and the use of cryptography, every computer or even every molecule could be given a traceable ownership.
The following items indicate priority areas for further research.
sensors for predictive analysis based on the flow at the backbone level
data mining tools not only to predict attacks in advance, but also to predict low-intensity, long-duration attacks and the formation of groups
data mining to interlink apparently unconnected events
recovery procedures and CERT-In
use of cryptography
In today’s borderless world, protecting the world is everyone’s business. Terrorism was once the problem of the developing nations. Today, it is everyone’s problem. If we see terrorism in some other part of the world and keep quiet, we will live to regret it, because it will reach our doorstep very soon.
Under Indo-U.S. collaboration, it is necessary to share our experiences and expertise in information and communication security. To begin this process, experts from the two countries could develop a framework to be used by governments in protecting the cyberspace of each nation. This framework could involve regulatory mechanisms, technologies for developing monitoring sensors and analysis capability to predict intrusions well in advance. The second major area for collaboration is the creation of cybersecurity awareness across a wide spectrum of users, including homemakers, students, corporations, software and hardware developers, vendors, and government officials. Such awareness would greatly facilitate our efforts to protect the infrastructures of both nations.