security Flashcards

1
Q

India is ranked _________th in the latest Global Terrorism Index (2023) released by __________
and is one of the worst affected countries by terrorism

A

13
Institute for Economics and Peace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operation Samudragupt
*

A

Operation Samudragupt was launched by the NCB in January 2022, to intercept contraband that is brought
into India through the marine channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CERT-Is exempted
from the Right To
Information (RTI)
Act, 2005

Other ?

A

The institutions exempted from the Right to Information Act (RTI) include:
Intelligence Bureau, Ministry of Home Affairs
Directorate of Revenue Intelligence, Ministry of Finance
Central Economic Intelligence Bureau, Ministry of Finance
Directorate of Enforcement, Ministry of Finance
Narcotics Control Bureau
Aviation Research Centre
Special Frontier Force
Border Security Force, Ministry of Home Affairs
Central Reserve Police Force, Ministry of Home Affairs
Indo-Tibetan Border Police, Ministry of Home Affairs
Central Industrial Security Force, Ministry of Home Affairs
National Security Guard, Ministry of Home Affairs
Research & Analysis Wing of The Cabinet Secretariat
Assam Rifles, Ministry of Home Affairs
Sashastra Seema Bal, Ministry of Home Affairs
Special Protection Group
Defence Research and Development Organisation, Ministry of Defence
Border Road Development Organisation
Financial Intelligence Unit, India
Directorate General Income Tax (Investigation)
National Technical Research Organisation
National Security Council Secretariat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lockbit Makop
and DJVU/ Stop

Vice Society
BlueSky

A

ransomware
the most prevalent ransomware variant in India (MAKOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spear phishing

A

is a highly personalised form of email attack.
* Spear-phishing emails try to steal sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

is a social engineering attack (uses psychological manipulation and
exploits human error).
* Uses fake mobile text messages to trick people into downloading malware,
sharing sensitive information, or sending money to cybercriminals.
* Combination of SMS (short message service) and phishing.
o Phishing uses social engineering to trick victims into paying money, handing
over sensitive information, or downloading malware.
o Voice phishing is commonly known as Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Android malware known as ‘FluHorse’ has been discovered,

A
  • Targeted users with malicious apps that look like legitimate versions.
  • Being deployed using targeted phishing techniques through emails.
  • Designed to extract sensitive information, including user credentials and Two-
    Factor Authentication (2FA) codes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spamouflage

A

was a widespread online Chinese spam operation which posted
praise for China and criticisms of the USA, western foreign policies, and critics
of Chinese government.
* Similar campaign by Russia, named Doppelganger, was disrupted last year.
* It mimicked websites of mainstream news outlets in Europe and post bogus
stories about Russia’s war on Ukraine, then try to spread them online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero Trust
Authentication

A
  • Centre has established a secure e-mail system for 10,000 users across critical
    ministries and departments.
    o National Informatics Centre (NIC) has designed this system, incorporating
    Zero Trust Authentication (ZTA).
  • About ZTA
    o ZTA will address rapidly evolving security risks faced by IT systems.
  • It uses multi-factor authentication, continuous monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TTPs-Based
Cybercrime
Investigation
Framework
*

A

TTPs ((Tactics, Techniques, and Procedures) -based cybercrime investigation
framework was developed by IIT Kanpur with support from the Department of
Science and Technology (DST) under National Mission on Interdisciplinary
Cyber-Physical Systems (NM-ICPS).
* It is a methodology and tool for apprehending cybercriminals’ modes of
operations in a crime execution lifecycle.
* NM-ICPS aims to develop technology platforms to carry out R&D, translational
research, product development, incubating & supporting start-ups, and
commercialization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chakra-II operation *

A

CBI recently searched many locations under “Chakra-II” operation.
* It is aimed at combating and dismantling infrastructure of organized cyber-
enabled financial crimes in India.
* Chakra-1 was conducted by the CBI in coordination with the Interpol, the FBI
and police forces of multiple countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command Cyber
Operations and
Support Wings
(CCOSW)
*

A

Army to raise CCOSW for handling cyberspace challenges.
* CCOSWs will assist its formations in taking up cyberspace security
challenges posed by the growing warfare capabilities of adversaries.
o CCOSWs will safeguard the networks and increase preparedness levels
in this niche domain.
* Army will also nominate ‘Lead Directorates’ and ‘Test Bed’ formations for
absorption of niche technologies and enhancing fighting potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

First Anti-Spyware
Declaration
* The USA and 10 other nations issued the first-ever significant anti-spyware
declaration.
* It recognized the threat posed by the misuse of commercial spyware
* About Spyware
o Spyware is a ______________

A

type of malicious software or malware that is installed on a
computing device without the end user’s knowledge.
* It invades the device, steals sensitive information and internet usage data, and
relays it to advertisers, data firms, or external users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prof. K VijayaRaghavan committee

A

review the functioning of DRDO and suggest restructuring and redefining its role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ * Created in 1835 as ‘Cachar Levy’ to protect British tea estates. It is the oldest CAPF.

A

Assam Rifles (AR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

INFORMATION FUSION CENTRE FOR INDIAN OCEAN REGION (IFC-IOR)
* 2023 marked the completion of 5 years of IFC-IOR.
* IFC-IOR, hosted by ____________, was established by Government of India at_______________________ in 2018.

A

Indian Navy

Information Management and
Analysis Centre, Gurugram

16
Q

COLOMBO SECURITY CONCLAVE (CSC)
* India attended 6th National Security Adviser level meeting of Colombo Security Conclave held in
___________.
* CSC was initiated in ______ by ________
o Mauritius was added as a member, with Bangladesh and Seychelles as observers in 2021.
o Secretariat: ___________.
o Area of cooperation includes maritime security, countering terrorism, cyber security

A

Mauritius
2011
India, Maldives, and Sri Lanka.
Colombo, Sri Lanka

16
Q

MUTUAL LEGAL ASSISTANCE TREATIES (MLATS)
* India and ________– have signed MLATs in criminal matters

A

Belgium

16
Q

Munich Security Conference celebrated its 60th anniversary.
* The Munich Security Conference is an annual conference on global security issues, which was founded in 1963.
* After the end of the Cold War, the conference expanded its agenda to include issues such as climate change and migration.
o It also started to invite leaders from eastern nations, including Russia, India and China.
* For the first time in 20 years, Russia hasn’t been invited to the event, a response to its ongoing invasion of Ukraine

A

qdcwdjkcbdvcdcbhsdbcsdhkusdchksdchcbc

16
Q

OPEN SKIES TREATY (OST)
* Russia pulled out of the Open Skies Treaty (OST) citing earlier withdrawal of the USA from the treaty.
* About Open Skies Treaty (OST)
o ____________________________
o OST was signed in 1992 and came into effect in _______–
* Currently 33 states have ratified the treaty.
o India and China ?

A

OST is an agreement that permits each state-party to conduct short-notice, unarmed,
reconnaissance flights over the other’s territories to collect data on military forces and activities.

2002.

are not members to the treaty.

17
Q

OPERATION PROSPERITY GUARDIAN
* United States launched Operation Prosperity Guardian

Combined Task Force 153 (CTF 153) was set up in 2022 to improve maritime security in_______________

A

Red Sea, Bab el-Mandeb and the Gulf
of Aden

18
Q

CHEMICAL WEAPONS CONVENTION
* United States has destroyed the last of its declared chemical weapons stockpile, a milestone in the
history of warfare.

  • The US and the Soviet Union agreed in principle in 1989 to destroy their chemical weapons stockpiles and
    later the US ratified the Chemical Weapons Convention (CWC) in 1997.
  • About CWC
    o ___________________
    o It is administered by the Organisation for the Prohibition of Chemical Weapons (OPCW)
    _HQ - _____________________
    o Members: 193 state parties (including India) and 165 signatories.
    o Israel has signed but not ratified. Three states have neither signed nor ratified __________________

o Unique feature of the convention: ‘Challenge inspection’, whereby any State Party in doubt about
another State Party’s compliance can request a surprise inspection.

A

It is the world’s first multilateral disarmament agreement to provide for the elimination of an entire
category of weapons of mass destruction within a fixed time frame.

Hague, Netherlands.

Egypt, North Korea,
and South Sudan).