“Mentor’s Comments”
- https://www.thehindu.com/
opinion/lead/the-world-is- hardly-wired-for-cyber- resilience/article34807136.ece - In the intro, mention the recent cyber attacks on pipeline supplying oil in the US and subsequent ransom paid by the company.
- In the body, mention the growing importance of data and its importance as the world seeks more connectivity and vulnerability of it to cyber attacks. Also mention the cost these cyberattacks could inflict on civilians as well as governments. In the suggestions mention robust data protection mechanisms, adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc.
- Conclude by mentioning the need to recognise the threat and adoption of measures to deal with it.
Ref id 422329
Please review
Vishal
You have made a nice attempt but the answer is very generic, include some more new dimensions. You can take help of the article above.
In introduction you can write about some new cases such as- an audacious ransomware attack by Russia/East Europe-based cybercriminals, styled DarkSide, on Colonial Pipeline, US; SolarWinds attack on US govt infrastructure etc
Challenges mentioned are okay, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently; you can also mention different types of attack, ransomware, malware, phishing etc
Suggestions mentioned are good, you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc.
Conclusion is good, use terms and examples to enhance the value of the answer.
Read some other answers. Keep writing. 🙂
Refid# 422544
Anupam
Well written answer. Introduction and examples in the beginning are good.
In challenges, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); you can also mention different types of attack, ransomware, malware, phishing etc
Suggestions mentioned are good, you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc to make it more broader.
Conclusion is good.
Read some other answers. Keep writing. 🙂
4.5/10
Payid– pay_HHfL00yH7yO4Mb
Rahul,
Introduction is good, you can use names of attacks as examples
In the body you have mentioned importance of data multiple times, mention some specific challenges- nuclear installations, military and security infrastructure etc
You can also mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); mention different types of attack, ransomware, malware, phishing etc. You can use pointwise format for better presentation.
Suggestions mentioned and conclusion are good.
Read some other answers. Keep writing. 🙂
Payment id- HLOjtqOLjvDs5Y
Chandrama
Your answer is decent but some points are missing.
Introduction is good.
You can mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); mention different types of attack, ransomware, malware, phishing etc.
Suggestions mentioned are good, you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc to make it more contemporary.
Read some other answers. Keep writing. 🙂
Payment Id pay_HHlJ1R1WIIMdGT
Payment Id pay_HHlJ1R1WIIMdGT
Please review
Gauri Shankar
Good answer. Introduction and examples in the beginning are good.
In challenges, you can mention about attacks on nuclear, military infrastructure too; you can also mention different types of attack, ransomware, malware, phishing etc
Suggestions and conclusion is good.
Read some other answers. Keep writing. 🙂
Payment id HHU8LODcXby9Db
Arpit
You have made a nice attempt with some innovative points.
In introduction you can write about some new cases such as- an audacious ransomware attack by Russia/East Europe-based cybercriminals, styled DarkSide, on Colonial Pipeline, US; SolarWinds attack on US govt infrastructure etc. This will substantiate the statement given in question.
Points in challenges and suggestions are good especially 3S etc. You can also mention different types of attack, ransomware, malware, phishing etc
Also give some India-centric suggestions like Cert-IN, data protection law needs to be enacted.
You can add adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc in suggestions.
Read some other answers. Keep writing. 🙂
4.5/10
Payment id-HJHAZEWKSzM3CX
Ankita
Answer is good.
In challenges you can also talk about the traditional targets such as nuclear and military installations, national security infrastructure etc. Also, you can briefly explain various types of cyberattacks such as ransomware, malware, phishing etc
Suggestions are okay but you can add some point- strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Don’t keep yourself limited to the article.
Conclusion is good.
Read some other answers. Keep practicing. 🙂
Payment Id: pay HFrdyJMOEZ9967. Please review, Sir.
Sumita
Well written answer. You can briefly explain various types of cyberattacks such as ransomware, malware, phishing etc and what different challenges they pose.
Suggestions are good but you can add some point- strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Don’t keep yourself limited to the article.
Read some other answers. Keep writing. 🙂
Payment ID: pay_HHOMaDqnwYDcZ5
Order ID: #0000422294
Zulu
In introduction you can give examples of some new cases such as- an audacious ransomware attack by Russia/East Europe-based cybercriminals, styled DarkSide, on Colonial Pipeline, US; SolarWinds attack on US govt infrastructure etc.
In challenges, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently(can give examples); you can also mention different types of attack, ransomware, malware, phishing etc. Rest of the points are good.
Suggestions are good, try to present a bit more neatly.
Read some other answers, keep practicing. 🙂
4.5/10
Please review
Ref no 0000420120
Rajlaxmi
Introduction and examples are good.
In challenges, mention there are civilian targets too now- banking and financial services prone to ransomware attacks, oil, electricity grids, and lately, health care, have begun to figure prominently; you can also mention different types of attack, ransomware, malware, phishing etc Rest of the points are very good.
Suggestions mentioned are good but a bit generic , you can add adoption of Zero Trust Based Environment, regular vulnerability assessments, for India mention things like Cert-In, need for a data protection law etc
Read some other answers. Keep practicing. 🙂
4.5/10
Payment Id : 115213946268
Vivek
You can mention 1-2 more examples especially those on civilian targets such as Aramco, Colonial pipeline attack etc
In challenges write about vulnerabilities of nuclear and military installations, national security infrastructure etc Try to cover all dimensions, don’t limit yourself to the article above. You can also mention different types of attack, ransomware, malware, phishing etc
Suggestions are good but you can add some India-specific measures such as strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc.
Conclusion is good.
Read some other answers. Keep practicing. 🙂
Order id – #0000420396
@Swatantra
Rohan
Well-written answer. Examples and challenges mentioned are good.You can also mention different types of attack, ransomware, malware, phishing etc
Suggestions are good but a bit generic- you can add some India-specific measures like strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc. can also be mentioned.
Conclusion is good.
Read some other answers. Keep writing. 🙂
4.5/10
pay_HH4AoVE2qPd386 please review @Swatantra
Shivanshu
You have written well, mentioned most of the points.
In challenges write about vulnerabilities of nuclear and military installations, national security infrastructure etc Try to cover all dimensions, don’t limit yourself to the article above.
Suggestions and conclusion are good.
Not much scope to write anything more in a 10 marker.
Read some other answers. Keep writing. 🙂
kindly review @Swatantra sir
ref id 420326
Deepali
Introduction and examples are good. You can improve the definition of cyberattacks if you start with it.
In challenges write about vulnerabilities of nuclear and military installations, national security infrastructure etc Try to cover all dimensions. Rest of the points are good, you can present better in a pointwise format.
Suggestions are good but a bit generic- you can add some India-specific measures like strengthening mechanisms such as Cert-In, enacting a data protection law based on the recommendations of Srikrishna committee etc. Adoption of Zero Trust Based Environment, regular vulnerability assessments, creating awareness about cyber threats etc. can also be mentioned.
We tend to miss points when we try to write in paragraph format, so need to be a bit careful.
Read some other answers. Keep writing. 🙂