💥UPSC 2026, 2027 UAP Mentorship - June Batch Starts

Q.3) Several high-profile cyberattacks across the world have exposed vulnerabilities in the critical infrastructure of even advanced nations. In light of this, examine the challenges posed by cyberattacks and suggest measures to deal with these challenges. (10 marks)

“Mentor’s Comments”

  • https://www.thehindu.com/opinion/lead/the-world-is-hardly-wired-for-cyber-resilience/article34807136.ece
  • In the intro, mention the recent cyber attacks on pipeline supplying oil in the US and subsequent ransom paid by the company.
  • In the body, mention the growing importance of data and its importance as the world seeks more connectivity and vulnerability of it to cyber attacks. Also mention the cost these cyberattacks could inflict on civilians as well as governments. In the suggestions mention robust data protection mechanisms,  adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc.
  • Conclude by mentioning the need to recognise the threat and adoption of measures to deal with it.

 

Comments

29 responses to “Q.3) Several high-profile cyberattacks across the world have exposed vulnerabilities in the critical infrastructure of even advanced nations. In light of this, examine the challenges posed by cyberattacks and suggest measures to deal with these challenges. (10 marks)”

  1. Vishal Nagle Avatar
    Vishal Nagle

    Ref id 422329
    Please review

    1. Swatantra Avatar
      Swatantra

      Vishal

      You have made a nice attempt but the answer is very generic, include some more new dimensions. You can take help of the article above.

      In introduction you can write about some new cases such as- an audacious ransomware attack by Russia/East Europe-based cybercriminals, styled DarkSide, on Colonial Pipeline, US; SolarWinds attack on US govt infrastructure etc

      Challenges mentioned are okay, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently; you can also mention different types of attack, ransomware, malware, phishing etc

      Suggestions mentioned are good, you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc.

      Conclusion is good, use terms and examples to enhance the value of the answer.

      Read some other answers. Keep writing. 🙂

  2. Anupam Singh Avatar
    Anupam Singh

    Refid# 422544

    1. Swatantra Avatar
      Swatantra

      Anupam

      Well written answer. Introduction and examples in the beginning are good.

      In challenges, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); you can also mention different types of attack, ransomware, malware, phishing etc

      Suggestions mentioned are good, you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc to make it more broader.

      Conclusion is good.

      Read some other answers. Keep writing. 🙂

      4.5/10

  3. Rahul Kumar Avatar
    Rahul Kumar

    Payid– pay_HHfL00yH7yO4Mb

    1. Swatantra Avatar
      Swatantra

      Rahul,

      Introduction is good, you can use names of attacks as examples

      In the body you have mentioned importance of data multiple times, mention some specific challenges- nuclear installations, military and security infrastructure etc

      You can also mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); mention different types of attack, ransomware, malware, phishing etc. You can use pointwise format for better presentation.

      Suggestions mentioned and conclusion are good.

      Read some other answers. Keep writing. 🙂

  4. Chandrama Mukhopadhyay Avatar
    Chandrama Mukhopadhyay

    Payment id- HLOjtqOLjvDs5Y

    1. Swatantra Avatar
      Swatantra

      Chandrama

      Your answer is decent but some points are missing.

      Introduction is good.

      You can mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); mention different types of attack, ransomware, malware, phishing etc.

      Suggestions mentioned are good, you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc to make it more contemporary.

      Read some other answers. Keep writing. 🙂

  5. Gauri Shankar Meena Avatar
    Gauri Shankar Meena

    Payment Id pay_HHlJ1R1WIIMdGT

  6. Gauri Shankar Meena Avatar
    Gauri Shankar Meena

    Payment Id pay_HHlJ1R1WIIMdGT
    Please review

    1. Swatantra Avatar
      Swatantra

      Gauri Shankar

      Good answer. Introduction and examples in the beginning are good.

      In challenges, you can mention about attacks on nuclear, military infrastructure too; you can also mention different types of attack, ransomware, malware, phishing etc

      Suggestions and conclusion is good.

      Read some other answers. Keep writing. 🙂

  7. Arpit Singh Avatar
    Arpit Singh

    Payment id HHU8LODcXby9Db

    1. Swatantra Avatar
      Swatantra

      Arpit

      You have made a nice attempt with some innovative points.

      In introduction you can write about some new cases such as- an audacious ransomware attack by Russia/East Europe-based cybercriminals, styled DarkSide, on Colonial Pipeline, US; SolarWinds attack on US govt infrastructure etc. This will substantiate the statement given in question.

      Points in challenges and suggestions are good especially 3S etc. You can also mention different types of attack, ransomware, malware, phishing etc

      Also give some India-centric suggestions like Cert-IN, data protection law needs to be enacted.

      You can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc in suggestions.

      Read some other answers. Keep writing. 🙂

      4.5/10

  8. ankita thakur Avatar
    ankita thakur

    Payment id-HJHAZEWKSzM3CX

    1. Swatantra Avatar
      Swatantra

      Ankita

      Answer is good.

      In challenges you can also talk about the traditional targets such as nuclear and military installations, national security infrastructure etc. Also, you can briefly explain various types of cyberattacks such as ransomware, malware, phishing etc

      Suggestions are okay but you can add some point- strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Don’t keep yourself limited to the article.

      Conclusion is good.

      Read some other answers. Keep practicing. 🙂

  9. SUMITA DOWERAH Avatar
    SUMITA DOWERAH

    Payment Id: pay HFrdyJMOEZ9967. Please review, Sir.

    1. Swatantra Avatar
      Swatantra

      Sumita

      Well written answer. You can briefly explain various types of cyberattacks such as ransomware, malware, phishing etc and what different challenges they pose.

      Suggestions are good but you can add some point- strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Don’t keep yourself limited to the article.

      Read some other answers. Keep writing. 🙂

  10. Zulu Avatar
    Zulu

    Payment ID: pay_HHOMaDqnwYDcZ5
    Order ID: #0000422294

    1. Swatantra Avatar
      Swatantra

      Zulu

      In introduction you can give examples of some new cases such as- an audacious ransomware attack by Russia/East Europe-based cybercriminals, styled DarkSide, on Colonial Pipeline, US; SolarWinds attack on US govt infrastructure etc.

      In challenges, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); you can also mention different types of attack, ransomware, malware, phishing etc. Rest of the points are good.

      Suggestions are good, try to present a bit more neatly.

      Read some other answers, keep practicing. 🙂

      4.5/10

  11. Fun Learning with Rajlaxmi. Avatar
    Fun Learning with Rajlaxmi.

    Please review
    Ref no 0000420120

    1. Swatantra Avatar
      Swatantra

      Rajlaxmi

      Introduction and examples are good.

      In challenges, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently; you can also mention different types of attack, ransomware, malware, phishing etc Rest of the points are very good.

      Suggestions mentioned are good but a bit generic , you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, for India mention things like Cert-In, need for a data protection law etc

      Read some other answers. Keep practicing. 🙂

      4.5/10

  12. Vivek H Avatar
    Vivek H

    Payment Id : 115213946268

    1. Swatantra Avatar
      Swatantra

      Vivek

      You can mention 1-2 more examples especially those on civilian targets such as Aramco, Colonial pipeline attack etc

      In challenges write about vulnerabilities of nuclear and military installations, national security infrastructure etc Try to cover all dimensions, don’t limit yourself to the article above. You can also mention different types of attack, ransomware, malware, phishing etc

      Suggestions are good but you can add some India-specific measures such as strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc.

      Conclusion is good.

      Read some other answers. Keep practicing. 🙂

  13. Rohan Sinha Avatar
    Rohan Sinha

    Order id – #0000420396
    @swatantra

    1. Swatantra Avatar
      Swatantra

      Rohan

      Well-written answer. Examples and challenges mentioned are good.You can also mention different types of attack, ransomware, malware, phishing etc

      Suggestions are good but a bit generic- you can add some India-specific measures like strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc. can also be mentioned.

      Conclusion is good.

      Read some other answers. Keep writing. 🙂

      4.5/10

  14. shivanshu pandey Avatar
    shivanshu pandey

    pay_HH4AoVE2qPd386 please review @swatantra

    1. Swatantra Avatar
      Swatantra

      Shivanshu

      You have written well, mentioned most of the points.

      In challenges write about vulnerabilities of nuclear and military installations, national security infrastructure etc Try to cover all dimensions, don’t limit yourself to the article above.

      Suggestions and conclusion are good.

      Not much scope to write anything more in a 10 marker.

      Read some other answers. Keep writing. 🙂

  15. Deepali Rajan Avatar
    Deepali Rajan

    kindly review @swatantra sir
    ref id 420326

    1. Swatantra Avatar
      Swatantra

      Deepali

      Introduction and examples are good. You can improve the definition of cyberattacks if you start with it.

      In challenges write about vulnerabilities of nuclear and military installations, national security infrastructure etc Try to cover all dimensions. Rest of the points are good, you can present better in a pointwise format.

      Suggestions are good but a bit generic- you can add some India-specific measures like strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc. can also be mentioned.

      We tend to miss points when we try to write in paragraph format, so need to be a bit careful.

      Read some other answers. Keep writing. 🙂

Leave a Reply

More posts