The International Anti
Terrorism Forces have once again been shaken up from their complacency after the
Bali terrorists attack. We in India which has been a witness to Akshardham
attack recently can see that there is a pattern to the two attacks which
could lead to some thoughts that are relevant to Cyber Space Security.
Both the Bali Club and
Akshardham were "Soft Targets" for the terrorists. Both targets were far
removed from any policies affecting the Terrorist's professed cause unlike a BSF
picket in Srinagar or the White House. The victims were also not in anyway
concerned with the issues for which the terrorist outfits are fighting. But
still, the attacks succeeded in creating a panic amongst public and it will take
several years for public to get out of the fear psychosis they have been driven
to.
There is no doubt that Bali will
perhaps be erased from the tourist map of many countries and Indonesia needs to
rework their tourist economics. Similarly, temples in India need to look at
"Frisking" and "Installing Metal Detectors" to screen the devotees. Imagine the
aberration when the pilgrims chanting "Govinda, Govinda" in Tirupati are
stopped and subjected to frisking. Many will consider this a loss of sanctity of
the temple and reduce their visits. Sociologists need to study the possible
impact of such change of perceptions and whether this will add fuel to fire.
In fact ,it is difficult to say
if the same effect could have been achieved if an army barrack had been
attacked. We must therefore admit that the terrorists have succeeded in their
objective of "Dividing the Society" through these attacks.
Despite recognizing the
disastrous impact of such attacks, the tragedy is that the Government or the law
enforcement Authorities cannot ensure that such acts would not be repeated. The
world is so big that, there will be many more soft targets available to a
determined terrorist particularly if he is from a suicide squad.
In finding a solution to
terrorism, we therefore need to look at such steps that make the attacks
difficult and less productive for the terrorist so that in course of time the
motivation for such attacks die down.
These principles are universal
principles that apply even to Cyber Space Security. In Cyber Space, the
terrorist attacks take the shape of " Un authorised Access" to Information Space
and theft, manipulation or destruction of information. Just as in the case
of Meta Society terrorism, attacks on soft targets are more effective than the
attacks on defense establishments, Cyber terrorists will consider it a better
strategy to attack soft targets and create a feeling that Cyber Space Activity
is unsafe and unfit for commerce.
This can be done by an
intelligent attack on bazee.com or nse-india.com rather than on the Ministry of
Defense website. Attacks on Infy.com or wiprotechnologies.com, or
cherrysoft.co.in
may unnerve the vibrant IT industry to the extent that the confidence on these
companies enjoy with their customers will be eroded.
The first step to find a defense
against Cyber Terrorism is therefore to reduce the presence of soft targets and
make it difficult and less productive for terrorists to conduct successful soft
target attacks.
This should start with
instilling a minimum security awareness amongst the people concerned.
It must be noted that after the
Akshardham attack, many temples and hospitals who consider themselves to be soft
targets for terrorist attacks have shown an inclination to go for insurance
cover for their customers in some form. If these non commercial organizations
can think of such insurance coverage, there is no reason why Corporate networks
do not cover themselves and the users through an insurance programme that
provides some protection against terrorist attacks.
If such insurance programmes
have to succeed, then there has to be some process by which the security
measures taken by a Company are certified. Also, in order to indemnify the
insurance companies, the security measures should also be "Cyber Law Compliant".
A "Techno Legal Security
Compliance Audit is therefore a pre-requisite to development of an Insurance
Plan".
Such an audit should help the
companies develop a "Cyber Space Security Policy" which eventually should
aggregate to cover the 20 million Netizens supporting over Rs 7500 crores
of E-Business per year.
To make such an effort
effective, IT Companies who have a large stake in Information Assets of the
Country have to come together along with like minded individuals to form a
consortium that can pool all available resources and provide leadership for an
effective anti-cyber terrorism action plan.
naavi.org invites the
suggestions of public in this regard and wants to identify people who can assist
in the process.
Naavi
October 15, 2002
Related Article:
National Security Policy for US-A report (PDF Document)