Sie sind auf Seite 1von 8

SecureIT SecureIT 2013 2013 EVENT EVENT

Developing a road map for National Security and Disaster Management


The 4th SecureIT 2013, the National Conference on ICT in Public Safety, Security and Disaster Management, took place at The Oberoi, New Delhi, on March 8, 2013. The conference was presented by eGov Magazine and jointly organised by Elets Technomedia Pvt Ltd and Centre for Science, Development and Media Studies (CSDMS). The SecureIT 2013 saw healthy debate on new technology applications and services that are already being or will be deployed in future to improve national security and moderate the aftermath of natural and manmade disasters. There were discussions on critical issues such as threat of cyber terrorism, data security, security against malware and use of ICT in border security. National Security is a vast subject, but the SecureIT 2013 did manage to bring to light some of the most innovative ideas for national security and effective disaster management.

58

egov / egov.eletsonline.com / April 2013

SecureIT 2013

EVENT

The concept of state has originated from security because people want to have security. In due course of time that concept became the concept of state and kingdom. There are three type of security physical security, security in the financial wealth and the intellectual property. In physical security each and every person should be well protected against all kinds of problems and aggression. Secondly, there is the aspect of security in the field of finances; this means that each and every person should be able to secure his or her wealth, whether it is in digital form or in physical form. And the intellectual property. We have to ensure that intellectual property is also secured. In all these three areas ICT can play a very important role. We got to create large number of awareness among people regarding cyber security. If we want to grow, the citizens of that society must have the sense of security. Today ICT is playing a vital role in creation of security systems being used around the world. We have to try to come with a mechanism that will ensure that all human beings are secured. In case of terrorism and anti-social elements, we can make use of digital cameras, we can make use of UAVs. In all these systems ICT can play a very very important role. The MHA and lot of other departments and organisations are working on this area and if we can create a collaborative platform where academia, industry, bureaucracy and the implementing agencies get together, we may find solutions to many of these problems.

Shankar Agarwal Additional secretary, Ministry of Defence, Government of India


The nature of external threat has changed over the years. The security threat due to cyber aspects have become far more important as compared to the physical aspects. We have to take the new technological developments into account and accordingly forumate our strategies. I think there is need for much greater awareness, consciousness and preparedness in our security framework. This is true on a global scale. Governments are starting to become aware of the threats that emanate from cyber verticals. In order to safeguard our national interests we have to prepare ourselves fully for meeting new challenges in the cyberspace. I think there is need for much greater awareness, consciousness and preparedness at all levels at the operational level, strategic level and policy level. There needs to be awareness about the implications of cyber security, how it is transforming the nature of warfare, the nature of threats internal and external. In February 2013, the European Union issued Comprehensive New Cyber Security Directives, which mandate all its member countries to put in place new and comprehensive cyber security measures. India too needs to update its systems for meeting the cyber security threats.

Rajiv Gauba Additional Secretary, DeitY, Ministry of Communications & IT, Government of India

April 2013 / egov.eletsonline.com / egov

59

EVENT

SecureIT 2013

Dr Ashwini Kumar Sharma Managing Director, NIELIT

Arun Chaudhary Director General, Sashastra Seema Bal

By 2001 and 2002 we found that most of the criminal elements and most of the terrorists are making use of the Internet, which we could not follow at that point of time. Technological preparedness can do more for securing the nation than our physical presence at the borders. We have now started taking a serious look at the issues of cyber security for securing the nation on this new frontier.

Cyber-crimes are new class of crimes. The government of India is planning that services have to be delivered at the doorstep of the citizens. It has to be ensured that it is done in a transparent way. Now we have to go for a system where we can go for periodic or non-periodic survey of making a system secure.

e-Governance is All about Inclusive Growth????

Alok Tripathi Joint-Director, NIELIT


Capacity building in IT security and cyber crime and forensic is quite different from the traditional IT environment. For traditional IT environment, we need IT infrastructure, we require people to be trained, we require software and tools and then the trainer has to train the people.

A K Sharma Director, Delhi Fire Service


Saving life in a blazing re situation is a tedious task. Technology can make the work of reghters much safer. Fire services must utilise the latest technology in the eld. GPS and GIS can be put effectively in our day-to-day activities.

Maj Gen Dhruv C Katoch, SM, VSM (Retd), Director, Centre for Land Warfare Studies (CLAWS)
When you monitor everybody, you and me are also getting monitored and then we come to the privacy issues. We come to the question of who is going to monitor the people who are monitoring us? Because so long as the crooks are doing it, we have the police to sort them out. And when look at privacy issues I think these issues are of very serious concern. It involves human rights.

60 egov / egov.eletsonline.com / April 2013

SecureIT 2013

EVENT

Dr Hanuman Prasad Shukla Director, National Institute of Electronics and Information Technology (NIELIT)-Gorakhpur
We need to implement innovative strategies for safeguard the nation. We have to out-think the attacker and predict his next step.

Dr Govind Senior Director, DeitY, Government of India and CEO, National Internet Exchange of India (NIXI)

Security is never perfect. The matter is how do we secure our things with available technologies. There will always be a next generation technology, more powerful, more costly. Privacy and security comes at the cost of the other. These are the huge challenges that we must address in the coming years.

Maj Gen (Dr) J K Bansal Member, National Disaster Management Authority


Disaster management denitely needs technology. Whatever technology we develop, it should be used and implemented. First and foremost, technology should be made available to all those who are involved in disaster managemet.

Col KPM Das Vice President, National Security Solutions, Cisco Systems
The proposition here is that while the systems are getting deployed, there should be an underlying assurance that all the security related systems are being implemented. The gaps in the network level should not be exploited by criminals and aliens.

Loknath Behra, Inspector General of Police, National Investigating Agency


We have very regular dialogue with the homeland security department. Ministry of Home Affairs is the nodal agency for dialogue on various aspects of airport security, counter terrorism or border management. It is happening regularly between India and Washington and we learn lot of things from them. We learn about how systemically they have made changes in their processes, all this is very helpful to us.

April 2013 / egov.eletsonline.com / egov

61

EVENT

SecureIT 2013

Muktesh K Pardeshi Joint Secretary (PSP) & Chief Passport Ofcer, Ministry of External Affairs, Government of India

The whole idea of passport seva project is people centric. It is service oriented project. This has set a high benchmark for the country to emulate in terms of swift project execution. It is a truly universal and global project. It can happen in India or Guatemala, where we have our embassy or consulate, you will serviced through the same application and same portal. The project has thus, global footprint.

M Moni Deputy Director General , National Informatics Center, Government of India


National animal disease reporting system and the other one is national database on shing vessels. There are 200,000 shing vessels which are operational and this database is being used by Navy, coast guards, marine police and is being used by all organisation associated with marine shing.

Lt General Rajesh Pant VSM, Commandant, Military College of Telecommunication Engineering


The three issues of concern for the future of information security professional the rst one is a convergence of the electronic warfare and cyber security. Second aspect is related to embedded malware. And the third one is insider attack, or the man in the middle becoming a vehicle for attack.

Dr Rajendra Kumar Joint Secretary, DeitY, Government of India


Now that we have multiple service providers, vendors, implementers, we are grappling with major security related issues. Different vendors may enter at different points of time and they may follow different procedures, which may be relevant at that point of time, but with passage of time they lose relevance. These procedures need to be changed and advanced.

Major General Ramesh Padhi Military Survey (MoGSGS)


For tidal observation we have got 125-year old data. In most of the sea ports there is tidal observatory. These are online transmitted to a national data centre and integrated with the national GPS data centre so that the locations and data are located in real time and it is available to all user groups in real time.

62

egov / egov.eletsonline.com / April 2013

SecureIT 2013

EVENT

Rajesh Agarwal Secretary IT, Government of Maharashtra


Mostly we think of cyber security as something that is equivalent to ghting an external attack, but the truth is that the cyber security is being fought within the systems. Today any database in the country is purchaseable, and that is the reality.

Ravi Saxena Additional Chief Secretary, Department of Science & Technology, Government of Gujarat

Cyberspace does not require a passport, it does not have a national boundary. The risk today is huge; the consequences of any criminal activity can be quite signicant and even disastrous. This is because the systems are being managed and run through software soloutions. These software solutions can be targetted remotely leading to lot of damage.

Renu Budhiraja Sr Director & HOD State Data Centres, e-Governance, DeitY, Government of India
When you talk about e-Governance scenario, the security has to be dealt end-to-end. It is a big challenge. The number of infected computers is enormous, 20 lakh plus. That is the challenge we need to look and address. There is also issue regarding implementation of security policies.

Ram Narain Deputy Director General (Security), Department of Telecom, Ministry of Communication and Information Technology, Government of India
We have one philosophy and principle. The philosophy was that let us build in security into the system rather than having add-on feature into it.

Ruchin Kumar Security Evangelist, SafeNet India Pvt Ltd


We cannot say that we can eliminate threat or breaches. These things will always be there no matter how secure we become. But we have to see that the breach, which has been done in any organization cannot harm the organisation.

April 2013 / egov.eletsonline.com / egov

63

EVENT

SecureIT 2013

S Suresh Kumar Joint Secretary (Centre-State), Ministry of Home Affairs, Government of India
Looking at a country like India, with different culture, different milieu, If anyone wants to do a project, he also has to look at in terms of what is going to be the evolving technologies, can you do it within three years in a very very very close fashion. Any optimism and ambition in that process is not called for.

Lt General S P Kochhar AVSM, SM, VSM, Signal Ofcer-in-Chief & Senior Colonel Commandant

I look at cyber security from three different angles one is application security and the user, second is system security and the third is network security. If we have to have secured networks, it is essential we have end-to-end security. It is essential for each user to be fully educated.

Subrata Das Industry Director, Public Services, SAP India


SAP tries to address community preparedness, volunteer management and critical area infrastructure management.

Sajan K Paul Director Systems Engineering India & SAARC, Juniper Networks
We are doing device tagging, we are going beyond IP address. If the hacker is coming from website, we can actually inject (even with his privacy settings on) around 20 plus cookies into his browser and then track him from other areas.

Satyendra Garg Inspector General of Police, Mizoram


For the last three years, I had been managing Delhi trafc. The trafc police is prosecuting around 10,000 people every day and the act, which governs trafc enforcement is Motor Vehicle Act 1988 and I think it looks ridiculous that every time a trafc offender is caught he is caught as a rst offender because there is no digitization of facts.

64

egov / egov.eletsonline.com / April 2013

SecureIT 2013

EVENT

Vibha Agrawal Vice President, Government Vertical, CA Technologies

The statistic shows that insider attacks count for as much as 85 percent of computer internet related crime. Out of these majority of the insiders are priviledged users and a large number of attacks occur through them. Most of the attacks are due to weak authentication. Authentication in the security arena is a very big player.

V L Kantha Rao President & CEO, National e-Governance Division (NeGD), DeitY, Government of India
We have lot of infrastructure and applications in the e-governance domain. We have realised that the measures regarding the cyber security in the egovernance domain is piecemeal.

Vikas Yadav Senior Sales Engineer, Websense


We should have modern security for modern threats. Threat comes from outside to inside, we should also analyse what is going from inside to outside.

BJ Shrinath Senior Director, CERTIn, DeitY, Government of India


Awareness about cyber security can make a lot of difference and I think thats what w all should be doing. Technology in one hand gives you the freedom but on the other hand it immediately takes away your freedom that you will not realize.

Puneet Ahuja Senior Technical Consultant, Juniper Networks


The security threat approach has to be twoleveled approach one is the service provider level and second at the enterprise level. Data passing from one organization to another should be logged somewhere.

PM Nair IPS, Director General, National Disaster Response Force


We are looking for location nders. Once we get the exact location through GPS it is not difcult for us. So technology and innovation can make a great difference in disaster response and disaster prevention. There is a lot to be done in integrating technology with the security system.

April 2013 / egov.eletsonline.com / egov

65

Das könnte Ihnen auch gefallen