{"id":2624,"date":"2014-12-21T09:07:43","date_gmt":"2014-12-21T03:37:43","guid":{"rendered":"http:\/\/www.naavi.org\/?p=2624"},"modified":"2014-12-25T10:41:44","modified_gmt":"2014-12-25T05:11:44","slug":"sony-experience-changed-security-perception-indian-government-respond","status":"publish","type":"post","link":"https:\/\/www.naavi.org\/wp\/sony-experience-changed-security-perception-indian-government-respond\/","title":{"rendered":"Has Sony Experience Changed the Security Perception?..How should Indian Government respond?"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"https:\/\/www.apnacourse.com\/course\/cyberlaw\" target=\"_blank\" rel=\"attachment wp-att-2572\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2572\" src=\"https:\/\/www.naavi.org\/wp\/wp-content\/uploads\/2014\/11\/apna_ad_nov24.jpg\" alt=\"apna_ad_nov24\" width=\"928\" height=\"137\" srcset=\"https:\/\/www.naavi.org\/wp\/wp-content\/uploads\/2014\/11\/apna_ad_nov24.jpg 928w, https:\/\/www.naavi.org\/wp\/wp-content\/uploads\/2014\/11\/apna_ad_nov24-300x44.jpg 300w\" sizes=\"auto, (max-width: 928px) 100vw, 928px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">It appears that the hacking of Sony pictures in which corporate data has been destroyed and compromised has exposed the new dimension of a kind of Cyber warfare. According to FBI, the hack was attributed to North Korean Government and the motive was the prevention of the release of a Hollywood movie involving a theme of assassination of a North Korean leader. Of course North Korea has denied the charge.<\/p>\n<p style=\"text-align: justify;\">The issue highlights the potential for damage to corporate business assets arising out of such state sponsored high impact attacks. Such attacks can occur on other corporates \u00a0in future as a targeted attack as a part of Cyber terrorism.<\/p>\n<p style=\"text-align: justify;\">Indian corporates face the specific risk of Pakistan sponsored attackers intending to damage the Indian economic infrastructure.<\/p>\n<p style=\"text-align: justify;\">It is time therefore for Indian Companies to initiate appropriate security measures to ensure that they can ensure business continuity if such debilitating attacks are targeted at them.<\/p>\n<p style=\"text-align: justify;\">Apart from hardening of the security on an ongoing basis, most companies need to revisit their Disaster Recovery Programs (DRP). Many companies need to establish a DRP where there is none and upgrade if they have a basic facility.<\/p>\n<p style=\"text-align: justify;\">As a result of this new threat perception and the necessary mitigation measures, the cost of maintaining the IT infrastructure would increase significantly.<\/p>\n<p style=\"text-align: justify;\">The Government of India needs to therefore think what is its responsibility in providing a security blanket to Indian Corporates against such attacks coming from enemy states. It appears that this is a National Defense Responsibility rather than an information security responsibility of an individual company.<\/p>\n<p style=\"text-align: justify;\">There are two immediate actions that the Government may contemplate.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\">1. First requirement is to provide some kind of a defense cover to the Indian corporates by offering financial support directly promoting higher cyber security investments by corporates. This could be in the form of setting up a National Secured Data Center at different parts of the country where in companies can be provided DR hosting facilities at a reasonable cost.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\">2.\u00a0Second is to \u00a0recognize that such attacks on private citizens of one country by another state actor \u00a0is \u00a0&#8220;Terrorism&#8221; and handled as such by the international community India should join an international consortium with US to develop a &#8220;Global Cyber Security Force of Democratic Nations&#8221; that can attack and bring down the rogue states who mount cyber wars on the citizens of other countries. \u00a0This should be\u00a0discussed during the visit of Mr Obama to India during the next month.<\/p>\n<p style=\"text-align: justify;\">The Sony attack is a defining moment in the global cyber security and we cannot afford to ignore the event as the next such attack can come upon one of our own global players.<\/p>\n<p style=\"text-align: justify;\">Naavi<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><strong>\u00a0Related Articles:<\/strong><\/p>\n<p style=\"padding-left: 60px; text-align: justify;\"><a href=\"http:\/\/www.marketwatch.com\/story\/5-ways-the-sony-hack-attack-will-change-cybersecurity-2014-12-19\" target=\"_blank\">5 ways how Sony Hack will Change how America will do business<\/a><\/p>\n<p style=\"padding-left: 60px; text-align: justify;\"><a href=\"http:\/\/www.hollywoodreporter.com\/topic\/sony-hack\" target=\"_blank\">Hollywood Reporter<\/a><\/p>\n<p style=\"padding-left: 60px; text-align: justify;\"><a href=\"http:\/\/www.securityweek.com\/hackers-used-sophisticated-smb-worm-tool-attack-sony\" target=\"_blank\">Security Week<\/a><\/p>\n<p style=\"padding-left: 60px; text-align: justify;\"><a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST13-003\" target=\"_blank\">US Cert Advisory<\/a><\/p>\n<p style=\"padding-left: 30px; text-align: justify;\">\n","protected":false},"excerpt":{"rendered":"<p>It appears that the hacking of Sony pictures in which corporate data has been destroyed and compromised has exposed the new dimension of a kind of Cyber warfare. According to FBI, the hack was attributed to North Korean Government and &hellip; <a href=\"https:\/\/www.naavi.org\/wp\/sony-experience-changed-security-perception-indian-government-respond\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-2624","post","type-post","status-publish","format-standard","hentry","category-cyber-law"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false},"uagb_author_info":{"display_name":"Vijayashankar Na","author_link":"https:\/\/www.naavi.org\/wp\/author\/naavi\/"},"uagb_comment_info":0,"uagb_excerpt":"It appears that the hacking of Sony pictures in which corporate data has been destroyed and compromised has exposed the new dimension of a kind of Cyber warfare. According to FBI, the hack was attributed to North Korean Government and &hellip; Continue reading &rarr;","_links":{"self":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts\/2624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/comments?post=2624"}],"version-history":[{"count":7,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts\/2624\/revisions"}],"predecessor-version":[{"id":2630,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts\/2624\/revisions\/2630"}],"wp:attachment":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/media?parent=2624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/categories?post=2624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/tags?post=2624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}