kratikal.com Open in urlscan Pro
34.93.237.227  Public Scan

Submitted URL: https://www.kratikal.com/blog/cyber-jagrukta-divas-mha-initiative?utm_source=emails&utm_medium=email_marketing&utm_campai...
Effective URL: https://kratikal.com/blog/cyber-jagrukta-divas-mha-initiative/?utm_source=emails&utm_medium=email_marketing&utm_campa...
Submission: On October 26 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://kratikal.com/blog/

<form role="search" method="get" class="search-form" action="https://kratikal.com/blog/">
  <label for="">
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST https://kratikal.com/blog/wp-comments-post.php

<form action="https://kratikal.com/blog/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> Required fields are marked <span class="required">*</span></p>
  <p class="comment-form-comment"><label for="comment">Comment</label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
  <p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
  <p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="email" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"></p>
  <p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="url" value="" size="30" maxlength="200"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="7093" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
</form>

POST https://campaigns.zoho.com/weboptin.zc

<form class="zh_formcont" method="POST" id="zcampaignOptinForm" target="_zcSignup" action="https://campaigns.zoho.com/weboptin.zc">
  <div style="padding-right: 50px; box-sizing: border-box">
    <div style="background-color: rgb(255, 235, 232); padding: 10px; color: rgb(210, 0, 0); font-size: 11px; margin: 0px 15px; border: 1px solid rgb(255, 217, 211); width: 100%; position: relative; display: none" id="errorMsgDiv"
      changetype="SIGNUP_ERROR"> &nbsp;&nbsp;Please correct the marked field(s) below. </div>
  </div>
  <div id="SIGNUP_TEXT" name="SIGNUP_TEXT" changeitem="SIGNUP_TEXT" changetype="SIGNUP_TEXT" class="csrdrag zh_magicforhedone"
    style="position: relative; left: 38px; top: 41px; color: rgb(255, 255, 255); width: 485px; font-size: 24px; font-family: Tahoma"></div>
  <div class="zh_magicforhedtwo csrdrag" id="SIGNUP_DESC" name="SIGNUP_DESC" changeitem="SIGNUP_DESC" changetype="SIGNUP_HEADER"
    style="position: relative; height: 82px; left: 50px; top: 40px; font-family: Tahoma; color: rgb(255, 255, 255); width: 374px; font-size: 18px"></div>
  <div class="zh_frominpcont" style="height: 44px; width: 277px"> <input class="zh_forminput csrdrag" name="CONTACT_EMAIL" changetype="CONTACT_EMAIL" changeitem="SIGNUP_FORM_FIELD" type="text" id="CONTACT_EMAIL" placeholder="Email" autocomplete="off"
      style="font-size: 16px; left: -96px; top: 82px; color: rgb(0, 0, 0)"> </div>
  <div class="zh_frombtncont" style="height: 48px; width: 187px"> <input class="zh_forminputbtn csrdrag" type="button" name="SIGNUP_SUBMIT_BUTTON" changetype="SIGNUP_SUBMIT_BUTTON" id="zcWebOptin" value="Yes, count me in!"
      style="position: relative; left: -53px; top: 86px; background-color: rgb(255, 255, 255); font-family: Tahoma; color: rgb(68, 67, 67); border-color: rgb(255, 137, 20); text-transform: none; font-size: 16px"
      onclick="saveOptin(this,false,function(){},'#sf3z4bf8a0af3698f010cb508d345bcfcbe4ba8976a6a7598db014be12d4b325ca06[data-type=&quot;signupform_0&quot;] ',event);"> </div>
  <div><!-- Do not edit the below Zoho Campaigns hidden tags -->
    <input type="hidden" id="fieldBorder" value="" onload=""><input type="hidden" name="zc_trackCode" id="zc_trackCode" value="ZCFORMVIEW"><input type="hidden" id="submitType" name="submitType" value="optinCustomView">
    <input type="hidden" name="zx" id="cmpZuid" value="12853a144">
    <input type="hidden" name="zcvers" value="2.0"><input type="hidden" id="mode" name="mode" value="OptinCreateView"><input type="hidden" id="document_domain" value="">
    <input type="hidden" id="zc_Url" value="akue-zgph.maillist-manage.com">
    <input type="hidden" id="new_optin_response_in" value="0">
    <input type="hidden" id="duplicate_optin_response_in" value="0">
    <input type="hidden" id="zcFormType" name="zcFormType" value="POPUPFORM">
    <input type="hidden" id="zc_formIx" name="zc_formIx" value="3z4bf8a0af3698f010cb508d345bcfcbe4ba8976a6a7598db014be12d4b325ca06">
    <!-- End of the campaigns hidden tags -->
    <input type="hidden" id="ZCMP_close" value="1">
  </div><input type="text" style="display:none !important;" name="qs" class="ih"><input type="text" style="display:none !important;" name="lf" class="ih" value="1666798555100"><input type="hidden" name="di" value="1143587195371215991666798555101">
</form>

Text Content

Skip to content
 * Home
 * About Us
 * Contact Us
 * Partners

 * 
 * 
 * 
 * 
 * 

Kratikal Blogs

Information Hub For Cyber Security Experts


KRATIKAL BLOGS

One stop platform of the latest cyber security news, reports, trends, stats and
much more!

 * 
 * 
 * 
 * 
 * 

Menu
 * All Blogs
 * Cyber Security
 * Phishing
 * Cyber Security Buffs
 * Ransomware
 * News Shots
 * CEO’s Desk

Search for:

Categories
Cyber Awareness


CYBER JAGRUKTA DIVAS: A MINISTRY OF HOME AFFAIRS INITIATIVE

June 16, 2022June 25, 2022
8 mins read
 * 
 * 
 * 
 * 


> आज का संकल्प, कल की सुरक्षा

India is among the fastest growing countries in the world in terms of
digitization and technological advancement. Over the past few years, the Indian
government has employed several programmes and schemes to ensure the proper
fulfilment of the infrastructural requirements to facilitate such growth.
However, with rapid technological development and increased use of the internet
comes the growing risk of cybercrimes. This has generated a huge demand for a
proper cybersecurity framework.

The two most important growth parameters that determine the strength of
cybersecurity infrastructure are security and sustainability. The current
cybersecurity landscape of India needs to evolve in tandem with the increasing
rate of cybercrimes. Recognizing this need, the Indian government has rolled out
initiatives such as Cyber Surakhsit Bharat, Cyber Jagrukta Divas, Cyber Suraksha
Kendra, etc., to support the growth and development of the country’s
cybersecurity infrastructure.

The government also observed that 60% of the cyber crime complaints are related
to financial fraud. To address the situation, the MHA launched the Citizen
Financial Cyber Fraud Reporting & Management System (CFCFRMS), which will act as
an immediate response mechanism for stopping and preventing the theft of funds
by threat actors. In addition, the government recognizes the fact that human
negligence and lack of awareness amongst employees are the prominent causes of
cybercrimes in the country. To address this issue, the Cyber Jagrukta Divas
initiative was launched by the Ministry of Home Affairs.

So, here is all you need to know about this promising initiative.


WHAT IS CYBER JAGRUKTA DIVAS?

Cyber Jagrukta Divas is a government initiative that has been brought under the
I4C scheme to raise cybersecurity awareness among public sector undertakings
(PSUs), panchayat raj institutions (PRIs), universities, schools, etc. The exact
guidelines relayed by the Home Ministry are that the above-mentioned
institutions must carry out an awareness campaign on the first Wednesday of each
month for at least an hour.

The MHA has asked the offices and branches of all the states and union
territories to observe Cyber Jagrukta Divas and prepare a comprehensive “Annual
Action Plan“ that will act as a nodal guideline for year-round awareness
campaigns. The Cyber Jagrukta Divas initiative will be administered by the MHA
under the purview of the I4C scheme.

The government has also made provisions in its budgetary proposal for the
acknowledgment of 5-10 employees from each organisation, who have made
exceptional contributions to generating cybersecurity awareness against
cybercrimes. The Ministries are also asked to recognize the officials as “Cyber
Star of the Month” as a reward and motivation to appreciate their effort.


WHAT IS THE I4C SCHEME?

The Indian Cyber Crime Coordination Centre (I4C) was incorporated and
established by the Ministry of Home Affairs to empower and strengthen the
capabilities of regulatory and law enforcement agencies. The I4C scheme is
responsible for acting as a nodal point in the fight against cyber attacks. The
departments under this scheme are provided with the responsibility of conducting
research and development to identify the needs and problems of law enforcement
agencies, incorporating the forensic tools and techniques developed in
collaboration with research or academic institutions.


TOPICS TO BE COVERED UNDER CYBER JAGRUKTA DIVAS

The Ministry of Home Affairs has suggested a set of topics that must be covered
under the annual action plan for generating cybersecurity awareness in
organisations. These topics are divided into four major units. The annual action
plan that is required to be prepared by every organisation must comprise these
four units. However, each of the institutions has the flexibility to choose
amongst the given topics for developing their action plan.


UNIT 1: CYBER CRIMES AND SAFETY

The topics covered in the first unit are:

 * Introduction to cybercrimes
 * Kinds of cybercrimes: phishing, identify theft, cyber stalking, cyber
   obscenity, computer vandalism, ransomware, identity theft
 * Spotting fake apps and fake news on social media and the internet (fake email
   messages, fake post, fake whatsapp messages, fake customer care/toll-free
   numbers, fake jobs)
 * Internet ethics, internet addiction, ATM scams, online shopping threats,
   lottery emails/SMS, debit/credit card fraud, email security, mobile phone
   security
 * Mobile apps security, USB storage device security
 * Mobile connectivity security attacks (Bluetooth, Wi-Fi, Mobile as USB)
 * Preventive measures to be taken in cyber space, reporting of cybercrime
 * Forgery and fraud from mobile devices
 * Cyber risk associated with varied online activities and protection therefrom
 * Work on different digital platforms safely
 * Online cybercrimes against women and impersonation scams
 * Safety in online financial transactions


UNIT 2: CONCEPT AND USE OF CYBER HYGIENE IN DAILY LIFE

 * Browser security, desktop security, UPI security, juice jacking, Google map
   security, OTP fraud
 * IoT security, Wi-Fi security, spotting fake apps on social media and internet
   (fake email messages, fake post, fake whatsapp messages, fake customer
   care/toll free numbers, fake jobs)
 * Internet ethics, internet addiction, ATM scams, online shopping threats,
   lottery emails/SMS, loan frauds
 * How to avoid social engineering attacks, debit/credit card fraud, email
   security, mobile phone security, mobile apps security, USB storage device
   security, data security
 * Mobile connectivity security attacks (Bluetooth, Wi-Fi), mobile as USB,
   broadband internet security
 * Preventive measures to be taken in cyberspace, reporting of cyber crime


UNIT 3: INTRODUCTION TO SOCIAL NETWORKS

 * Social network and its contents like blogs
 * Safe and proper use of social networks, inappropriate content on social
   networks
 * Flagging and reporting of inappropriate content


UNIT 4: ELECTRONIC PAYMENTS AND SAFEGUARD THEREIN

 * Concept of e-payments, ATM and tele banking
 * Immediate payment systems, Mobile money transfer and e-wallets
 * Unified Payment Interface (UPI)
 * Cybercrimes in electronic payments
 * KYC: Concept, cases, and safeguards




WHY DID THE HOME MINISTRY LAUNCH THIS INITIATIVE?

There are several factors that encouraged the ministry to launch this
cybersecurity initiative. Some of the major ones are:


RISING NUMBER OF CYBER ATTACKS IN THE COUNTRY

 * In May 2021, Air India suffered a data breach (through a supply chain attack)
   and the personal data of 4.5 million passengers was compromised.
 * In the same month, test results and personally identifiable information (PII)
   of 190,000 CAT applicants were leaked on the dark web.
 * The personally identifiable information (PII) of 500,000 Indian police
   officers was leaked and sold in February 2021.
 * In January 2021, the COVID-19 test results of at least 1500 patients were
   leaked with all their personal information, which was regarded as a breach of
   the Indian healthcare system.
 * Recently, over 70 Indian government and private websites were hacked by a
   hacktivist group named “DragonForce Malaysia” and religious extremist
   messages were displayed.


GROWING INTENSITY OF HYBRID WARFARE

In early 2022, Russia invaded Ukraine and the war is still going on. However,
the war is being fought not only on the battlefield but also in cyberspace. This
has raised alarms for all countries to not only prepare themselves against their
enemies through weapons but also incorporate robust cyber security
infrastructure to defend against cyber attacks. In hybrid warfare,
state-sponsored threat actors can cripple the digital system of the target
country. So, India needs to establish a robust cyber security framework to
protect its critical infrastructure.


LAYING FOUNDATION OF THE NATION’S CYBER SECURITY STRATEGY

The government of India is still far from establishing a clear National Cyber
Security Strategy. In addition to the introduction of the Cyber Jagrukta Divas
initiative, the government has put into place several ongoing initiatives and
policies to address the issue of rising cybercrimes. The government, through its
various ministries, is looking to transform the reactive mechanism for
responding to cyber crimes into a proactive approach toward cyber security. The
government is working on transforming cybersecurity best practices and
guidelines into strategies through various initiatives and regulatory bodies.


SECURING GOVERNMENT ORGANISATIONS

State and central PSUs are the organisations primarily targeted by the Cyber
Jagrukta Divas initiative. The motive of the initiative is to secure government
institutions and to prevent any kind of damage to these organisations. The
initiative will prepare organisations to defend themselves against prominent
cyber threats such as ransomware attacks, DDoS attacks, phishing, spoofing, BEC
attacks, etc. The primary goal of the Cyber Jagrukta Divas initiative is to
raise cyber awareness among the employees of government organisations as
employees serve as the first line of defence against cyber attacks.




“CYBER HYGIENE” IS THE GOAL OF CYBER JAGRUKTA DIVAS

The Home Ministry has come up with the Cyber Jagrukta Divas initiative to
improve the cyber hygiene of the country’s institutions, especially those
regulated by the government. This initiative will facilitate the capacity
building of government organisations and their employees to handle the issues
related to cybercrime. The MHA is also looking into this initiative as an
opportunity to spread cybersecurity awareness regarding how to report cyber
crime. The government has established a couple of cyber crime portals to address
the fraud and breaches in a systematic manner. In the long run, this initiative
will make the employees of government organisations vigilant and cyber aware.

KUMAR SHANTANU



See author's posts


BY KUMAR SHANTANU



View all of Kumar Shantanu's posts.


POST NAVIGATION

Next: Master Directions to NBFCs by RBI

Next: Government Institutions in India: A Popular Target for Hackers



RELATED POST

WOMAN LOSES RS. 95,000 BY CALLING FAKE SWIGGY GO HELPLINE

September 13, 2019May 5, 2022
3 mins Read

REASONS WHY ORGANIZATIONS SHOULD CHOOSE THREATCOP

June 3, 2019
3 mins Read

THOUSANDS OF PAYMENT CARDS’ INFORMATION STOLEN FROM MORE THAN 105 E-COMMERCIAL
WEBSITES

May 11, 2019May 5, 2022
3 mins Read

LOG4SHELL: THE NEW ZERO-DAY VULNERABILITY IN LOG4J

December 15, 2021February 11, 2022
7 mins Read


LEAVE A COMMENT CANCEL REPLY

Your email address will not be published. Required fields are marked *

Comment

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.




WHY US

Kratikal Tech. Pvt. Ltd. is the trusted standard for companies and individuals
acquiring services to protect their brands, business and dignity from baffling
Cyber attacks.


ADDRESS

A-130, Second Floor, Sector-63, Noida

For Sales:

sales@kratikal.com | +91 8826990982

For Career:

hr@kratikal.com | +91 9319394613



Copyright © 2020 All Rights Reserved.

Copyright © 2020 All Rights Reserved.

Share
Tweet
Share
Share
Email
Share

Kratikal Tech Pvt. Ltd.
classic_popup_15

  Please correct the marked field(s) below.






  Vielen Dank für Ihre Registrierung