SlideShare a Scribd company logo
1 of 25
SECURITY CHALLENGES AND
THREATS TO INDIA
Presented by-
 Saurabh Kashyap, I.T.S.
 Manishankar Meena, I.T.S.
 Shivam Kumar Srivastav, I.R.R.S.
 Abhishek Kumar, I.R.R.S.
 Akshay Kumar Guruji, I.R.R.S.
INSURGENCY IN NORTH EAST
FACTORS:
1.COMPLEX TOPOGRAPHY
2.DEVELOPMENTAL ISSUE
3.LACK OF GOVERNANCE
4.ETHNIC CLASHES AMONG TRIBALS
5.REGIONAL ASPIRATION
SOME MAJOR INTIATIVE OF GOVERNMENT
1.BORDER AREA DEVELOPMENT
2.HILL AREA DEVELOPMENT
3.SECURITY COOPERATION WITH NEIBHOUR
4.NORTH EAST BUSINESS SUMMIT
INDIA CHINA BORDER
DISPUTE
INDIA BANGLADESH BORDER
PROBLEM
INDIA NEPAL BORDER PROBLEM
INDIA MYANMAR BORDER
PROBLEM
INDIA PAKISTAN BORDER
PROBLEM
SOCIAL MEDIA IN NATIONAL
SECURITY
 Spread of fake news
 Breach of Privacy
 Polarization
 Internet fraud
 Cyber bullying
 Trolling
 Increased threat of cyber attack
 Inequality in participation
CHALLENGES-
 Cyber terrorism
 Spreading terrorism
 Use for recruiting terrorist
 Spreading hatred
 Money laundering
 Hacking
 Difficult to trace
 Revolutions and false propanganda
REGULATION
 Exponential increase in social media profiles
 Quick spread of information
 Disparity of information available
 To curb illegal activities
 Ensure violence does not take place
NATIONAL SECURITY DIRECTIVES
ON TELECOM SECTOR
 Exponential increase in social media profiles
 Quick spread of information
 Disparity of information available
 To curb illegal activities
 Ensure violence does not take place
NEED
 Prone To cyberattack
 Threat from emerging Technologies
 Move toward Atma Nirbhar
 Data Security
 Data Security
 Internet penetration via Telecom sector
IMPLICATION
 Boost Indigenisation
 Strengthen Cyber environment
 Make ready for future technologies
 Increase Research and Development
WAY FORWARD
 Technological advancement
 SystemCyber security infrastructure
 More Budget for Researchatic approach
 Legal Measures
EXTREMISM
 Extremism means adoption of extreme political,
social or religious ideals that reject or undermine the
status quo and undermine contemporary ideas and
expressions of freedom.
 Depending on the objectives of the group/groups,
the nature of terrorism also differs such as ethno-
nationalist terrorism, religious terrorism, left-wing
terrorism, right-wing terrorism, state sponsored
terrorism, cyber terrorism, urban terrorism etc.
NAXALISM
origins of the LWE can be traced back to 1967 in the three areas of Naxalbari (from which the
term Naxal originates), Phansidewa and Khoribari in West Bengal’s Darjeeling District.
 aims to overthrow the government
 creates conditions for non-functioning of the government
 to attain political power by violent means and establish what they envisage
FACTORS RESPONSIBLE FOR RISE OF NAXALISM
 Land Related Factors
 Political Factors
 Economic Factors
 Environmental Degradation
 Lack of basic facilities
WAY FORWARD
 Learning from best practices like Chhattisgarh police
 Eliminate the feeling of alienation with tribals
 Better Cooperative federalism
 Forest Rights
 Financial empowerment
 Accelerate Infrastructure development
 Leveraging the use of technology
 Need to spread awareness through media
 Open the channels for political dialogues
THREAT TO CRITICAL INFRASTRUCTURE SYSTEM:-
• Critical infrastructure provides services that are essential for everyday life
such as energy, food, water, transport, communications, health and
banking and finance.
• A disruption to critical infrastructure could have serious impact on national
security, the economic and social welfare of a state.
• A malware infection in the IT network of the Kudankulam Nuclear Power
Plant (KKNPP) located in Tamil Nadu was first reported in social media on
October 28.
• November 2017 malware attack on the Tehri Dam in Uttarakhand
• Ransomware attack on West Bengal State Electricity Distribution
Company in May 2017
ISSUES & CHALLENGES:
• Capability Asymmetry: India lacks indigenization in hardware as well as
software cybersecurity tools. This makes India’s cyberspace vulnerable to
cyberattacks motivated by state and non-state actors.
• Individuals within Critical Infrastructures such as present or past
employees, third party contractors and supply chain partners can pose a
significant risk.
• Reluctance in Sharing Information: A significant challenge in protecting
critical infrastructure is the inhibition in the private (and public) sector to
share information about the vulnerability of their systems
• Smart sensors and communication technology bundled into various
industrial control systems are more prone to attacks.
WAY FORWARD:
• India needs better budgetary allocations for cybersecurity.
• The government also needs a robust infrastructure, processes and audit
system to strengthen cybersecurity.
• Training and awareness programs and also nurturing and development
of audit and certification agencies for protection of CIs.
• Capacity building programs.
BIOTERRORISM:
• A biological attack, or bioterrorism, is the intentional release of viruses,
bacteria, or other germs that can sicken or kill people, livestock, or crops.
• India is especially vulnerable to such infections because of its large
population, low healthcare spending, minimal expenditure on research that
benefits public health, weak coordination between central and state health
authorities, limited involvement of private actors, poor awareness of
biosecurity.
• Most recently, COVID-19 has revealed the deep fault lines in India’s public
health infrastructure, including a shortage of healthcare workers, scarcity
of medical equipment, poor access to healthcare facilities in rural areas,
and inefficient disease reporting and surveillance in most states.
ISSUES & CHALLENGES:
• Identifying the motive: There is general difficulty faced by the agencies
to differentiate between intentional harm and accidental transmission.
• Limited information: New biological agents either in nature or artificially
made cannot be anticipated before it can cause a public nuisance.
• Deadly Nature: Agents used in Bioterrorism are highly transmissible and
deadly in nature which is hard to control once fully unleashed in the
population.
• Problem of Detection and control: The latency period and mutation into
different strains of agents makes disease detection and control difficult.
MEASURES NEED TO TACKLE BIO-WEAPONS:
• Integration with National Security: Biosecurity should be
mainstreamed into our defence, security and counterterrorism strategies.
• National Rapid Deployment Biosecurity Force: A dedicated National
Rapid Deployment Biosecurity Force should be established.
• National strategies: India should develop National strategies for bio-
intelligence and cooperate with other friendly biosecurity powers.
• Bio-safety of Research facilities: Governmental and private R&D labs,
biotech and virology centres need to be catalogued according to
established safety levels, especially for dangerous biological toxins.
• Controlling the technology: Biological materials.
*** THANK YOU ***

More Related Content

Similar to PPT SYNDICATE 5.pptx

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)nicholas njoroge
 
Corruption
CorruptionCorruption
CorruptionAnas Vj
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
Corruption in indian society
Corruption in indian societyCorruption in indian society
Corruption in indian societyAravind Thodathil
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxBini R A
 
National policy to combat terrorism 2014 onwards
National policy to combat terrorism 2014 onwardsNational policy to combat terrorism 2014 onwards
National policy to combat terrorism 2014 onwardsSardar Sanjay Matkar
 
Information as element of enforcing the state`s information security
Information as element of enforcing the state`s information securityInformation as element of enforcing the state`s information security
Information as element of enforcing the state`s information securityIgor Britchenko
 
ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...
ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...
ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...Tom Weinandy
 
Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspaceijtsrd
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts arearchiejones4
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxANA Cyber Security Forensic Pvt. Ltd.
 
Beyond Boundaries: East Africa
Beyond Boundaries: East AfricaBeyond Boundaries: East Africa
Beyond Boundaries: East Africastimson
 

Similar to PPT SYNDICATE 5.pptx (20)

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
28 states by avinash kumar thakur
28 states by avinash kumar thakur28 states by avinash kumar thakur
28 states by avinash kumar thakur
 
Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)
 
Corruption
CorruptionCorruption
Corruption
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Corruption in indian society
Corruption in indian societyCorruption in indian society
Corruption in indian society
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Corruption in india
Corruption in indiaCorruption in india
Corruption in india
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
National policy to combat terrorism 2014 onwards
National policy to combat terrorism 2014 onwardsNational policy to combat terrorism 2014 onwards
National policy to combat terrorism 2014 onwards
 
Information as element of enforcing the state`s information security
Information as element of enforcing the state`s information securityInformation as element of enforcing the state`s information security
Information as element of enforcing the state`s information security
 
ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...
ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...
ICCM 2013 Panel 3: You Can't Get There from Here (Generating, Analyzing & Usi...
 
Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspace
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
R41674
R41674R41674
R41674
 
R41674
R41674R41674
R41674
 
Beyond Boundaries: East Africa
Beyond Boundaries: East AfricaBeyond Boundaries: East Africa
Beyond Boundaries: East Africa
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

PPT SYNDICATE 5.pptx

  • 1. SECURITY CHALLENGES AND THREATS TO INDIA Presented by-  Saurabh Kashyap, I.T.S.  Manishankar Meena, I.T.S.  Shivam Kumar Srivastav, I.R.R.S.  Abhishek Kumar, I.R.R.S.  Akshay Kumar Guruji, I.R.R.S.
  • 2. INSURGENCY IN NORTH EAST FACTORS: 1.COMPLEX TOPOGRAPHY 2.DEVELOPMENTAL ISSUE 3.LACK OF GOVERNANCE 4.ETHNIC CLASHES AMONG TRIBALS 5.REGIONAL ASPIRATION SOME MAJOR INTIATIVE OF GOVERNMENT 1.BORDER AREA DEVELOPMENT 2.HILL AREA DEVELOPMENT 3.SECURITY COOPERATION WITH NEIBHOUR 4.NORTH EAST BUSINESS SUMMIT
  • 8. SOCIAL MEDIA IN NATIONAL SECURITY  Spread of fake news  Breach of Privacy  Polarization  Internet fraud  Cyber bullying  Trolling  Increased threat of cyber attack  Inequality in participation
  • 9. CHALLENGES-  Cyber terrorism  Spreading terrorism  Use for recruiting terrorist  Spreading hatred  Money laundering  Hacking  Difficult to trace  Revolutions and false propanganda
  • 10. REGULATION  Exponential increase in social media profiles  Quick spread of information  Disparity of information available  To curb illegal activities  Ensure violence does not take place
  • 11. NATIONAL SECURITY DIRECTIVES ON TELECOM SECTOR  Exponential increase in social media profiles  Quick spread of information  Disparity of information available  To curb illegal activities  Ensure violence does not take place
  • 12. NEED  Prone To cyberattack  Threat from emerging Technologies  Move toward Atma Nirbhar  Data Security  Data Security  Internet penetration via Telecom sector
  • 13. IMPLICATION  Boost Indigenisation  Strengthen Cyber environment  Make ready for future technologies  Increase Research and Development
  • 14. WAY FORWARD  Technological advancement  SystemCyber security infrastructure  More Budget for Researchatic approach  Legal Measures
  • 15. EXTREMISM  Extremism means adoption of extreme political, social or religious ideals that reject or undermine the status quo and undermine contemporary ideas and expressions of freedom.  Depending on the objectives of the group/groups, the nature of terrorism also differs such as ethno- nationalist terrorism, religious terrorism, left-wing terrorism, right-wing terrorism, state sponsored terrorism, cyber terrorism, urban terrorism etc.
  • 16. NAXALISM origins of the LWE can be traced back to 1967 in the three areas of Naxalbari (from which the term Naxal originates), Phansidewa and Khoribari in West Bengal’s Darjeeling District.  aims to overthrow the government  creates conditions for non-functioning of the government  to attain political power by violent means and establish what they envisage
  • 17. FACTORS RESPONSIBLE FOR RISE OF NAXALISM  Land Related Factors  Political Factors  Economic Factors  Environmental Degradation  Lack of basic facilities
  • 18. WAY FORWARD  Learning from best practices like Chhattisgarh police  Eliminate the feeling of alienation with tribals  Better Cooperative federalism  Forest Rights  Financial empowerment  Accelerate Infrastructure development  Leveraging the use of technology  Need to spread awareness through media  Open the channels for political dialogues
  • 19. THREAT TO CRITICAL INFRASTRUCTURE SYSTEM:- • Critical infrastructure provides services that are essential for everyday life such as energy, food, water, transport, communications, health and banking and finance. • A disruption to critical infrastructure could have serious impact on national security, the economic and social welfare of a state. • A malware infection in the IT network of the Kudankulam Nuclear Power Plant (KKNPP) located in Tamil Nadu was first reported in social media on October 28. • November 2017 malware attack on the Tehri Dam in Uttarakhand • Ransomware attack on West Bengal State Electricity Distribution Company in May 2017
  • 20. ISSUES & CHALLENGES: • Capability Asymmetry: India lacks indigenization in hardware as well as software cybersecurity tools. This makes India’s cyberspace vulnerable to cyberattacks motivated by state and non-state actors. • Individuals within Critical Infrastructures such as present or past employees, third party contractors and supply chain partners can pose a significant risk. • Reluctance in Sharing Information: A significant challenge in protecting critical infrastructure is the inhibition in the private (and public) sector to share information about the vulnerability of their systems • Smart sensors and communication technology bundled into various industrial control systems are more prone to attacks.
  • 21. WAY FORWARD: • India needs better budgetary allocations for cybersecurity. • The government also needs a robust infrastructure, processes and audit system to strengthen cybersecurity. • Training and awareness programs and also nurturing and development of audit and certification agencies for protection of CIs. • Capacity building programs.
  • 22. BIOTERRORISM: • A biological attack, or bioterrorism, is the intentional release of viruses, bacteria, or other germs that can sicken or kill people, livestock, or crops. • India is especially vulnerable to such infections because of its large population, low healthcare spending, minimal expenditure on research that benefits public health, weak coordination between central and state health authorities, limited involvement of private actors, poor awareness of biosecurity. • Most recently, COVID-19 has revealed the deep fault lines in India’s public health infrastructure, including a shortage of healthcare workers, scarcity of medical equipment, poor access to healthcare facilities in rural areas, and inefficient disease reporting and surveillance in most states.
  • 23. ISSUES & CHALLENGES: • Identifying the motive: There is general difficulty faced by the agencies to differentiate between intentional harm and accidental transmission. • Limited information: New biological agents either in nature or artificially made cannot be anticipated before it can cause a public nuisance. • Deadly Nature: Agents used in Bioterrorism are highly transmissible and deadly in nature which is hard to control once fully unleashed in the population. • Problem of Detection and control: The latency period and mutation into different strains of agents makes disease detection and control difficult.
  • 24. MEASURES NEED TO TACKLE BIO-WEAPONS: • Integration with National Security: Biosecurity should be mainstreamed into our defence, security and counterterrorism strategies. • National Rapid Deployment Biosecurity Force: A dedicated National Rapid Deployment Biosecurity Force should be established. • National strategies: India should develop National strategies for bio- intelligence and cooperate with other friendly biosecurity powers. • Bio-safety of Research facilities: Governmental and private R&D labs, biotech and virology centres need to be catalogued according to established safety levels, especially for dangerous biological toxins. • Controlling the technology: Biological materials.