After demonetization policy cyber security continues to be a major concern in the digital payment ecosystem. An exponential growth in online transactions post demonetization has attracted interest of cyber criminals, who can potentially target online payment platforms. Given the fact that more people will now inevitably opt for online payment, it is very critical both for users and digital payment solution providers to maintain a high level security posture to safeguard themselves from the menace of cyber criminals.
The Indian cyber security establishment is still in a rudimentary stage, with a lot of loopholes in the current cyber policy. A key opportunity for strategy moving forward is to focus on our cyber assets. Consequently we have designed a special issue on “cyber security’ with specific articles on cyber security, cyber crime, cashless transaction issues, hacking etc.
India needs to be proactive rather than reactive to ensure safety of its cyber assets. Two things set aside India’s digital spaces from that of major powers such as the United States and China: design and density. The demand for cyber security engineers is growing exponentially. The future of engineers graduating in cyber security is looking bright as rising threat to businesses is resulting in a huge demand for such students.
Malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult, in some cases perhaps even impossible, to reliably and confidently attribute actions in cyberspace to individuals. The reason cyber attribution is difficult stems at least in part from a lack of end-to-end accountability in the current Internet infrastructure. A large part of the problem is due to the fact that the country lags behind – both in terms of quality as well as quantity — in cyber security-related skilled workers. “To achieve the objectives of Digital India, the country needs a robust cyber security infrastructure — both in terms of personnel and technology
Other countries have taken simulations seriously and figure the best methods to a secure set up. Instead of being clueless, if you simulate a potential threat, you are better prepared and capable in terms of capability – mentally and psychologically. We need anti-malware signatures with the latest technologies. We need to be mentally alert all the time, and with our systems. Instead of foreign tech, we need to develop indigenous technologies. The time has come to shift the focus towards cyber security. Cyber is the future and the day is not far when everything will be digital. And this will give more opportunities to the cyber criminals and hackers and the crime scene will be dominated by cyber criminals and cyber terrorists.
With warm regards
Shashank Kr. Dwivedi