- What is Cybersecurity? → Practice of protecting systems, networks, programs, and data from digital attacks, damage, or unauthorized access.
- India's Cyber Threat Landscape: 13.9 lakh cyber incidents reported to CERT-In in 2023; ransomware, phishing, data breaches, critical infrastructure targeting rising.
- Policy Framework: National Cyber Security Policy (NCSP) 2013 is the cornerstone; draft National Cyber Security Strategy (2020) pending cabinet approval.
- Key Institutions: CERT-In (nodal agency), NCIIPC (critical infrastructure), MeitY (policy), NTRO (intelligence), Defence Cyber Agency.
- UPSC Angle: Tests understanding of digital governance, critical infrastructure protection, legal frameworks, and India's strategic autonomy in cyberspace.
📌 Legal Framework for Cybersecurity in India
- Information Technology Act, 2000 (Amended 2008):
- Section 43: Penalty for damage to computer/computer system — compensation up to ₹1 crore.
- Section 66: Computer-related offences (hacking, data theft) — up to 3 years + ₹5 lakh fine.
- Section 66F: Cyber terrorism — unauthorized access to critical infrastructure with intent to threaten unity, integrity, security, or sovereignty — life imprisonment.
- Section 70: Protected systems — government can declare any computer resource as "protected"; unauthorized access punishable.
- Section 70B: Established CERT-In as national nodal agency for incident response.
- Digital Personal Data Protection (DPDP) Act, 2023:
- Mandates data fiduciaries to implement security safeguards to prevent breaches.
- Requires breach notification to Data Protection Board and affected individuals.
- Penalties up to ₹250 crore for significant data fiduciaries failing security obligations.
- Indian Penal Code (IPC), 1860:
- Section 405/406: Criminal breach of trust (applicable to data misuse by insiders).
- Section 420: Cheating (cyber fraud, phishing scams).
📌 Key Institutions & Their Roles
- CERT-In (Indian Computer Emergency Response Team):
- Nodal agency under MeitY for cybersecurity incident response.
- Functions: Incident monitoring, vulnerability analysis, emergency response, capacity building.
- April 2022 Directions: Mandated VPN providers, cloud services, data centers to retain logs for 5 years; report incidents within 6 hours.
- NCIIPC (National Critical Information Infrastructure Protection Centre):
- Established under IT Act Section 70A; operates under NTRO.
- Identifies and protects Critical Information Infrastructure (CII): power, banking, telecom, transport, government networks.
- Issues guidelines for CII operators; conducts audits and vulnerability assessments.
- Defence Cyber Agency (DCA):
- Tri-service command under Ministry of Defence for military cyber operations.
- Focus: Offensive/defensive cyber capabilities, protecting defence networks, counter-terrorism in cyberspace.
- National Security Council Secretariat (NSCS):
- Coordinates national cybersecurity policy; chaired by National Security Advisor.
- Oversees implementation of National Cyber Security Strategy (when approved).
📌 National Cyber Security Policy (NCSP) 2013: Key Objectives
- Create secure cyber ecosystem for citizens, businesses, and government.
- Strengthen regulatory framework for cybersecurity (led to IT Act amendments).
- Enhance visibility and resilience of critical information infrastructure.
- Develop indigenous security technologies and reduce import dependence.
- Build human capacity: Target of 5 lakh skilled cybersecurity professionals by 2020 (revised).
- Establish mechanisms for public-private partnership and international cooperation.
📌 Draft National Cyber Security Strategy (2020): Proposed Enhancements
- Institutional Architecture: Proposes National Cyber Coordinator (NCC) at PMO level for strategic oversight.
- Supply Chain Security: Trusted sources framework for hardware/software in critical sectors; "Make in India" for cybersecurity products.
- Offensive Capabilities: Explicit mandate for proactive cyber operations (deterrence, attribution, counter-strikes).
- Public-Private Fusion: Mandated information sharing between government and private sector; liability protections for good-faith reporting.
- International Engagement: Active participation in UN GGE, OSCE, bilateral cyber dialogues; norms development for responsible state behavior.
✅ Quick Facts
- Critical Information Infrastructure (CII): Defined under IT Act S.70 as computer resource whose incapacitation/destruction would have debilitating impact on national security, economy, public health, or safety.
- CERT-In Directions (2022): Applied to VPN providers, cloud services, data centers; 5-year log retention; 6-hour incident reporting — challenged in courts on privacy grounds.
- Cyber Swachhta Kendra: Botnet/malware cleaning initiative by CERT-In; free tools for citizens and SMEs to detect/remove infections.
- Indian Cyber Crime Coordination Centre (I4C): Under MHA; integrates law enforcement response to cybercrime; includes National Cybercrime Reporting Portal.
✅ Recent Developments (2023-24)
- National Cyber Security Coordinator (NCSC): Appointed at PMO level (2023) to coordinate policy implementation across ministries — interim step pending full Strategy approval.
- Trusted Telecom Portal: Mandatory certification for telecom equipment suppliers in critical networks; part of supply chain security measures.
- Cyber Surakshit Bharat: Awareness program for government officials; trained 1.5 lakh+ officers on secure digital practices.
- India-US Critical and Emerging Technology (iCET): Includes cybersecurity cooperation: threat intelligence sharing, joint exercises, supply chain resilience.
🎯 Cybersecurity Policy: Multi-Dimensional Analysis
🔹 Strategic Imperatives: Sovereignty & Resilience
- Digital Sovereignty: Protecting critical data and infrastructure from foreign surveillance, coercion, or disruption; reducing dependence on imported hardware/software.
- Economic Security: Cyberattacks on banking, UPI, stock exchanges can trigger financial instability; cybersecurity is prerequisite for digital economy growth.
- National Security Nexus: Hybrid warfare includes cyber operations; protecting defence networks, command-control systems, and strategic sectors is vital for deterrence.
🔹 Governance Challenges: Coordination & Capacity
- Institutional Fragmentation: Multiple agencies (CERT-In, NCIIPC, DCA, I4C, state police cyber cells) with overlapping mandates; need for unified command structure.
- Public-Private Gap: 90% of critical infrastructure is privately owned; mandatory reporting and information sharing face resistance due to liability fears and competitive concerns.
- Capacity Deficit: Shortage of skilled professionals (target 5 lakh vs. actual ~1.2 lakh); training infrastructure concentrated in metros; rural-urban digital divide exacerbates vulnerability.
🔹 Rights & Liberties: Balancing Security and Freedom
- Privacy Concerns: CERT-In's 2022 directions (log retention, user identification) challenged as disproportionate under Puttaswamy proportionality test.
- Freedom of Expression: Overbroad interpretation of "cyber terrorism" or "unauthorized access" may chill legitimate security research, whistleblowing, or journalistic investigation.
- Due Process: Emergency takedown powers, encryption restrictions need judicial oversight to prevent executive overreach.
🔹 Critical Challenges & Way Forward
- Supply Chain Vulnerabilities: Hardware backdoors, software dependencies on foreign vendors; need for indigenous R&D, trusted sourcing frameworks, and diversification.
- Ransomware & Critical Infrastructure: Healthcare, power grids increasingly targeted; requires sector-specific resilience standards, backup systems, and incident response protocols.
- International Norms: Cyberspace lacks binding treaties; India should advocate for UN-based norms that respect sovereignty while enabling cooperation against non-state threats.
- Emerging Tech Risks: AI-powered attacks, quantum computing breaking encryption, IoT botnets; policy must be adaptive and anticipatory.
🔹 Mains Answer Framework
- Contextualize: Link cybersecurity to digital India ambitions, critical infrastructure protection, and India's strategic autonomy in an era of great power cyber competition.
- Analyze Framework: Legal (IT Act, DPDP Act), institutional (CERT-In, NCIIPC, DCA), policy (NCSP 2013, draft Strategy), and operational (incident response, capacity building) dimensions.
- Critically Evaluate: Implementation gaps (coordination, capacity), rights tensions (privacy vs. security), and strategic challenges (supply chain, emerging tech).
- Way Forward: Approve and implement National Cyber Security Strategy with clear institutional architecture; invest in indigenous R&D and skills; strengthen public-private fusion; lead Global South in cyber norm-setting.
📌 Case 1: AIIMS Ransomware Attack (2022)
- Event: All India Institute of Medical Sciences, Delhi hit by ransomware; patient records, appointment systems offline for weeks.
- Response: CERT-In deployed incident response team; MHA coordinated with international partners for attribution; manual processes restored critical services.
- Lessons: Critical infrastructure (healthcare) lacked adequate segmentation, backups, and incident response plans; highlighted need for sector-specific cybersecurity standards.
- UPSC Link: Critical infrastructure protection + Public health security + Incident response coordination + Public-private partnership gaps.
📌 Case 2: CERT-In Directions 2022 – Privacy vs. Security Debate
- Policy: April 2022 directions mandated VPN providers, cloud services to retain user logs for 5 years; report incidents within 6 hours; verify customer identities.
- Controversy: Privacy advocates challenged directions as disproportionate; some VPN providers exited Indian market citing compliance burden.
- Outcome: Delhi High Court sought government response; directions remain in force but implementation selectively enforced pending judicial review.
- UPSC Link: Proportionality test (Puttaswamy) + Regulatory overreach concerns + Balancing national security and fundamental rights.
📌 Case 3: India-US iCET Cybersecurity Cooperation
- Initiative: Under India-US Critical and Emerging Technology (iCET) dialogue (2023), cybersecurity pillar includes threat intelligence sharing, joint exercises, supply chain resilience.
- Components: (a) CERT-In and CISA (US) establish real-time threat data exchange; (b) Joint R&D on AI-powered threat detection; (c) Trusted telecom equipment supply chain framework.
- Strategic Significance: Strengthens India's cyber deterrence against state and non-state actors; aligns with "friends-shoring" of critical technology supply chains.
- UPSC Link: Strategic partnerships + Technology diplomacy + Supply chain security + Balancing autonomy and cooperation.
Q1. With reference to cybersecurity policy in India, consider the following statements:
1. Section 66F of the IT Act, 2000 defines and penalizes cyber terrorism.
2. CERT-In functions under the Ministry of Home Affairs.
3. NCIIPC is responsible for protecting Critical Information Infrastructure in India.
Which of the statements given above are correct?
✅ Answer: (b) 1 and 3 only
💡 Explanation: Statement 2 is incorrect: CERT-In functions under MeitY (Ministry of Electronics & IT), not Ministry of Home Affairs. Statements 1 & 3 are correct.
Q2. The National Critical Information Infrastructure Protection Centre (NCIIPC) operates under the administrative control of:
✅ Answer: (b) National Technical Research Organisation (NTRO)
💡 Explanation: NCIIPC was established under IT Act Section 70A and operates under NTRO, which is India's premier technical intelligence agency.
Q3. Consider the following pairs:
Provision/Initiative | Purpose
1. IT Act Section 70 | Declaration of "protected systems" with enhanced penalties for unauthorized access
2. Cyber Swachhta Kendra | Free botnet/malware cleaning tools for citizens and SMEs
3. Trusted Telecom Portal | Certification framework for telecom equipment in critical networks
How many pairs are correctly matched?
✅ Answer: (c) All three
💡 Explanation: All three pairs are correctly matched. Section 70 enables protected system designation, Cyber Swachhta Kendra provides cleanup tools, and Trusted Telecom Portal addresses supply chain security.
Q4. CERT-In's April 2022 directions mandated intermediaries to report cybersecurity incidents within:
✅ Answer: (b) 6 hours
💡 Explanation: CERT-In's directions require service providers, intermediaries, and data centers to report cybersecurity incidents within 6 hours of noticing them — significantly faster than previous norms.
Q5. Which of the following is NOT a stated objective of the National Cyber Security Policy (NCSP) 2013?
✅ Answer: (c) Establish mandatory encryption backdoors for law enforcement access
💡 Explanation: NCSP 2013 does not mandate encryption backdoors; this remains a contested policy issue. The policy focuses on ecosystem security, indigenous development, and capacity building.
🔁 Cybersecurity Policy in 10 Seconds
- NCSP 2013: Foundational policy; objectives: secure ecosystem, regulatory framework, CII protection, indigenous tech, capacity building
- Legal Framework: IT Act (S.43/66/66F/70/70B), DPDP Act 2023, IPC provisions
- CERT-In: Nodal agency under MeitY; incident response, vulnerability analysis, 2022 directions (6-hr reporting, 5-yr logs)
- NCIIPC: Under NTRO; protects Critical Information Infrastructure (power, banking, telecom, transport)
- Draft Strategy (2020): Proposes National Cyber Coordinator, supply chain security, offensive capabilities, public-private fusion
- Key Challenge: Balancing security imperatives with privacy rights, federal coordination, capacity deficits
- Way Forward: Approve Strategy, invest in R&D/skills, strengthen public-private fusion, lead Global South cyber norm-setting
🧠 Mnemonic: "CYBER INDIA SECURE"
C → CERT-In: Nodal agency under MeitY for incident response
Y → Year of NCSP: 2013 (still operative; Strategy draft pending)
B → Backdoors debate: Encryption access remains contested policy issue
E → Ecosystem approach: Legal + Institutional + Technical + Human capacity
R → Rights balance: Proportionality test (Puttaswamy) for security measures
I → IT Act Sections: 43 (damage), 66 (offences), 66F (cyber terrorism), 70/70B (protected systems/CERT-In)
N → NCIIPC: Under NTRO; protects Critical Information Infrastructure
D → Draft Strategy (2020): Proposes National Cyber Coordinator, supply chain security
I → Indigenous focus: "Make in India" for cybersecurity products and R&D
A → Attribution challenge: Technical/political difficulty in identifying attackers
📌 Prelims Traps to Avoid
- ✘ CERT-In is under MeitY, not Ministry of Home Affairs
- ✘ NCIIPC is under NTRO, not CERT-In or MeitY
- ✘ "Cyber terrorism" (S.66F) requires intent to threaten sovereignty/security — not all hacking qualifies
- ✘ NCSP 2013 is still operative; draft Strategy (2020) not yet approved by Cabinet
- ✘ CERT-In 2022 directions mandate 6-hour reporting (not 24/72 hours) and 5-year log retention
🎯 Mains One-Liners
- "Cybersecurity policy = Legal framework + Institutional architecture + Technical capacity + Human capital"
- "Critical infrastructure protection requires sector-specific standards, public-private fusion, and resilient system design"
- "Proportionality test ensures security measures respect privacy and free speech under constitutional framework"
- "Supply chain security and indigenous R&D are strategic imperatives for technological sovereignty"
- "Way Forward: Approve Strategy, invest in skills/R&D, strengthen coordination, lead Global South cyber governance"