Communication Network – Internal Security Challenges
- Communication networks are a part of Critical Information Infrastructure (CII) and are crucial for the connectivity of other critical infrastructure, viz. Energy;
- Transportation (air, surface, rail & water); Banking & Finance; Telecommunication; Defence; Space & Satellite; Law enforcement, security & intelligence;
- Sensitive Government Organisations; Public Health; Water supply; Critical manufacturing; E-Governance (Aadhar, IRCTC, Power Grid) etc. Threats to communication networks can be both through the network as well as to the network.
- The cyber-attacks coordinated from remote locations have potential to compromise these communication networks and disrupt critical infrastructure which depends on them.
- In India, where various threats are already present in the form of terrorism, insurgency, naxalism, hostile nations etc., the protection of communication network pose significant challenges to internal security.
- Critical Infrastructure (CI) - “Those facilities, systems, or functions, whose incapacity or destruction would cause a debilitating impact on national security, governance, economy and social well-being of a nation.
- In section 70 of IT Act 2000, Critical Information Infrastructure (CII) (CIT company have given special protection) is defined as: - The computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.”
- Cyber Attacks, Physical Attacks, Remote Control, Hostage Capture.
Human induced threats
- Various actors may work as a threat to Communication network such as-
- Insiders in the form of disgruntled employees or compromised/socially engineered (First Gain Trust, later attack) employees.
- Economic, military or adversary nation states.
- Criminal syndicates to terrorist outfits.
- Types of threats - This includes all the attempts made by malicious actors to gain access to the system with the intent of causing a harm or damage.
- The threat actors exploit the underlying vulnerabilities within the application software, control systems software, hardware or even the people to get access to the desired location in the network.
Comments
Post a Comment