Page-10 of GS-III: Internal & External Security

Has the two-pronged policy of direct action by the security forces coupled with development to tackle Maoism problem been successful? To what extent? Discuss critically.

India always perceived Left wing extremism as an internal security threat with their increased capabilities to kill, attack and massacre. It came up with different models to handle the situation throughout the years. Maoist continues to remain the dominant and ..

"To create adequate infrastructure and generate trust and confidence in our IT system, there is a dire need to update the cybersecurity policy". Discuss in the light of various changes being demanded in Cyber Security Policy,2013 in recent times.

Digital India and Make in India are two major campaigns being promoted by the NDA government to transform the society. Success or failure of these depends on government’s capabilities to secure the cyber networks in the country. India’s infrastructure is ..

Critically discuss the role of Science & Technology in ensuring national security.

Science and Technology play an important role in all walks of human life. They are inevitable for seeking solutions and overcoming limitations posed to society and governments. In India, science and technology has been given importance in nation building since ..

Critically discuss India’s preparedness to tackle the threats posed by ransomware and state-sponsored cyber attacks.

Ransomware attacks and state-sponsored cyber attacks pose a growing challenge for India’s cybersecurity preparedness. India has taken some steps such as creating CERT-In (Indian Computer Emergency Response Team) as the nodal agency for tracking and responding to cyber security incidents ..

Discuss the potential threats of Cyber attack and the security framework to prevent it.

The Indian government’s vision of Digital India is gradually improving and on its way to achieving the desired target. In the meantime, India is facing a big challenge created by the growing Cybercrime attacks. Social media privacy, emails, bank transaction ..

Critically examine India's potential role as a "Net Security Provider" in the South Asia / Indian Ocean region while highlighting the significant structural and institutional impediments that inhibit India's capacity to fulfill the said role.

A net provider of security is the nation which can address the security concerns of not only itself but also other countries in the vicinity or beyond. Generally a security provider is of a capable power that can deploy their surplus ..

Discuss salient features of Portable Diver Detection Sonar (PDDS). How will it boost India's Navy capabilities? Explain.

In furtherance of the Make in India Policy, the Indian Navy on 15th November 2017 has concluded a contract with Tata Power Strategic Engineering Division for the supply of Portable Diver Detection Sonar (PDDS). It is believed that the introduction ..

Critically analyze the success or failures of Border Area Development Programme in North East India.

Connectivity is one of the major hinderance which limits the development prospectus in border areas. In order to improve infrastructure border area development program along with India-Pakistan border was initiated in 1987.The objective was to meet the special development requirements ..