fbpx
Search
Close this search box.

National Institutional Ranking Framework 2024, POCSO is Gender-Neutral, Court of Arbitration for Sports

Table of Contents

(General Studies III – Science and Technology Section – Developments and their Applications and Effects in Everyday Life; Indigenization of Technology and Developing New Technology.)

  • Cybersecurity is defined as the practice of protecting systems, networks, and programs from digital attacks that aim to access, alter, or destroy sensitive information, extort money, or disrupt normal operations.
  • In 2024, the landscape of cybersecurity has become increasingly complex, driven by advancements in Artificial Intelligence (AI), including Generative AI and Artificial General Intelligence (AGI), and a rise in disinformation and cyber threats.

Notable Cyberattacks in Recent History
WannaCry Ransomware Attack (2017): Infected over 230,000 computers across 150 countries, resulting in billions in damages.
Shamoon Computer Virus (2017): Targeted major oil companies, leading to what was described as the “biggest hack in history.”
Petya Malware Attack (2017): Disrupted banks and critical infrastructure across Europe, the UK, the US, and Australia.
Stuxnet Attack (2010): A state-sponsored attack that targeted Iran’s nuclear program, causing physical damage and highlighting the potential for cyberattacks to inflict real-world harm.

Key Cyber Threats Arising from AI

  • Sophisticated Phishing Attacks: AI has made phishing campaigns more advanced and personalized. For example, in 2023, a notable attack involved AI-generated emails that mimicked the writing style of executives, tricking employees into divulging sensitive information. This type of attack has become increasingly effective, with over 75% of targeted cyberattacks starting with an email, according to industry reports.
  • Ransomware and Extortion: Ransomware attacks have evolved, leveraging AI to automate the identification of vulnerabilities. In 2022, the LockBit ransomware group utilized AI to enhance their malware, leading to significant breaches across various sectors, including healthcare and finance. The Colonial Pipeline incident in 2021 set a precedent, and subsequent attacks have shown a similar pattern of using AI for rapid exploitation.
  • Data Breaches: AI’s role in data breaches has become more pronounced, with attackers using AI to sift through vast amounts of data to identify weak points. In 2023, the Uber data breach exemplified this trend, where attackers used social engineering techniques to gain access to sensitive information, highlighting the vulnerabilities that AI can exploit.
  • Adversarial Attacks: Cybercriminals are employing adversarial techniques to manipulate AI systems. For instance, in 2022, researchers demonstrated how slight modifications to images could fool facial recognition systems, allowing unauthorized access to secure areas. This type of attack poses significant risks to security systems relying on AI.
  • Deepfake Technology: The use of deepfakes has surged, particularly in misinformation campaigns. In 2024, a deepfake video of a political figure was used to spread false information, affecting public opinion and demonstrating how AI-generated content can be weaponized for social manipulation.
  • Exploitation of IoT Devices: AI has been used to identify vulnerabilities in Internet of Things (IoT) devices. The Mirai botnet, which has evolved to incorporate AI techniques, has been responsible for large-scale DDoS attacks, targeting vulnerable IoT devices and disrupting services globally.
  • Automated Cyber Attacks: AI enables the automation of cyber attacks, allowing attackers to conduct more sophisticated operations. The Emotet malware, which evolved to use AI for automating the delivery of malicious payloads, exemplifies how automation can lead to widespread attacks, complicating defense efforts.
  • Bias and Discrimination: AI systems can perpetuate biases, leading to discriminatory practices. In 2023, several facial recognition systems faced backlash for misidentifying individuals from minority groups, raising ethical concerns about the deployment of AI in security contexts.
  • Malware Development: AI tools have lowered the barrier for entry into cybercrime. In 2024, reports indicated that AI-assisted malware development has become commonplace, enabling even novice hackers to create sophisticated attacks, exemplified by the rise of GenAI-powered malware.

Challenges in Mitigating AI-Driven Cyber Threats

  • Skill Shortages: The cybersecurity workforce is struggling to keep pace with the rapid evolution of AI technologies. A 2023 report highlighted a global shortage of cybersecurity professionals, with an estimated 3.1 million positions unfilled, complicating defenses against AI-driven threats.
  • Data Security Risks: Training AI models often requires large datasets, which can contain sensitive information. The Facebook data breach in 2023, where personal data of millions was exposed, underscores the risks associated with handling large datasets for AI training.
  • Complexity of Threat Detection: Distinguishing between traditional cyber threats and those powered by AI can be challenging. The SolarWinds attack in 2020, which involved sophisticated techniques blending traditional and AI-driven methods, exemplifies the difficulties in detection and response.
  • Ethical Concerns: The deployment of AI raises ethical issues related to privacy and surveillance. The use of AI in law enforcement, such as predictive policing algorithms, has sparked debates about bias and potential misuse, complicating the regulatory landscape

The digital landscape of 2024 presents unprecedented challenges that require coordinated action across nations, particularly democracies. The threats posed by AI, cyberattacks, and disinformation are not only a concern for national security but also for the everyday lives of citizens.

As the world continues to grapple with these issues, it is essential to remain vigilant and proactive in implementing solutions that will protect against the evolving dangers of the digital age. India’s journey in enhancing its cybersecurity measures will play a critical role in ensuring its security and resilience in the face of these challenges.

Key Cybersecurity Initiatives in India
National Cyber Security Policy: Ensures a secure and resilient cyberspace.
Cyber Surakshit Bharat Initiative: Enhances IT safety in government departments.
Indian Cyber Crime Coordination Centre (I4C): Coordinates national cybercrime response.
Cyber Swachhta Kendra: Tackles botnet infections and malware.
CERT-In: Manages cyber incident responses and alerts.
NCIIPC: Protects critical infrastructure sectors.
Defence Cyber Agency (DCyA): Handles military-related cyber threats.

NIRF
• The National Institutional Ranking Framework (NIRF) is a government-approved methodology, launched in 2015, to rank Higher Education Institutions (HEIs) based on the below parameters.
 Teaching, Learning & Resources (TLR)
 Research and Professional Practice (RP)
 Graduation Outcomes (GO)
 Outreach and Inclusivity (OI)
 Peer Perception
• This initiative was introduced by the Ministry of Education
• The ranking parameters carry different weightage depending on the category of the institution

  • IIT Madras has been ranked as the best educational institution in India for the sixth consecutive time since 2019, according to the 2024 National Institutional Ranking Framework (NIRF).
  • Released by the Education Minister, the rankings also show IIT Madras retaining its top spot in engineering for the ninth consecutive year since 2016.
  • IISc Bengaluru remains the leading institution in both the universities and research categories, holding these positions since 2016 and 2021, respectively.
  • The rankings were expanded to 16 categories this year, with new additions including open universities, skill universities, and state public universities.
  • The Ministry is considering adding “sustainability” as a criterion from next year.
InstitutionCategory and Ranking
IIM AhmedabadTop management institute for the fifth consecutive year since 2020
AIIMS DelhiBest medical sciences institution for the seventh year in a row
IIT BombayBest ‘innovational institution’
IIT RoorkeeFirst place in architecture and planning for the fourth consecutive year
National Law School of India University, BengaluruBest law school for the seventh consecutive year

Dig Deeper:  Read about the Times Higher Education (THE) World University Rankings.

Hindenburg Allegations
• New York-based Hindenburg Research released documents alleging that the ongoing SEBI investigation into insider trading violations by the Adani Group is compromised.
• The documents include emails and records suggesting a conflict of interest involving the SEBI Chairman and spouse, due to their investments in Adani-related entities through offshore funds.
• The core allegation involves the “hidden stakes” in offshore funds linked to professional engagements before and during SEBI tenure.

  • In the context of the Hindenburg Research’s allegations against the Securities and Exchange Board of India (SEBI) Chairperson, the Opposition demanded a Joint Parliamentary Committee (JPC) probe.
  • A JPC is an ad-hoc parliamentary body established to examine specific bills or investigate financial irregularities in government activities.
Investigation So Far
• SC ordered SEBI to probe whether losses suffered by Indian investors due to Hindenburg’s previous report involved legal violations
• SEBI issued a show cause notice to Hindenburg, and the court refused to transfer the investigation from SEBI to other agencies.
• SEBI informed the court and nearly completed the investigation.

  • It is set up by passing a motion in one House of Parliament, supported by the other.
  • The committee’s members, chosen by Parliament, typically include twice as many Lok Sabha members as Rajya Sabha members.
  • The JPC is authorised to collect evidence, summon individuals, and request documents related to the matter under investigation.
  • Its proceedings are confidential, except in cases of public interest.
  • The committee disbands after submitting its report to Parliament.
  • The Speaker has the final say in disputes over evidence collection.

Dig Deeper: Read about the Role of SEBI in the Regulation of Securities Market in India.

  • The Delhi High Court has ruled that criminal proceedings can be initiated against a woman for committing “penetrative sexual assault” on a child, emphasizing that the offence under the POCSO Act is not restricted to men.
  • The POCSO Act is gender-neutral and applies to all perpetrators, regardless of gender.
  • The court further noted that the term “person” in Section 3 of the POCSO Act should not be interpreted as referring only to males, and the word “he” should be understood to include offenders of any gender.
  • Section 3 defines penetrative sexual assault as an act of penetration of any body part or object into the child’s body, or causing the child to penetrate.
Protection of Children from Sexual Offences (POCSO) Act, 2012
• Section 2(d): Defines a child as any person below the age of 18 years.
• Section 14: Punishment for Use of Child for Pornographic Purposes
• Section 28: Mandates the establishment of Special Courts.

Dig Deeper: Read about the United Nations Convention on the Rights of the Child.

  • Vinesh Phogat, an Indian Wrestler disqualified from the Paris Olympics as she could not maintain below 50 Kg weight for the final bout. She petitioned for the Silver Medal to CAS as she was within the weight limit till the semifinal she won.  
  • The Court of Arbitration for Sport (CAS) is an independent international institution that resolves disputes related to sport, including those arising from the Olympic Games.
  • The CAS handles a variety of cases, including disputes over doping, eligibility, and disciplinary actions.
  • CAS serves as the final arbiter in disputes related to the Olympic Games, ensuring that decisions are fair and consistent with international sports law.
  • CAS judgments are binding and play a crucial role in maintaining fairness and integrity in international sports.
  • These decisions can influence policies and rules within international sports federations and the Olympic movement.
  • The CAS plays an essential role in ensuring that Olympic competitions remain fair and free of disputes.

Dig Deeper: Read about the doping and WADA.