q1. discuss the potential threats of cyber- framework attack and … · 2019-11-07 · the...

18
©Jatin Verma All Rights Reserved. https://www.jatinverma.org Model Answer Intro The 21st century is the age of technological revolution. The revolution in communication technologies and the internet has allowed people to rapidly disseminate their ideas. Cyber-attack is an emerging threat that can potentially target critical infrastructure like power transmission, banking, nuclear installations etc. India has witnessed 3rd highest number of cyber-attacks in the world. Body The potential threats of the cyber framework are as follows: Phishing attacks: Under which carefully targeted digital messages are transmitted to fool people into clicking on a link that can then install malware or expose sensitive data, are becoming more sophisticated. Ransomware: Ransomware attacks are believed to cost victims billions of dollars every year, as hackers deploy Q1. Discuss the potential threats of Cyber- framework attack and the security to prevent it. (10 marks) Approach Intro: Introduce the topic by mentioning major threats. Body: Illustrate the potential threats of the cyber framework. Discuss the innovative reform measures to effectively respond to modern-day threats of cyber framework challenges Conclusion: Conclude accordingly

Upload: others

Post on 17-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Model Answer

Intro

The 21st century is the age of technological revolution. The

revolution in communication technologies and the internet has

allowed people to rapidly disseminate their ideas.

Cyber-attack is an emerging threat that can potentially target critical

infrastructure like power transmission, banking, nuclear installations

etc. India has witnessed 3rd highest number of cyber-attacks in the

world.

Body

The potential threats of the cyber framework are as follows:

Phishing attacks: Under which carefully targeted digital

messages are transmitted to fool people into clicking on a link

that can then install malware or expose sensitive data, are

becoming more sophisticated.

Ransomware: Ransomware attacks are believed to cost

victims billions of dollars every year, as hackers deploy

Q1. Discuss the potential threats of Cyber- framework attack and the

security to prevent it. (10 marks)

Approach

Intro:

Introduce the topic by mentioning major threats.

Body:

Illustrate the potential threats of the cyber framework.

Discuss the innovative reform measures to effectively respond

to modern-day threats of cyber framework challenges

Conclusion:

Conclude accordingly

Page 2: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

technologies that enable them to literally kidnap an individual

or organization’s databases.

Cryptojacking: By cryptojacking, cybercriminal hijacked

third-party home or work computers to “mine” for

cryptocurrency.

Cyber-Physical Attacks: Using this same technology, one

can target electrical grids, transportation systems, water

treatment facilities, etc., represent a major vulnerability going

forward.

Other Threats:

Misuse of Communication Technologies: Use of

communication technologies like social media for

propaganda, mobilisation and recruitment.

Cross Border Terror Attack: Use of GPS and encrypted

communication to plan and coordinate cross border terror

attacks. For eg. During Uri and Pathankot attacks, GPS was

used to infiltrate from blind spots of Border security agencies

Money laundering: Use of digital transactions to raise

finances for terror and to launder money. Eg: use of share

markets by SIMI to raise finances, use of Bitcoins for buying

arms by terror groups etc

Lone wolf attacks: Lone wolf attacks by self-radicalized

individuals using sources on the widely unregulated internet.

For eg. In Paris, Bangladesh, Australia, UK etc.

Security needed to check this menace:

Solutions to the menace lie not only in investing in better surveillance

and monitoring technologies but also improving the core areas of law

and order. Following measures can be taken:

Implementation of Policing reforms: Amendment of Police Act,

improving per capita ratio of police, separation of Law and Order and

Investigative functions can be a solution.

Capacity building & Technological Solutions:

Training on intelligence gathering, weapons, forensics, cyber

crimes, sensitivity training etc.

Establishment of Special cybersecurity forces, cyber forensic

training labs, and cyber cells – eg. CERT-In

Use of Big data analytics to identify radicalized individuals

(used by the Hyderabad police to identify ISIS terrorists in

UP)

Page 3: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Secured borders by plugging gaps arising out of rivulets and

geographical features by using motion detectors, infrared

imagery.

Counter narrative in social media as well as regulation of

extremist content in partnership with social media companies

like Facebook, You tube etc.

Improvement in local intelligence by recruitment of police

personnel from the alienated communities.

Inter-Agency and Inter-governmental Coordination:

Coordination not only among agencies like CBI, Police, NIA, Para-

military force but also between Center and State forces. An early

consensus on NCTC and NatGrid is the need of the hour

Fostering better Police-Community relations:

Community policing for better identification of threats and

intelligence gathering.

Generation of public awareness against fake news

disseminated via social media

De radicalization of youths, and others, by involving local

community and religious leaders.

Conclusion

The cybercrime epidemic has escalated rapidly in recent years, while

companies and governments have struggled to hire enough qualified

professionals to safeguard against the growing threat. The severe

shortage of skilled cybersecurity professionals continues to be cause

for alarm since a strong, smart digital workforce is essential to

combat the more frequent, more sophisticated cybersecurity threats

emanating from around the globe.

Page 4: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Model Answer

Intro

An alien species is a species introduced outside its natural past or

present distribution; if this species becomes problematic, it is termed

an invasive alien species (IAS).

IAS are the most common threat to amphibians, reptiles and

mammals on the IUCN Red List; they may lead to changes in the

structure and composition of ecosystems detrimentally affecting

ecosystem services, human economy and wellbeing.

IAS are such a problem that Aichi Biodiversity Target 9 and one

clause of UN Sustainable Development Goal 15 – Life on Land

specifically address the issue.

Body

How they are introduced into the native ecosystem

1. Naturally

Climate change- higher average temperatures and changes in

rain and snow patterns caused by climate change will enable

some invasive plant species—such as garlic mustard, kudzu,

and purple loosestrife—to move into new areas.

Insect pest infestations will be more severe as pests such as

mountain pine beetle are able to take advantage of drought-

weakened plants.

Landslides- seeds of invasive species from mountainous areas

have spread to new spaces formed by landslips. Hardy

Q2.What is invasive species? How are they introduced in to the

native eco-systems? Suggest measures to tackle them with

suitable examples. (15 marks)

Approach

Intro: Define the invasive alien species. Their IUCN status.

Body: How they are introduced in the native eco-system.

Provide measures

Conclusion: Positive approach (measures as an individual)

Page 5: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

invasive species can grow very fast in landslip-affected areas

by using available nutrients, while native species cannot

adapt to such conditions.

Invasive species transform the soil structure and micro

environment to their advantage by producing allelochemicals,

which, however, cause the destruction of native species and

local biodiversity,

2. Anthropogenic

Invasive species are primarily spread by human activities,

often unintentionally. People, and the goods we use, travel

around the world very quickly, and they often carry

uninvited species with them.

Ships can carry aquatic organisms in their ballast water,

while smaller boats may carry them on their propellers.

Insects can get into wood, shipping palettes, and crates

that are shipped around the world

Some ornamental plants can escape into the wild and

become invasive.

And some invasive species are intentionally or accidentally

released pets. For example, Burmese pythons are

becoming a big problem in the Everglades.

Example-

Water hyacinth also called “Terror of Bengal” is a beautiful

aquatic plant, introduced to the U.S. from South America as

an ornamental. In the wild, it forms dense mats, reducing

sunlight for submerged plants and aquatic organisms,

crowding out native aquatic plants, and clogging waterways

and intake pipes.

Lantana camara- They are the alien species Kerala due to

uncontrolled flood of 2018. They are being held as the chief

reason for the forest fire incidence of Bandipur National Park

where due to presence of lantana camera in large amount has

fuelled uncontrollable fire.

Page 6: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Measures against invasive alien species

Preventing their introduction in the first place. For instance- In

Europe, there is a ban on intentionally keeping, breeding,

cultivating, transporting, placing on the market and importing

invasive alien plants and animals.

When invasive alien species are introduced unintentionally, the

animals must be removed from the environment as quickly as

possible. Plants must be destroyed.

If invasive alien populations are so big they can no longer be caught

or eradicated, measures must be taken to stop them from spreading

further.

Conclusion

Other way to curb the spread of invasive species is to plant native

plants and remove any invasive plants in your garden. There are

many good native plant alternatives to common exotic

ornamental plants. Regularly clean your boots, gear, boat, tires, and

any other equipment you use outdoors to remove insects and plant

parts that may spread invasive species to new places. In this, way we

can free our home and outside environment free from Invasive Alien

Species.

Page 7: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Model Answer

Intro

Biodiversity is the variability among living organisms from all sources,

including terrestrial, marine, and other aquatic ecosystems and the

ecological complexes of which they are part; this includes diversity within

species, between species, and of ecosystems.

Body

“The overwhelming evidence of the IPBES Global Assessment stated that

“The health of ecosystems on which we and all other species depend is

deteriorating more rapidly than ever. We are eroding the very foundations

of our economies, livelihoods, food security, health and quality of life

worldwide.”

Q3. What do you understand by the term biodiversity?

Examine the causes and consequences of degeneration of

biodiversity. (15 marks)

Approach

Intro: Define biodiversity along with any recent report which

highlights the degeneration of biodiversity.

Body:

Enumerate the causes of degeneration of biodiversity

• Natural causes

• Man made causes

Explain the consequences of degeneration of biodiversity

• Social consequences

• Environmental consequences

• Economical consequence

Mention few steps that have been taken at national and international

level

Conclusion: Suggest measures that should be taken

Page 8: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

The Living Planet Index, compiled by the WWF, provides an indication of

the declines in the overall abundance of wild species. Living planet report

2018 stated, unsustainable human activity is pushing the planet’s natural

systems that support life on Earth to the edge.

Causes of degeneration of Biodiversity:

Consequences of degeneration of biodiversity: at the first Earth Summit,

the vast majority of the world's nations declared that human actions were

dismantling the Earth's ecosystems, eliminating genes, species and

biological traits at an alarming rate. This observation led to the question of

how such loss of biological diversity will alter the functioning of

ecosystems and their ability to provide society with the goods and services

needed to prosper.

•Societal impacts:

Food security: Humans rely on various plants, animals, and other

organisms for food, building materials, and medicines, and their

availability as commodities is important to many cultures. The loss of

biodiversity among these critical natural resources threatens global food

security and the development of new pharmaceuticals to deal with future

diseases.

•Vulnerability to natural disasters: Many scientists feel that the world is

in the middle of a sixth major mass extinction, one caused solely by

human beings. Natural ecological disturbances, such as wildfire, floods,

and volcanic eruptions, change ecosystems drastically by eliminating local

populations of some species and transforming whole biological

communities.

•Impact on ecosystem services: Biodiversity plays an important role in

the way ecosystems function and in the many services they provide.

Page 9: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Services include nutrients and water cycling, soil formation and retention,

resistance against invasive species, pollination of plants, regulation of

climate, as well as pest and pollution control by ecosystems.

•DISEASES: Reduced biodiversity means millions of people face a future

where food supplies are more vulnerable to pests and disease and where

water is in irregular or short supply.

•The loss of plant species also means the loss of unknown economic

potential, as extinct plants can hardly be harvested for food crops, fibers,

medicines, and other products that forests, especially rainforests, provide.

•Ecological Effects: The weight of biodiversity loss is most pronounced

on species whose populations are decreasing. The loss of genes and

individuals threatens the long-term survival of a species, as mates become

scarce and risks from inbreeding rise when closely related survivors mate.

The wholesale loss of populations also increases the risk that a particular

species will become extinct.

•Mainstream and traditional medicines can be derived from the chemicals

in rare plants and animals, and thus lost species represent lost

opportunities to treat and cure. For example, several species of fungi

found on the hairs of three-toed sloths (Bradypus variegatus) produce

medicines effective against the parasites that cause malaria (Plasmodium

falciparum) and Chagas disease (Trypanosoma cruzi) as well as against

human breast cancer.

Steps taken:

International efforts:

United Nations Environment Programme (UNEP) collaborates

with a wide range of partners throughout the UN system and

beyond to provide information on the state of the planet's natural

resources and their contribution to sustainable development.

The World Wide Fund for Nature (WWF) is an international non-

governmental organisation for the conservation, research and

restoration of the natural environment.

Convention on Biological Diversity (CBD) was negotiated under

the auspices of the UNEP. The three goals of the CBD are to

promote the conservation of biodiversity, the sustainable use of its

components, and the fair and equitable sharing of benefits arising

out of the utilization of genetic resources.

Man And Biosphere (MAB) has initiated programmes and

activities focusing on the diversity and the resources provided by

nature, humans' impacts on biodiversity, as well as how

Page 10: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

biodiversity affects human activities. The original objective of

MAB was to establish protected areas representing the main

ecosystems of the planet. A 'biosphere reserve' under MAB is a

unique kind of protected area.

Efforts at national level:

The Central Government has enacted the Wild Life (Protection)

Act, 1972. The Act, inter alia, provides for the creation of

Protected Areas for the protection of wildlife and also provides for

punishment for hunting of specified fauna specified in the

schedules I to IV thereof.

Wildlife Crime Control Bureau has been established for control of

illegal trade in wildlife, including endangered species.

The Centrally Sponsored Scheme ‘Integrated Development of

Wildlife Habitats ‘has been modified by including a new

component namely ‘Recovery of Endangered Species‘.

Protected Areas, via, National Parks, Sanctuaries, Conservation

Reserves and Community Reserves all over the country covering

the important habitats have been created as per the provisions of

the Wild Life (Protection) Act, 1972 to provide better protection to

wildlife, including threatened species and their habitat.

Conclusion

Way forward:

Cooperation and coordination among different organization

at national and international level

Habitat restoration

Sustainable development

Public awareness and public participation

The decline in biodiversity is not just an environmental issue

but also an economic, security, moral and ethical issue.. People

need to shift to clean technologies for protecting the nature.

Ultimately, the world needs to come together to make a global

deal to save nature.

Page 11: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Introduction:

Recently, India’s only facility for conservation of endangered

species- the Laboratory for the Conservation of Endangered

Species (LaCONES), in Hyderabad was inaugurated. It uses

modern biotechnology for conservation of endangered wildlife.

CCMB-LaCONES is the only laboratory in India that has

developed methods for collection and cryopreservation of semen

and oocytes from wildlife and successfully reproducing

endangered blackbuck, spotted deer and Nicobar pigeons.

Through this work, it has established Genetic Resource Bank for

Indian wildlife.

What is genetic conservation?

Conservation Biology + Genetics = Genetics conservation The science of Conservation Biology looks at individuals and

populations that have been affected by habitat loss,

exploitation, and/or environmental change.

Information gained from studying these organisms informs

decisions that will ensure their survival into the future.

The science of Genetics looks at inherited characteristics and

the genes that underlie them.For example, one gene may

determine the flower color of a plant.

First, scientists must understand the genetic relationships

among the organisms they're studying. Then wildlife

managers use techniques to preserve biological diversity in

these species.

When is Conservation Genetics Used?

Habitat Destruction

Change in Population Size

Geographical Isolation

Q4. What do you understand by the term biodiversity?

Examine the causes and consequences of degeneration of

biodiversity. (15 marks)

Approach

Intro: Define genetic conservation. A little info about genes can be given.

Explain its importance. Give few examples. Body:

How is Conservation Genetics Done?

Tell about India’s biodiversity

Methods and features of genetic conservation in India Conclusion: Way forward for conservation of biodiversity.

Page 12: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Body:

How is Conservation Genetics Done?

Identification, Inventory, and Analysis

Define populations and areas of interest.

Observe the population.

Form hypotheses about relationships between populations and/or

species and test these hypotheses by examining genetic

characteristics of the organisms (DNA or protein data).

Determine how much diversity exists in separate populations of

the species, as well as the rate at which genes are exchanged

among populations (gene flow).

Interpretation and Management

Scientists and managers work together to identify endangered

organisms.

Determine the degree to which the organism is adaptable to

various temperatures, soils, and water conditions.

Examine factors that influence genetic diversity, such as the

identity and characteristics of plant pollinators.

The health and welfare of pollinating species may be critical to

the survival of an endangered plant species.

Study threats to the integrity of the species' habitat, including

human, climatic, and other factors.

India’s biodiversity:

India is one of the 17 mega biodiversity-rich countries and

accounts for 7 to 8 per cent of the recorded species of the

world. 70 per cent of the country's land area has been surveyed and

around 46,000 species of plants and 89,000 species of animals

have been described. Nearly 50 per cent of the aquatic plants

of the world are recorded in India.

More than 400,000 species in India needs to be recorded.

Lack of experts is affecting identification.

Methods of genetic conservation: When we conserve and protect the whole ecosystem, its

biodiversity at all levels is protected. E.g. we save the entire

forest to save the tiger. This approach is called in in-situ (on

site) conservation.

However, when there are situations where an animal or plant

is endangered or threatened and needs urgent measures to

save it from extinction, ex-situ (off-site) conservation is the

desirable approach.

Page 13: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

1. In situ conservation

In-situ conservation is the on-site conservation of genetic

resources in natural populations of plant or animal species.

In India, ecologically unique and biodiversity-rich regions are

legally protected as biosphere reserves, national parks,

sanctuaries, reserved forests, protected forests and nature

reserves.

India now has 18 biosphere reserves, 104 national parks and

500 wildlife sanctuaries.

Plantation, cultivation, grazing, felling trees, hunting and

poaching are prohibited in biosphere reserves, national parks

and sanctuaries.

Protected Area Network in India

National Board for Wildlife (NBWL), chaired by the Prime

Minister of India provides for policy framework for wildlife

conservation in the country.

The National Wildlife Action Plan (2002-2016) was adopted

in 2002, emphasizing the people’s participation and their

support for wildlife conservation.

1. Ex Situ Conservation

In this approach, threatened animals and plants are taken out

from their natural habitat and placed in special setting where

they can be protected and given special care.

Zoological parks, botanical gardens, wildlife safari parks and

seed banks serve this purpose.

There are many animals that have become extinct in the wild

but continue to be maintained in zoological parks.

In recent years ex-situ conservation has advanced beyond

keeping threatened species.

Now gametes of threatened species can be preserved in viable and

fertile condition for long periods using cryopreservation techniques

Concerns: According to the FAO, about three-quarters of the genetic

diversity found in agricultural crops has been lost over the last

century. For example, today, 90 per cent of energy and

proteins comes from only 15 plant and 8 animal species.

The UN Convention on Biological Diversity (cbd)

recognizes the sovereignty of countries over their biological

resources and their authority to determine access to genetic

resources through national legislation. But with a gap in

demand and production of food, developing countries should

have argued for open access and free exchange of genetic

resources, or the germplasm.

Page 14: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Poor fund allocation: While Rs 30 crore were made available

for biodiversity conservation in 2017-18, this has gone down

to only Rs 14 crore in 2018-2019.

Despite many laws in place (Wildlife Protection Act, 1972,

Forest (Conservation Act), 1980, Biological Diversity Act,

2002), the report admits that there is a lack of effective

enforcement of the laws to protect biodiversity. Agricultural biodiversity has been declining in India with

more number of crops being commercially cultivated.

Number of varieties grown under different agricultural

systems has also fallen. Over 300,000 samples of indigenous

plants kept in the National Gene Bank have gone out of

cultivation

Nearly 140 native breeds of farm livestock are facing

survival threat. Low genetic diversity in natural conditions

has affected the evolutionary development of indigenous wild

species.

Grassland species like the Great Indian Bustard are under

threat

Despite biosafety concerns, genetically modified crops like

Bt cotton have got official approval for commercial use

Way forward:

For long-term conservation of the critically endangered

species, it is necessary to take up conservation efforts beyond

protected areas.

Let the genes cross borders

o Countries have gained more than their individual

contribution from germplasm exchanges through the

Consultative Group on International Agricultural

Research. The international seed treaty on major food

crops, which came into force in 2004, was a major

step in this direction.

More than 400,000 species in India needs to be recorded.

Increasing forest cover: About 80 per cent of the India’s

forest area faces heavy grazing while fire affects 50 per cent

of the forest cover

Page 15: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Intro:Water-use efficiency refers to the ratio of water used in plant

metabolism to water lost by the plant through transpiration. Water use

efficiency is also about careful management of water supply sources, use

of water serving technologies, reduction of excessive demand and other

actions.

Body

Why water-use efficiency important in Indian context

In context of Indian agriculture, recognizing the fast-declining

irrigation water potential and increasing demand for water from

different sectors, a number of demand management strategies and

programmes have been introduced.

Alternative available

One such method is micro-irrigation that includes drip irrigation and

sprinkler irrigation.

Advantages of micro-irrigation

1. Under micro-irrigation, unlike flood method of irrigation,

water is supplied at a required interval and quantity using pipe

network, emitters and nozzles.

2. The on-farm irrigation efficiency of properly designed and

managed drip irrigation system is estimated to be about 90

percent, while the same is only about 35 to 40 percent for

surface method of irrigation.

Q5. What do you understand by the term biodiversity?

Examine the causes and consequences of degeneration of

biodiversity. (15 marks)

Approach

Intro – Definition and significance of water use efficiency

Body

Firstly, one can mention why water use efficiency important for India.

Then alternative available like micro-irrigation, advantages of micro-

irrigation, present challenges and their solutions

Conclusion – One can conclude by highlighting the urgency required to

adopt micro-irrigation initiatives and steps taken by government.

Page 16: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

3. While increasing the productivity of crops significantly, it

also reduces weed problems, soil erosion and cost of

cultivation substantially.

4. The reduction in water consumption in micro irrigation also

reduces the energy use that is required to lift water from

irrigation wells.

5. Drip-irrigation technique can replace the hand watering

system in hilly areas with minimum water losses and labour.

Present challenges and their solutions

Micro irrigation has penetrated to only 5.5 % owing to various

reasons which are discussed hereafter along with possible solutions.

1. Finance: High initial investment out of the reach of most of

the Indian farmers(small and marginal category). Easier

credit norms will help in increasing production and adoption

rate of micro-irrigation systems.

2. Stable scheme guidelines and their implementation

3. Use of information technology and dedicated team of process

management.

4. Focusing strategy for water intensive crops.

5. Other practical approaches like to promote judicious use of

water, use of water should be charged a nominal amount by

the government.

Conclusion - Government of India has also accorded high priority to

water conservation and its management. Pradhan Mantri Krishi

Sinchayee Yojana (PMKSY) has been formulated with the vision of

extending the coverage of irrigation ‘Har Khet Ko Pani’ and

improving water use efficiency ‘More crop per drop’ in focused

manner using sprinker & drip method of irrigation.

Page 17: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

Intro:

The TRIPS agreement is directed towards providing adequate

and effective protection towards intellectual property rights and

to “reduce distortions and impediments to international trade”.

Its main aim is to ensure that technological transfer takes place

with an eye towards justice and equitable distribution and to

ensure protection of rights of all concerned.

It includes patents and ‘sui generis” (spontaneously or naturally

grown) systems for plant and biodiversity protection.

These are important as they “play a key role in defining who

gains access to information about genetic resources, how the

benefits are shared (including traditional communities), and what

technologies are developed and transferred with implications for

conservation and sustainable use of biological diversity”

Body:

Though there are clear indications in the CBD that indigineous

knowledge must be obtained with prior and informed consent

from the holders of this knowledge, it is often violated.

o For example,In case of basmati rice that IPR is

granted to members of a country other than the one in

which the knowledge is actually originated.

Similarly, the mandate that the profits must be shared between

the parties concerned is not implemented as the party which has

more power simpl appropriates the knowledge without

acknowledgement.

Also, the developed countries that have systematized a way of

developing genetic resources as formal innovations are better able

to use the benefits of TRIPS and also appropriate the knowledge

of those that are not aware of these formal systems. In such cases

they rarely share the benefits of the innovations with those from

whom they have received the inspiration but have been able to

formalise the knowledge in a form that enables them to use TRIP.

One immediate fall out of unsuccessful application of TRIP and bio-

piracy is that many indigenous communities are not any longer

motivated to preserve their traditional knowledge base that is also

Q6. TRIPS agreement has come under criticism for promoting

commercial interests at the expense of preservation of

biodiversity and rights of less powerful communities’ .Comment

Page 18: Q1. Discuss the potential threats of Cyber- framework attack and … · 2019-11-07 · The potential threats of the cyber framework are as follows: ... individuals using sources on

©Jatin Verma All Rights Reserved. https://www.jatinverma.org

conducive to the reservation of bio diversity and of precious genetic

material.

TRIP also has no provision for fair and equitable distribution of

resources.

TRIP allows patenting of life forms like plants.The parties get

exclusive rights over such genetic resources for the duration of

the patent that may be extremely dangerous in real life.

Conclusion

Commercialisation and commodification of knowledge and traditional

practice is incompatible with how many indigenous people view their

cultural heritage. Thus, there is a need to bring in the ethical parameters

when knowledge is being transferred between unequal parties to see that

the more vulnerable party is also included within the benefit sharing

process.