Describe the motivations behind state and non-state actors’ targeting of the Critical Information Infrastructure (CII). Talk about the measures the Indian government took to protect their CII as well.
In a multi-process operating system, the resource allocation algorithm is known as the Banker's Algorithm. It is utilized to manage resource allocation. It's used to make sure that a group of programs on a single computer can share the resources they have (like CPU time, memory, I/O devices, etc.).Read more
In a multi-process operating system, the resource allocation algorithm is known as the Banker’s Algorithm. It is utilized to manage resource allocation. It’s used to make sure that a group of programs on a single computer can share the resources they have (like CPU time, memory, I/O devices, etc.). fairly and effectively.
The Investor’s Calculation works by reproducing a ledger for each interaction, where the assets distributed to the cycle are treated as stores into the record. The process’s “funds,” or resources, are checked by the algorithm to see if they are sufficient to allocate the requested resources. In the event that it does, the allocation is carried out, and the process’s account is updated in line with this. The allocation is stopped until sufficient resources are available.
The algorithm ensures that no process can acquire more resources than it has been allocated and that no process can exceed its resources. This ensures that processes can run safely and effectively while also preventing deadlocks.
See less
According to Information Technology Act, 2000, Critical Information Infrastructures (CII) are vital computer resources that, if incapacitated or destroyed, will leave a debilitating impact on national security, economy, public health or safety across both public and private sectors. Their significanRead more
According to Information Technology Act, 2000, Critical Information Infrastructures (CII) are vital computer resources that, if incapacitated or destroyed, will leave a debilitating impact on national security, economy, public health or safety across both public and private sectors. Their significance is well understood and hence they are also target of attacks by adversarial state and non-state actors. Broadly such attacks lead to information system compromise, control takeover, component destruction, and sensitive information extraction.
Reasons behind targeting of Critical Information Infrastructure (CII) by state and non-state actors
Challenges in protecting the CIIs
Steps taken by Govt to protect Critical information infrastructure
There is a requirement for better understanding of vulnerabilities, including interdependencies between infrastructures. Hence, we need to evolve a comprehensive security policy to address the physical, legal, cyber and human dimensions of security.
See less