Page-6 of GS-III: Internal & External Security

India has been experiencing several attempts to attack over the Critical Information Infrastructure (CII), both by state and non state actors. What are the factors behind increased instances of attacks? Also, enumerate the steps taken by the Indian government to secure its CII.

Critical Information Infrastructure is that which is vital for the domestic economy and national security. It includes the finance system, Defence system, Telecommunication networks, power  grids, etc. Reasons for targeting CII: It is a kind of modern and unconventional warfare, ..

The introduction of Sections 70A and 70B in IT Act, 2000 had brought in some corrective measures in India's cyber security establishments. Few years down the line, do you think that these measures have been implemented in letter and spirit? Discuss critically.

Section 70A of the IT Act 2000 mentions about National Nodal Agency with respect to Critical Information Infrastructure Protection. Section 70B of the IT Act 2000 mentions about the Indian Computer Emergency Response Team which shall serve as the national ..

Despite being the most peaceful border in Asia, the Indo-Nepal border is not free of critical problems. Discuss while suggesting way forward.

The Treaty of Sugauli delineate the boundary between India and Nepal. The Nepal-India Joint Technical Boundary Committee is working for the past 21 years in chalking out a boundary between both the states. India and Nepal has two broad issues ..

In recent decades, religion has gained stronghold in India's North East as a factor of political mobilization. Examine the issue from the internal security perspective.

Religion is the closest identity of an individual. Its the easiest way to attract individuals. In the North-Eastern India, there has been rampant political mobilization taking place in the name of religion and this is creatinf serious internal security challenges ..

Highlight the vulnerabilities in the cyber security architecture of India. Also, discuss the measures to deal with this.

Cyber security refers to the defences elected against malafide attacks on the ICT infrastructure. Types of attack: Keyloggers and data recorders. Virus to bug system and track Coordinated State attacks. Trojan horse software. Server overload and crashing. Vulnerabilities: Lack of ..

Discuss the Rohingyas Crisis as a challenge to India's internal security. Can India remain isolated from the issue of Rohingyas? Explain while suggesting role that should be played by India to address this crisis.

Rohingyas are stateless ethnic group facing persecution in the regions of Rakhine in Myanmar. There are referred as world’s most persecuted minority group by UNO. Rohingya Crisis as a challenge to India’s Internal Security Rohingyas are illegally entering India. IB ..

Throw some light on the recent reforms that have been undertaken by India in strengthening its National Security Architecture.

The National security is one of the primary responsibilities of the state. With rise of state sponsored terrorism, organised crime, asymmetric warfare, and lone wolf attacks, following changes have been made. The post of the Chief of Defence Staff has ..

Critically assess the internal security threats from the recently created United Liberation Front of Western South East Asia (UNFLW).

Model Answer: United Liberation Front of Western South East Asia (UNFLW) is an umbrella organization of several small organizations like United Liberation Front of Assam (Independent), Nationalist Socialist Council of Nagaland-Khaplang, Kamatapur Liberation Organization (KLO) and National Democratic Front of ..