Need for cybersecurity policy

Computer security (also known as cybersecurity or IT security) is information security as applied to computers and computer networks.
The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. There are three core principles of cyber security:
Confidentiality, Integrity, and Availability.

Cybersecurity standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cybersecurity attacks. Although USA, Germany and South Korea have well developed cybersecurity standards, India has none remarkable. The worldwide security technology and services market is forecast to reach $67.2 billion in 2013, up 8.7 percent that in 2012 and we need to brace up for the market demand.

The following are a few examples of what happens if cybersecurity is neglected:
1) Give access to commercial information that would enable a competitor to overtake us in the market
2) Personal data that is exchanged and exploited by criminals for financial gain
3) Loss or alteration of valuable stored information
4) Cyberwarfare

It is almost confirmed that the NSA of USA has been spying on almost every netizen on this planet. Cyberwarfare attempt on Syria was evident from Stuxnet a virus which made headlines after Kaspersky reported on its existence many months after it was released. Attempts to hack government websites are ongoing everyday. Websites belonging to reputed companies like Adobe has been hacked and user details exposed. Someone might steal our browser cookie and we might not even notice it. It is even hypothesized by some conspiracy theorists that foreign softwares and even hard disks might contain malicious softwares pre installed and undetected by standard security softwares.

The need for further research into this field is evident from the above mentioned scenarios.