Express Computer
Home  »  Downloads  »  Resources  »  Security  »  APT emerging as a major threat vector being used against India

APT emerging as a major threat vector being used against India

Information security audits conducted by CDAC over the years has found that APT has been stealthily residing in the systems and collecting and stealing information whether required or not, says CH A S Murty, Associate Director, CDAC

0 389

The vulnerabilities of cyber security in any organisation, be it private, Govt, enterprises, hospitals, etc is eventually a national security issue. In the pandemic period, the hostilities with China escalated with tensions at the LAC and the situation with Pakistan has always been tense.

Among other threats, the Advance Persistent Threat (APT) is causing serious concern for India, “We have been doing information security audits since 2014 and also conducting training for organisations. It is found that APT has been stealthily residing in the systems and collecting and stealing information whether required or not. The level of skills in the organisations is lacking depth to handle such threats,” says CH A S Murty, Associate Director, CDAC.

Gaining New Insights into the Data Movement – with Modern Network and Edge

There is a dire need for organisations to move from siloed IT audits to all systems being audited together. “The audits currently are happening in a siloed format – of individual servers, devices, etc and OT devices are audited separately from that of the IT devices. These narrow audit approaches will only expose the vulnerabilities restricted to that particular device but an overall audit will actually put the spotlight on APT hidings,” explains Murty.

There is a structured way of doing audits. In three ways. Firstly, framework based audit. This way, the policies and people are all audited together for adherence to various regulatory policies, etc. Secondly, abuse based audits, nabs the long term APTs hiding in the systems. The technical audit is the third audit type. It combines the type 1 and type 2 audit. “We have found many gap areas in organisations, when undertaking audits of all three types. The companies are also lacking in giving proper weightage to information security however it’s absent. IS is still perceived as a technical issue,” finds Murty.

CH A S Murty, Associate Director, CDAC was expressing his views during the vRoundtable organised by Express Computer in partnership with Forcepoint

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image