Daily News Analysis

Daily News Analysis

Control of Nodal Cyber Security Watchdog CERT-IN

Administrative Control: Currently, the Computer Emergency Response Team (CERT-IN) operates under the Ministry of Electronics and Information Technology (MeitY). Debate for Ownership: There is an ongoing discussion between the Ministry of Information Technology (IT) and the Ministry of Home Affairs (MHA) regarding the control of CERT-IN. Each ministry presents distinct arguments for their pref

India’s First Joint Doctrine for Cyberspace Operations

India's recent release of its first joint doctrine for cyberspace operations marks a significant step forward in addressing the complexities of modern warfare. Key Highlights of India’s First Joint Doctrine for Cyberspace Operations Background and Context: China’s Cyber Capabilities: China has developed advanced cyberwarfare capabilities, including sophis

Cybercrime

Context: According to a report from Ministry of Home Affairs (MHA) around 50% of cybercrime complaints received on the national cybercrime helpline every day have their origin in China and pockets of Cambodia and Myanmar. Cybercrime It is characterized as a criminal activity in which a computer serves as either the target or the instrument for committing an offense. In accordance with

Cyber kidnapping

Cyber kidnapping is a type of cybercrime where attackers gain unauthorized access to computer systems or data and then demand ransom. In cyber kidnapping, online attackers target victims and force them into isolating themselves to demand ransom from their families. They monitor the victims through video chat and use pictures captured by them in isolated conditions to extort money from th

Card-on-file tokenization

Context: Reserve Bank of India (RBI) has authorized the implementation of card-on-file tokenization (CoFT) in collaboration with card-issuing banks and institutions, aiming to enhance the security and safety of digital payments. Card-on-File Tokenization (CoFT): The Reserve Bank of India (RBI) introduced Card-on-File Tokenization in September 2021, and its implementation commenced on Oct

Govt directs social media platforms to comply with IT rules amid concerns over deepfakes

Context: The advisory by the Ministry of Electronics and Information Technology (MeitY) mandates that intermediaries communicate prohibited content, particularly those specified under Rule 3(1)(b) of the IT Rules, clearly and precisely to users. News: The Indian government issued an advisory to social media platforms regarding compliance with IT rules, specifically addressing concerns abo

THE EXPLOSION OF DIGITAL UNCERTAINTY

Why in the News? The Government of India, recently released a comprehensive report on the opportunities afforded by this current wave of Artificial Intelligence (AI).  What is Digital Uncertainity? Digital uncertainty involves unpredictability and ambiguities regarding the socio-economic impacts of rapidly evolving digital technologies such as AI, social media, cryptocurrencies, and

How government agencies use commercial spyware to target opponents

How government agencies use commercial spyware to target opponents   Why in the News? Recently, former Egyptian MP Ahmed Eltantawy was targeted with Cytrox’s Predator spyware sent via links on SMS and WhatsApp. This attack came after Mr. Eltantawy stated plans publicly to run for President in the 2024 Egyptian elections. This is concerning as Egypt is a known cu

The digital world of cookies

The digital world of cookies     What are cookies? These are bits of code, stored on a device when one visits websites online. Cookies help in personalisation and user convenience and therefore, play a pivotal role in shaping any online experience. How do cookies work? Cookies remember a user’s login information on websites, which prevents the ne

Tackling Deepfakes

What are Deepfakes? Deepfakes are videos, images and audios created or edited with a form of artificial intelligence (AI) model to create a convincingly true version of a real video/image or audio.   How are deep fakes created? It is created using techniques in machine learning (ML), a subfield of AI especially Generative Adversarial Networks (GANs) In the GAN process, two ML s

Cyber and Malware attacks in India

Cyber and Malware attacks in India Why in the News? With increasing incidents of cyber and malware attacks on critical infrastructure across the country, the Defence ministry has decided to replace the Microsoft Operating system (OS) with a locally built OS Maya. Maya Operating system: A new locally developed OS based on a free, open-source software called

Newsletter Subscription


ACQ IAS
ACQ IAS