fbpx Skip to content

Prelims: Science & Tech., Smishing, Phishing, Government Initiatives for Cyber Security

Mains: General Studies-III  Awareness in the fields of IT, Space, Computers, Robotics, Nano-technology, Bio-technology and issues relating to Intellectual Property Rights.

Why in the News ?

In today’s digital age, smartphones are practically an extension of ourselves, smishing poses a real and growing threat. Government has warned about its increasing threat.

Source: TOI

📌 FYI on Prelims:


Phishing

  • Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message.
  • This is done by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
  • Goal: Trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
  • What really distinguishes phishing .is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with.
  • It’s one of the oldest types of cyberattacks, dating back to the 1990s

About:

  • Smishing

    • It is a form of phishing that targets individuals through text messages or SMS.
    • Aim: Trick you into divulging personal information or downloading malware onto your device.
    • It is done in through following ways
      • Fake alerts and warnings: Scammers send texts pretending to be from legitimate institutions like banks, government agencies, or delivery services. They’ll claim there’s a problem with your account or a package delivery, prompting you to click on a link for more information.
      • Urgent requests: Smishers play on your emotions by creating a sense of urgency. They might promise prizes, warn of impending legal action, or claim your account is compromised, pressuring you to act quickly without thinking.
      • Exploiting current events: During tax season, scammers might pose as the IRS, offering tax refunds or threatening penalties if you don’t respond immediately. Similarly, they might capitalise on natural disasters or health crises to solicit donations or spread misinformation.
  • How to identify and stay safe from smishing ?

    • Poor grammar and spelling: Many smishing messages contain grammatical errors or spelling mistakes, indicating that they may not be from a legitimate source.
    • Unsolicited requests for personal information: Be wary of messages that request sensitive information like passwords, Social Security numbers, or banking details. Legitimate organisations typically won’t ask for this information via text message.
    • Suspicious links: Hover over any links in the message (without clicking them) to see the URL. If it looks suspicious or doesn’t match the purported sender, it’s likely a smishing attempt.
    • Verify the sender: Before clicking on any links or providing sensitive information, verify the sender’s identity. Contact the institution directly using official contact information to confirm the legitimacy of the message.
    • Keep software updated: Ensure your smartphone’s operating system and security software are up to date to protect against malware and other threats. Consider installing reputable antivirus apps for an added layer of protection.
  • Government Initiatives for Cyber Security

    • National Cyber Security Strategy 2020
      • Focus: Comprehensive roadmap for cyber security preparedness and response.
      • Elements: Includes awareness, prevention, detection, response, and recovery.
    • Cyber Suraksha Kendra
      • Role: Provides cyber security awareness and training.
      • Aim: Promote cyber hygiene and best practices among individuals and organizations.
    • National Critical Infrastructure Protection Centre (NCIPC)
      • Function: Monitors and protects critical infrastructure from cyber threats.
      • Collaboration: Works with sector specific agencies for coordinated defense.
    • Cyber Crime Coordination Centre (C4C)
      • Purpose: Facilitates interagency coordination in investigating cybercrimes.
      • Goal: Ensure efficient response and prosecution of cybercrimes.
    • Establishment of CERT-In: The Indian Computer Emergency Response Team (CERTIn) is the primary national agency for responding to cyber security incidents. It plays a crucial role in strengthening India’s cyber defense by issuing guidelines, advisories, and handling cybersecurity incidents.

UPSC CSE EXAMS Corner


Prelims: PYQ/FAQ

Q. Consider the following statements:
1.Smishing refers to a type of cyber-attack or scam where fraudsters send deceptive text messages to trick individuals into revealing personal information, such as login credentials, credit card numbers, or other sensitive data. 

2.Smishing messages often contain links that lead to fake websites or phone numbers that direct victims to call and provide information.
Select the correct answer form the codes given below;

A) 1 only

B) 2 only

C) Both 1 and 2

D)Neither 1 nor 2

Answer: c. Both 1 and 2

Explanation:

  • Statements 1 and 2 are correct. Smishing refers to a type of cyber-attack or scam where fraudsters send deceptive text messages to trick individuals into revealing personal information, such as login credentials, credit card numbers, or other sensitive data. 
  • Smishing messages often contain links that lead to fake websites or phone numbers that direct victims to call and provide information.

More Link

What's New

Search

Copyright © 2023 UPSC Padhai. All Rights Reserved.