The insightful articles, inspiring narrations and analytical perspectives presented by the Editorial Team, establish an alluring connect with the reader. My compliments and best wishes to SP Guide Publications.
"Over the past 60 years, the growth of SP Guide Publications has mirrored the rising stature of Indian Navy. Its well-researched and informative magazines on Defence and Aerospace sector have served to shape an educated opinion of our military personnel, policy makers and the public alike. I wish SP's Publication team continued success, fair winds and following seas in all future endeavour!"
Since, its inception in 1964, SP Guide Publications has consistently demonstrated commitment to high-quality journalism in the aerospace and defence sectors, earning a well-deserved reputation as Asia's largest media house in this domain. I wish SP Guide Publications continued success in its pursuit of excellence.
The telecom department has sought the National Information Board’s (NIB) approval on the draft telecommunication security policy. The NIB is India’s top policy-making wing on cyber security headed by National Security Advisor Shiv Shankar Menon. The NIB’s views are critical since national law enforcement agencies (LEAs) will be closely involved in implementing the telecom security policy with the Department of Telecommunications.
India’s draft telecom security policy rues the country’s “heavy dependence on imported core telecom equipment,” which it claims has made “domestic telephone networks more vulnerable to unforeseen threats as they can be managed remotely”. The decision to frame telecom security standards was largely induced by the Home Ministry’s concerns about Chinese gearmakers, which had rocked the country’s telecoms space three years ago and delayed network expansion plans of several mobile phone companies.
More recently, a government panel had also recommended that India emulate the US model and run detailed audits on hardware and software used in telecom networks, and even undertake periodic checks for unauthorised electronics or suspicious gear capable of duplicating or redirecting data.
The telecom security regulations also build a strong case for creating indigenous capacity of software and electronics used in telecom networks. They even indicate “effective systems, processes and regulations would be in place to arm LEAs to continuously monitor telecom networks for intrusions, attacks or other forms of fraudulent activity.”