0% found this document useful (0 votes)
119 views2 pages

Security and Policy Challenges in India

The document contains 17 questions from past UPSC exams between the years 2018-2015 related to topics like China-Pakistan Economic Corridor, Left Wing Extremism, data security, drug trafficking, cyber attacks, insurgency in North-East India, mob violence, terrorism, border management, use of internet by non-state actors, cloud hosting security, Armed Forces Special Powers Act, religious indoctrination via digital media, strategies to counter Left Wing Extremism, and challenges in implementing National Cyber Security Policy.

Uploaded by

manish singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views2 pages

Security and Policy Challenges in India

The document contains 17 questions from past UPSC exams between the years 2018-2015 related to topics like China-Pakistan Economic Corridor, Left Wing Extremism, data security, drug trafficking, cyber attacks, insurgency in North-East India, mob violence, terrorism, border management, use of internet by non-state actors, cloud hosting security, Armed Forces Special Powers Act, religious indoctrination via digital media, strategies to counter Left Wing Extremism, and challenges in implementing National Cyber Security Policy.

Uploaded by

manish singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

2018

1. The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger ‘One Belt
One Road’ initiative. Give a brief description of CPEC and enumerate the reasons why India has
distanced itself from the same.                     

2. Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country.
Briefly explain the Government of India’s approach to counter the challenges posed by LWE.

3. Data security has assumed significant importance in the digitized world due to rising cyber crimes. The
Justice B.N. Srikrishna Committee Report addresses issues related to data security. What, in your view,
are the strengths and weaknesses of the Report relating to protection of personal data in cyber space?

4. India’s proximity to the two of the world’s biggest illicit opium growing states has enhanced her
internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as
gunrunning, money laundering and human trafficking. What counter measures should be taken to
prevent the same?

2017

5. Discuss the potential threats of Cyber attack and the security framework to prevent it.
6. The North-Eastern region of India has been infested with insurgency for a very long time. Analyze the
major reasons for the survival of armed insurgency in this region.

7. Mob violence is emerging as a serious law and order problem in India. By giving suitable examples,
analyze the causes and consequences of such violence.

8. The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to
curb this growing menace? What are the major sources of terrorist funding?

2016
9. The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against
terrorist attacks. Discuss the strategic impact of such actions.

10. ‘Terrorism is emerging as a competitive industry over the last few decades.” Analyse the above
statement.
11. Border management is a complex task due to difficult terrain and hostile relations with some
countries. Elucidate the challenges and strategies for effective border management.

12. Use of internet and social media by non-state actors for subversive activities is a major security
concern. How have these been misused in the recent past? Suggest effective guidelines to curb the
above threat.

2015
13. Discuss the advantages and security implications of cloud hosting of servers vis-a-vis in-house
machine-based hosting for government businesses.

14. Human right activists constantly highlight the view that the Armed Forces (Special Powers) Act, 1958
(AFSPA) is a draconian act leading to cases of human rights abuses by the security forces. What sections
of AFSPA are opposed by the activists? Critically evaluate the requirement with reference to the view
held by the Apex Court.

15. Religious indoctrination via digital media has resulted in Indian youth joining the ISIS. What is ISIS
and its mission? How can ISIS be dangerous to the internal security of our country?

16. The persisting drives of the Government for development of large industries in backward areas have
resulted in isolating the tribal population and the farmers who face multiple displacements. With
Malkangiri and Naxalbari foci, discuss the corrective strategies needed to win the Left Wing Extremism
(LWE) doctrine affected citizens back into the mainstream of social and economic growth.

17. Considering the threats cyberspace poses for the country, India needs a “Digital Armed Forces” to
prevent crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the challenges
perceived in its effective implementation.

You might also like