Cybersecurity

Science & Technology
Constitution VerifiedUPSC Verified
Version 1Updated 10 Mar 2026

The Information Technology Act, 2000, as amended, serves as the primary legal framework governing cybersecurity in India. Its preamble states its objective: 'An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as 'electronic commerce', which involve the use of alternatives to pape…

Quick Summary

Cybersecurity is the comprehensive practice of protecting digital systems, networks, and data from malicious attacks, damage, or unauthorized access. It operates on the fundamental principles of Confidentiality, Integrity, and Availability (CIA triad).

Confidentiality ensures data privacy, integrity maintains data accuracy, and availability guarantees access when needed. Key components include network security (firewalls, IDS/IPS), endpoint security (antivirus, EDR), application security (secure coding, WAFs), data security (encryption, DLP), and cloud security.

The threat landscape is dynamic, encompassing malware (viruses, ransomware), phishing, Advanced Persistent Threats (APTs), and emerging risks from IoT, AI, and supply chain vulnerabilities. India's cybersecurity framework is anchored by the Information Technology Act, 2000, which defines cybercrimes and establishes regulatory bodies.

CERT-In (Indian Computer Emergency Response Team) is the national nodal agency for incident response, while NCIIPC (National Critical Information Infrastructure Protection Centre) safeguards vital national assets.

The National Cyber Security Strategy aims to create a resilient cyberspace, complemented by sector-specific guidelines from RBI, SEBI, and TRAI. The recently enacted Digital Personal Data Protection Act, 2023, significantly strengthens data privacy and security mandates.

International cooperation, through forums like the UN GGE and bilateral agreements, is crucial as cyber threats are borderless. Understanding these technical, legal, and policy dimensions is essential for a holistic grasp of cybersecurity.

Vyyuha
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single.…
  • IT Act 2000: Primary cyber law in India.
  • IT Act 2008: Major amendments, introduced cyber terrorism (Sec 66F).
  • CERT-In: National nodal agency for cyber incidents (Sec 70B IT Act).
  • NCIIPC: Protects Critical Information Infrastructure (Sec 70A IT Act).
  • DPDP Act 2023: India's data protection law, mandates security safeguards.
  • Article 21: Right to Privacy (Puttaswamy judgment) linked to digital privacy.
  • CIA Triad: Confidentiality, Integrity, Availability – core cybersecurity principles.
  • Malware: Malicious software (viruses, worms, ransomware).
  • Phishing: Social engineering via deceptive communication.
  • Ransomware: Encrypts data, demands payment.
  • APT: Advanced Persistent Threat, sophisticated, long-term attack.
  • NIST CSF: Identify, Protect, Detect, Respond, Recover (5 functions).
  • ISO 27001: International standard for Information Security Management System (ISMS).
  • Symmetric Cryptography: Single key (e.g., AES).
  • Asymmetric Cryptography: Public/private key pair (e.g., RSA, ECC).
  • Hashing: One-way function for data integrity (e.g., SHA-256).
  • PKI: Public Key Infrastructure, manages digital certificates.
  • TLS/SSL: Secures web communication (HTTPS).
  • SSH: Secure remote access protocol.
  • IPSec: Secures IP communications.
  • SOC: Security Operations Center, monitors and responds to incidents.
  • Cyber Warfare: State-sponsored attacks (espionage, sabotage).
  • Cyber Surakshit Bharat: Capacity building initiative.
  • RBI Cyber Guidelines: For banks and financial institutions.
  • SEBI Cyber Resilience: For market intermediaries.
  • TRAI Security Guidelines: For telecom service providers.
  • Budapest Convention: International treaty on cybercrime (India not ratified).
  • UN GGE: Discusses norms of state behavior in cyberspace.
  • AIIMS Cyberattack (2022): Major incident on healthcare CII.
  • Zero Trust: 'Never trust, always verify' security model.
  • Supply Chain Attack: Targeting third-party vendors.
  • Deepfakes: AI-generated fake media, used in fraud.
  • Quantum Computing: Future threat to current encryption.
  • Section 66A IT Act: Struck down by Shreya Singhal judgment (freedom of speech).
  • Data Fiduciary: Entity processing personal data (DPDP Act).
  • Data Principal: Individual whose data is processed (DPDP Act).
  • Cyber Espionage: Stealing state/corporate secrets.
  • Cyber Sabotage: Disrupting critical systems.
  • Attribution: Identifying cyberattack perpetrators, often difficult.
  • Digital India: Initiatives requiring robust cybersecurity.
  • ICET: India-US Initiative on Critical and Emerging Technologies.
  • G20: Forum for international cyber cooperation.
  • MeitY: Ministry of Electronics and Information Technology, nodal ministry for cyber policy.
  • Cyber Deterrence: Preventing attacks through threat of retaliation.

Vyyuha Quick Recall: CYBER-SHIELD Framework

C - Confidentiality, Integrity, Availability (CIA Triad) Y - Yearning for Data Protection (DPDP Act, Article 21) B - Borderless Threats (Cyber warfare, International Cooperation) E - Emerging Technologies (AI, Quantum, IoT risks) R - Regulatory Framework (IT Act, CERT-In, NCIIPC)

S - Supply Chain Security (Vulnerabilities, Mitigation) H - Human Element (Awareness, Training, Phishing) I - Incident Response (SOC, Detection, Recovery) E - Endpoint & Network Security (Firewalls, Encryption, Protocols) L - Legal & Policy Gaps (Implementation, New Laws) D - Defense-in-Depth (Layered Security Approach)

Featured
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.
Ad Space
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.