security Flashcards
India is ranked _________th in the latest Global Terrorism Index (2023) released by __________
and is one of the worst affected countries by terrorism
13
Institute for Economics and Peace
Operation Samudragupt
*
Operation Samudragupt was launched by the NCB in January 2022, to intercept contraband that is brought
into India through the marine channel
CERT-Is exempted
from the Right To
Information (RTI)
Act, 2005
Other ?
The institutions exempted from the Right to Information Act (RTI) include:
Intelligence Bureau, Ministry of Home Affairs
Directorate of Revenue Intelligence, Ministry of Finance
Central Economic Intelligence Bureau, Ministry of Finance
Directorate of Enforcement, Ministry of Finance
Narcotics Control Bureau
Aviation Research Centre
Special Frontier Force
Border Security Force, Ministry of Home Affairs
Central Reserve Police Force, Ministry of Home Affairs
Indo-Tibetan Border Police, Ministry of Home Affairs
Central Industrial Security Force, Ministry of Home Affairs
National Security Guard, Ministry of Home Affairs
Research & Analysis Wing of The Cabinet Secretariat
Assam Rifles, Ministry of Home Affairs
Sashastra Seema Bal, Ministry of Home Affairs
Special Protection Group
Defence Research and Development Organisation, Ministry of Defence
Border Road Development Organisation
Financial Intelligence Unit, India
Directorate General Income Tax (Investigation)
National Technical Research Organisation
National Security Council Secretariat
Lockbit Makop
and DJVU/ Stop
Vice Society
BlueSky
ransomware
the most prevalent ransomware variant in India (MAKOP)
Spear phishing
is a highly personalised form of email attack.
* Spear-phishing emails try to steal sensitive information
Smishing
is a social engineering attack (uses psychological manipulation and
exploits human error).
* Uses fake mobile text messages to trick people into downloading malware,
sharing sensitive information, or sending money to cybercriminals.
* Combination of SMS (short message service) and phishing.
o Phishing uses social engineering to trick victims into paying money, handing
over sensitive information, or downloading malware.
o Voice phishing is commonly known as Vishing
Android malware known as ‘FluHorse’ has been discovered,
- Targeted users with malicious apps that look like legitimate versions.
- Being deployed using targeted phishing techniques through emails.
- Designed to extract sensitive information, including user credentials and Two-
Factor Authentication (2FA) codes.
Spamouflage
was a widespread online Chinese spam operation which posted
praise for China and criticisms of the USA, western foreign policies, and critics
of Chinese government.
* Similar campaign by Russia, named Doppelganger, was disrupted last year.
* It mimicked websites of mainstream news outlets in Europe and post bogus
stories about Russia’s war on Ukraine, then try to spread them online.
Zero Trust
Authentication
- Centre has established a secure e-mail system for 10,000 users across critical
ministries and departments.
o National Informatics Centre (NIC) has designed this system, incorporating
Zero Trust Authentication (ZTA). - About ZTA
o ZTA will address rapidly evolving security risks faced by IT systems. - It uses multi-factor authentication, continuous monitoring
TTPs-Based
Cybercrime
Investigation
Framework
*
TTPs ((Tactics, Techniques, and Procedures) -based cybercrime investigation
framework was developed by IIT Kanpur with support from the Department of
Science and Technology (DST) under National Mission on Interdisciplinary
Cyber-Physical Systems (NM-ICPS).
* It is a methodology and tool for apprehending cybercriminals’ modes of
operations in a crime execution lifecycle.
* NM-ICPS aims to develop technology platforms to carry out R&D, translational
research, product development, incubating & supporting start-ups, and
commercialization
Chakra-II operation *
CBI recently searched many locations under “Chakra-II” operation.
* It is aimed at combating and dismantling infrastructure of organized cyber-
enabled financial crimes in India.
* Chakra-1 was conducted by the CBI in coordination with the Interpol, the FBI
and police forces of multiple countries.
Command Cyber
Operations and
Support Wings
(CCOSW)
*
Army to raise CCOSW for handling cyberspace challenges.
* CCOSWs will assist its formations in taking up cyberspace security
challenges posed by the growing warfare capabilities of adversaries.
o CCOSWs will safeguard the networks and increase preparedness levels
in this niche domain.
* Army will also nominate ‘Lead Directorates’ and ‘Test Bed’ formations for
absorption of niche technologies and enhancing fighting potential
First Anti-Spyware
Declaration
* The USA and 10 other nations issued the first-ever significant anti-spyware
declaration.
* It recognized the threat posed by the misuse of commercial spyware
* About Spyware
o Spyware is a ______________
type of malicious software or malware that is installed on a
computing device without the end user’s knowledge.
* It invades the device, steals sensitive information and internet usage data, and
relays it to advertisers, data firms, or external users
Prof. K VijayaRaghavan committee
review the functioning of DRDO and suggest restructuring and redefining its role
_________ * Created in 1835 as ‘Cachar Levy’ to protect British tea estates. It is the oldest CAPF.
Assam Rifles (AR)