Counter cyber attackers with same tech they use: NTRO Chief
The technology used by cyber attackers like malwares and tor can be used to counter them, a top official of country`s technical intelligence body NTRO said Monday.
New Delhi: The technology used by cyber attackers like malwares and tor can be used to counter them, a top official of country`s technical intelligence body NTRO said Monday.
"You keep on hearing about cookies, proxies then anonymous services like onion routing, tor or honey pod. These are kind of things used by attackers. Same technology can be used to counter them," NTRO Chairman Alhad G Apte said at a two-day summit organised by industry chamber Assocham.
The Chairman of National Technical Research Organization said that method to address cyber security issues have to be through new approaches but the situation is not as grim as it is sometimes made out to be.
He said intrusion detection systems which finds out cyber attack made on infrastructure can be used in predictive analysis of the attack so as to minimise the response time for new types of attack.
"For effective cyber security we should first create convenient system for acceptable use of cyber world. We tend to put more and more restriction and sometime these restrictions become counterproductive," Apte said.
He called for strong cooperation among all stakeholders connected with cyber space for dealing with cyber security issues.
"This is a borderless state and breach is likely to result in some kind of national security issues," Apte said
Speaking on the occasion, Ex-Centre Director of National Critical Information Infrastructure Protection Centre, Muktesh Chander said that people always knew about vulnerability of coastal borders but security has been beefed up after Mumbai attack.v
"Let us not repeat this mistake of waking up after disaster. A digital Pearl Harbour need not happen to make us realise dangers of cyber space on our national security," Chander said.
He said we need to our guard our secrets in cyber world from large scale cyber espionage.
"Prevention and detection of cyber attack and if need be retaliation in cyber space is the need of the hour," Chander said.