security.
Encourage all entities tom periodically test and evaluate the
adequacy and effectiveness of tech and op security measures
implemented in IT sys and networks .
SANTOSH KHADSARE 12
STRATEGIES : CREATING A
ASSURANCE FRAMEWORK
Encourage use of open standards to facilitate interoperability
and data exchange among different products and services.
Promote a consortium of Govt and private sector to enhance
availability of tested and certified IT products on open
standards.
SANTOSH KHADSARE 13
STRATEGIES : ENCOURAGING OPEN
STANDARDS
Devp dynamic and legal framework and its periodic review to
address Cyber security challenges.
To mandate periodic audit and evaluation.
To enable, educate and facilitate awareness of the regulatory
framework.
SANTOSH KHADSARE 14
STRATEGIES : STRENGTHENING
THE REGULATORY FRAMEWORK
To create National lvl sys , processes, structures and
mechanisms to generate situational scenario of
existing and potential threats and enable timely info
sharing for proactive, preventive and protective
actions.
To operate 24x7 CERT-in to function as a Nodal
Agency for coordination of all efforts for cyber
security emergency response and crisis mgt
(Umbrella org).
SANTOSH KHADSARE 15
STRATEGIES : CREATING MECHANISMS FOR EARLY
WARNING , VULNERABILITY MGT & RESPONSE
Operationalise 24x7 sectorial CERTs.
Implement Crisis Mgt plan for dealing with incidents impacting
critical national processes or endangering public safety and
security of the nation.
To conduct and facilitate regular cyber security drills and
exercises at National, sectorial and entity levels.
SANTOSH KHADSARE 16
STRATEGIES : CREATING MECHANISMS FOR EARLY
WARNING , VULNERABILITY MGT & RESPONSE
To mandate implementation of global security best practices,
business continuity mgt and cyber crisis mgt plan for all e-
Governance initiatives .
To encourage wider usage of PKI within Govt. for trusted
communication and transactions.
To engage info security professionals / org to assist .
SANTOSH KHADSARE 17
STRATEGIES : SECURING E-
GOVERNANCE SERVICES
To devp plan for protection of CII.
To operate 24x7 National Critical Information Infrastructure
Protection Centre(NCIIPC) to function as Nodal agency for CII
protection.
To facilitate identification, prioritisation, assessment,
remediation and protection of CII and key recourses.
To encourage and mandate as appropriate, the use of validated
and certified IT products.
SANTOSH KHADSARE 18
STRATEGIES : PROTECTION AND RESILIENCE
OF CRITICAL INFO INFRASTRUCTURE
To mandate security audit of CII on periodic basis.
To mandate certification of all security roles right from CISO
/CSO to those involved in operation of CII.
To mandate secure appl /software devp process.
SANTOSH KHADSARE 19
STRATEGIES : PROTECTION AND RESILIENCE
OF CRITICAL INFO INFRASTRUCTURE
To undertake R&D programs aimed at short term, medium term
and long term goals.
To encourage R&D to produce cost effective, tailor-made and
indigenous security solutions .
To facilitate transition, diffusion. And commercialisation of
outputs of R&D into commercial products and services for use
in public and private sectors.
SANTOSH KHADSARE 20
STRATEGIES : PROMOTION OF R&D
IN CYBER SECURITY
To set up Centre of Excellence in areas of strategic importance
for the point of security of cyber space .
To collaborate in joint R&D projects with industry and academia
in frontline technologies and solution oriented research.
SANTOSH KHADSARE 21
STRATEGIES : PROMOTION OF R&D
IN CYBER SECURITY
To create and maintain testing infrastructure and facilities of IT
security product evaluation and compliance verification.
To build trust relationships with product / system vendors and
service providers for improving end-to-end supply chain
security visibility.
To create awareness of the threats, vulnerabilities and
consequences of breach of security related to IT procurement.
SANTOSH KHADSARE 22
STRATEGIES : REDUCIN SUPPLY
CHAIN RISKS
To foster education and trg programs both in formal and
informal sectors to support the nation’s cyber security needs
and build capacity.
To est cyber security trg infrastructure across the country by
way of public private partnership arrangements.
To est cyber security concept labs for awareness and skill devp
in key areas.
To est institutional mechanisms for capacity building for Law
Enforcement Agencies.
SANTOSH KHADSARE 23
STRATEGIES : HRD
To promote and launch a comprehensive national awareness
program on security of cyber space.
To sustain security literacy awareness and publicity campaign
through electronic media.
To conduct, support and enable cyber security workshops /
seminars and certifications.
SANTOSH KHADSARE 24
STRATEGIES : CREATING CYBER
SECURITY AWARENESS
To facilitate collaboration and cooperation among stakeholder
entities.
To create models of collaborations and engagement with all
relevant stakeholders.
To create a think tank for cyber security inputs, discussion and
deliberations.
SANTOSH KHADSARE 25
STRATEGIES : DEVP EFFECTIVE
PUBLIC PVT PARTNERSHIPS
INFO SHARING AND COOPERATION (among security agencies,
CERTs, defence agencies, Law enforcement agencies and judicail
systems).
PRIORTIZED APPROACH FOR IMPLEMENTATION.
SANTOSH KHADSARE 26
OTHER STRATEGIES
THANK YOU
SANTOSH KHADSARE 27

More Related Content

PPTX
Cryptography
PPTX
Law and Ethics in Information Security.pptx
PPTX
Presentation on Software Piracy
PDF
National Cyber Security Policy 2013 (NCSP)
PPTX
Distributed file system
PPTX
Operating System Unit 1
PPTX
01 - Introduction to Distributed Systems
PPTX
Federated Cloud Computing
Cryptography
Law and Ethics in Information Security.pptx
Presentation on Software Piracy
National Cyber Security Policy 2013 (NCSP)
Distributed file system
Operating System Unit 1
01 - Introduction to Distributed Systems
Federated Cloud Computing

What's hot (20)

PPS
An Introduction to Internet
PPT
Cyber security standards
PPTX
Introduction to cyber security
PPTX
Ethics in-information-security
PPTX
Fault tolerance in distributed systems
PDF
Some E-commerce Applications
PPT
computer forensics
PPT
Understanding and Conceptualizing interaction - Mary Margarat
PPTX
WWW or World Wide Web
PPT
Email security
PPTX
Synchronization in distributed computing
PPTX
Trends in distributed systems
PPTX
Web 2.0
PPTX
What is Cryptography and Types of attacks in it
PPTX
Presentation on web browser
PPTX
Reader/writer problem
PPTX
history of internet and usage of internet in education and communication
PDF
Unit II - 3 - Operating System - Process Synchronization
PDF
Phishing Attacks: A Challenge Ahead
PPTX
Telephone call-simulation
An Introduction to Internet
Cyber security standards
Introduction to cyber security
Ethics in-information-security
Fault tolerance in distributed systems
Some E-commerce Applications
computer forensics
Understanding and Conceptualizing interaction - Mary Margarat
WWW or World Wide Web
Email security
Synchronization in distributed computing
Trends in distributed systems
Web 2.0
What is Cryptography and Types of attacks in it
Presentation on web browser
Reader/writer problem
history of internet and usage of internet in education and communication
Unit II - 3 - Operating System - Process Synchronization
Phishing Attacks: A Challenge Ahead
Telephone call-simulation
Ad

Similar to INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013) (20)

PPTX
National Cyber Security Policy-2013
PPTX
Unit-4 National Cyber Security Policy ,2013.pptx
PPTX
National cyber security policy final
PDF
Internet safety and security strategies for building an internet safety wall
PDF
Cyber Security Strategies and Approaches
PDF
National Cyber Security Strategy 2020 DSCI submission.pdf
PDF
(DAILY NEWS ANALYSIS)
PPTX
Nist 800 53 deep dive 20210813
PDF
Cyber Readiness Index 2.0
PPTX
Cyber Security - Awareness Presentation - High Level
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PDF
Nist cybersecurity framework isc2 quantico
PDF
National Cybersecurity - Roadmap and Action Plan
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PPTX
Achieving Caribbean Cybersecuirty
PPT
Infrastructure Security by Sivamurthy Hiremath
PPTX
MCGlobalTech Service Presentation
PDF
Introduction to NIST Cybersecurity Framework
PPTX
CSO Magazine Confab 2013 Atlanta - Cyber Security
PDF
Overview of National Cybersecurity Strategy 2023.pdf
National Cyber Security Policy-2013
Unit-4 National Cyber Security Policy ,2013.pptx
National cyber security policy final
Internet safety and security strategies for building an internet safety wall
Cyber Security Strategies and Approaches
National Cyber Security Strategy 2020 DSCI submission.pdf
(DAILY NEWS ANALYSIS)
Nist 800 53 deep dive 20210813
Cyber Readiness Index 2.0
Cyber Security - Awareness Presentation - High Level
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
Nist cybersecurity framework isc2 quantico
National Cybersecurity - Roadmap and Action Plan
Cybersecurity-Real World Approach FINAL 2-24-16
Achieving Caribbean Cybersecuirty
Infrastructure Security by Sivamurthy Hiremath
MCGlobalTech Service Presentation
Introduction to NIST Cybersecurity Framework
CSO Magazine Confab 2013 Atlanta - Cyber Security
Overview of National Cybersecurity Strategy 2023.pdf
Ad

More from Santosh Khadsare (20)

PPTX
Cyber fraud (netflix)
PPT
INTERNET SECUIRTY TIPS
PPT
Linux forensics
PPT
Network forensics1
PPT
Windowsforensics
PPT
Lec 1 apln security(4pd)
PPT
Smart card
PPT
Guassvirus
PPT
IDS and IPS
PPT
PPT
Linux Forensics
PPT
Web server
PPT
Samba server
PPT
Firewall(linux)
PPT
Securitytips
PPT
Linux basics
PPT
Linuxfilesys
PPT
Linuxconcepts
PPT
Introtolinux
DOC
New internet
Cyber fraud (netflix)
INTERNET SECUIRTY TIPS
Linux forensics
Network forensics1
Windowsforensics
Lec 1 apln security(4pd)
Smart card
Guassvirus
IDS and IPS
Linux Forensics
Web server
Samba server
Firewall(linux)
Securitytips
Linux basics
Linuxfilesys
Linuxconcepts
Introtolinux
New internet

Recently uploaded (20)

PDF
anganwadi services for the b.sc nursing and GNM
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PPT
hemostasis and its significance, physiology
PDF
African Communication Research: A review
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PPTX
Approach to a child with acute kidney injury
PPTX
ENGlishGrade8_Quarter2_WEEK1_LESSON1.pptx
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PDF
Laparoscopic Imaging Systems at World Laparoscopy Hospital
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PPTX
Diploma pharmaceutics notes..helps diploma students
PPTX
Copy of ARAL Program Primer_071725(1).pptx
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPTX
growth and developement.pptxweeeeerrgttyyy
PDF
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
anganwadi services for the b.sc nursing and GNM
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
hemostasis and its significance, physiology
African Communication Research: A review
Diabetes Mellitus , types , clinical picture, investigation and managment
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Approach to a child with acute kidney injury
ENGlishGrade8_Quarter2_WEEK1_LESSON1.pptx
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
Laparoscopic Imaging Systems at World Laparoscopy Hospital
Thinking Routines and Learning Engagements.pptx
2025 High Blood Pressure Guideline Slide Set.pptx
4. Diagnosis and treatment planning in RPD.pptx
Diploma pharmaceutics notes..helps diploma students
Copy of ARAL Program Primer_071725(1).pptx
Theoretical for class.pptxgshdhddhdhdhgd
growth and developement.pptxweeeeerrgttyyy
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...

INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)

  • 1. NATIONAL CYBER SECURITY POLICY - 2013 SANTOSH KAHDASRE
  • 3. Complex environment of integrations between people, software and services Common pool used by citizens, businesses , critical information infrastructure ,military and groups Vulnerable to a wide range of incidents, whether intentional or accidental, manmade or natural, and the info can be exploited by both nation states and non state actors SANTOSH KHADSARE 3 CYBERSPACE IS…..
  • 4. Caters to the whole spectrum of ICT users and providers and is an evolving process IT SERVES AS AN UMBRELLA FRAMEWORK FOR DEFINING AND GUIDING THE ACTIONS RELATED TO SECURITY OF CYBER SPACE It also enables the individual sectors and org in designing appropriate cyber security polices to suit their needs SANTOSH KHADSARE 4 CYBER SECURITY POLICY
  • 5. TO BUILD A SECURE AND RESILIENT CYBERSPACE FOR CITIZENS, BUSINESSES AND GOVERNMENT SANTOSH KHADSARE 5 VISION
  • 7. SANTOSH KHADSARE 7 OBJECTIVES Create a secure cyber ecosystem Create an assurance framework Strengthen the regulatory framework Enhance and create national and sectorial level 24x7 mechanisms for info gathering Enhance protection and resilience of CII by operating 24x7 NCIIPC Develop indigenous security technologies
  • 8. SANTOSH KHADSARE 8 OBJECTIVES Est infrastructure for testing & validation of security of such products Create workforce of 500,000 professionals in next five years Fiscal benefits to businesses for adoption of std security practices and processes Enable effective prevention , investigation and prosecution of cyber crime Create culture of cyber security Develop public pvt partnerships and enhance global cooperation
  • 9. Designate a national nodal agency to coordinate matters(cyber security) with clearly defined roles and responsibilities designate CISO in every org who will be responsible for cyber security efforts and initiatives Org to devp info security policies and implement them as per international best practices Org to earmark a specific budget for cyber security SANTOSH KHADSARE 9 STRATEGIES : CREATING A SECURE CYBER ECO SYSTEM
  • 10. Provide fiscal schemes and initiatives to encourage entities to install and upgrade info infrastructure fro cyber security Prevent occurrence and recurrence of cyber incidents (proactive actions) Est mechanism for sharing info Procurement of trustworthy indigenously manufactured ICT products SANTOSH KHADSARE 10 STRATEGIES : CREATING A SECURE CYBER ECO SYSTEM
  • 11. Promote adoption of global best practices in info security and compliance. Create infrastructure for conformity assessment and certification of compliance to cyber security best practices, std and guidelines (e.g ISO 27001 ISMS certification). Enable implementation of global security best practices for risk management. Identify and classify info infrastructure facilities and assets. SANTOSH KHADSARE 11 STRATEGIES : CREATING A ASSURANCE FRAMEWORK
  • 12. Encourage secure appln/software devp processes. Create conformity assessment framework for periodic verification of compliance to best practices, std and guidelines on cyber security. Encourage all entities tom periodically test and evaluate the adequacy and effectiveness of tech and op security measures implemented in IT sys and networks . SANTOSH KHADSARE 12 STRATEGIES : CREATING A ASSURANCE FRAMEWORK
  • 13. Encourage use of open standards to facilitate interoperability and data exchange among different products and services. Promote a consortium of Govt and private sector to enhance availability of tested and certified IT products on open standards. SANTOSH KHADSARE 13 STRATEGIES : ENCOURAGING OPEN STANDARDS
  • 14. Devp dynamic and legal framework and its periodic review to address Cyber security challenges. To mandate periodic audit and evaluation. To enable, educate and facilitate awareness of the regulatory framework. SANTOSH KHADSARE 14 STRATEGIES : STRENGTHENING THE REGULATORY FRAMEWORK
  • 15. To create National lvl sys , processes, structures and mechanisms to generate situational scenario of existing and potential threats and enable timely info sharing for proactive, preventive and protective actions. To operate 24x7 CERT-in to function as a Nodal Agency for coordination of all efforts for cyber security emergency response and crisis mgt (Umbrella org). SANTOSH KHADSARE 15 STRATEGIES : CREATING MECHANISMS FOR EARLY WARNING , VULNERABILITY MGT & RESPONSE
  • 16. Operationalise 24x7 sectorial CERTs. Implement Crisis Mgt plan for dealing with incidents impacting critical national processes or endangering public safety and security of the nation. To conduct and facilitate regular cyber security drills and exercises at National, sectorial and entity levels. SANTOSH KHADSARE 16 STRATEGIES : CREATING MECHANISMS FOR EARLY WARNING , VULNERABILITY MGT & RESPONSE
  • 17. To mandate implementation of global security best practices, business continuity mgt and cyber crisis mgt plan for all e- Governance initiatives . To encourage wider usage of PKI within Govt. for trusted communication and transactions. To engage info security professionals / org to assist . SANTOSH KHADSARE 17 STRATEGIES : SECURING E- GOVERNANCE SERVICES
  • 18. To devp plan for protection of CII. To operate 24x7 National Critical Information Infrastructure Protection Centre(NCIIPC) to function as Nodal agency for CII protection. To facilitate identification, prioritisation, assessment, remediation and protection of CII and key recourses. To encourage and mandate as appropriate, the use of validated and certified IT products. SANTOSH KHADSARE 18 STRATEGIES : PROTECTION AND RESILIENCE OF CRITICAL INFO INFRASTRUCTURE
  • 19. To mandate security audit of CII on periodic basis. To mandate certification of all security roles right from CISO /CSO to those involved in operation of CII. To mandate secure appl /software devp process. SANTOSH KHADSARE 19 STRATEGIES : PROTECTION AND RESILIENCE OF CRITICAL INFO INFRASTRUCTURE
  • 20. To undertake R&D programs aimed at short term, medium term and long term goals. To encourage R&D to produce cost effective, tailor-made and indigenous security solutions . To facilitate transition, diffusion. And commercialisation of outputs of R&D into commercial products and services for use in public and private sectors. SANTOSH KHADSARE 20 STRATEGIES : PROMOTION OF R&D IN CYBER SECURITY
  • 21. To set up Centre of Excellence in areas of strategic importance for the point of security of cyber space . To collaborate in joint R&D projects with industry and academia in frontline technologies and solution oriented research. SANTOSH KHADSARE 21 STRATEGIES : PROMOTION OF R&D IN CYBER SECURITY
  • 22. To create and maintain testing infrastructure and facilities of IT security product evaluation and compliance verification. To build trust relationships with product / system vendors and service providers for improving end-to-end supply chain security visibility. To create awareness of the threats, vulnerabilities and consequences of breach of security related to IT procurement. SANTOSH KHADSARE 22 STRATEGIES : REDUCIN SUPPLY CHAIN RISKS
  • 23. To foster education and trg programs both in formal and informal sectors to support the nation’s cyber security needs and build capacity. To est cyber security trg infrastructure across the country by way of public private partnership arrangements. To est cyber security concept labs for awareness and skill devp in key areas. To est institutional mechanisms for capacity building for Law Enforcement Agencies. SANTOSH KHADSARE 23 STRATEGIES : HRD
  • 24. To promote and launch a comprehensive national awareness program on security of cyber space. To sustain security literacy awareness and publicity campaign through electronic media. To conduct, support and enable cyber security workshops / seminars and certifications. SANTOSH KHADSARE 24 STRATEGIES : CREATING CYBER SECURITY AWARENESS
  • 25. To facilitate collaboration and cooperation among stakeholder entities. To create models of collaborations and engagement with all relevant stakeholders. To create a think tank for cyber security inputs, discussion and deliberations. SANTOSH KHADSARE 25 STRATEGIES : DEVP EFFECTIVE PUBLIC PVT PARTNERSHIPS
  • 26. INFO SHARING AND COOPERATION (among security agencies, CERTs, defence agencies, Law enforcement agencies and judicail systems). PRIORTIZED APPROACH FOR IMPLEMENTATION. SANTOSH KHADSARE 26 OTHER STRATEGIES