Site icon IAS Current Affairs

Daily Current Affairs 25 October 2023 – IAS Current Affairs

Daily Current Affairs 25 October 2023 – IAS Current Affairs

Current Affairs 25 October 2023 focuses on Prelims-Mains perspective. Major events are :


India-Japan Semiconductor Supply Chain Partnership

Source: PIB
GS I: Geography; GS II: International Relations


Overview

Image by Dan Williams from Pixabay
  1. What is the aim?
  2. Need for MoC
  3. Indian Semiconductor industry
  4. About Semiconductors

Why in the News?

The Union Cabinet apprised of a Memorandum of Cooperation (MoC) signed in July, 2023 between the Ministry of Electronics and Information Technology of the Republic of India and the Ministry of Economy, Trade and Industry of Japan on the India-Japan Semiconductor Supply Chain Partnership. 

About India-Japan Semiconductor Supply Chain Partnership

  • The MoC intends to strengthen cooperation between India and Japan towards the enhancement of the semiconductor supply chain.
  • This recognises the importance of semiconductors for the advancement of industries and digital technologies.
  • The MoC shall come into effect from the date of signature of the Parties and shall remain in force for a period of five years.
  • Both G2G and B2B Bilateral Cooperation on opportunities to advance resilient semiconductor supply chain and leverage complementary strengths.
  • MoC envisages improved collaboration leading to employment opportunities in the field of IT.
Need for MoC

  • Recognizing the importance of semiconductors for the advancement of industries and digital technologies this MoC is required.
  • Semiconductors are an essential component of electronic devices.
  • Semiconductors enable advances in communications, computing, healthcare, military systems, transportation, clean energy, and countless other applications.
  • They replaced the tubes in computers, managing machines faster, cheaper, and more efficiently.
  • Advances in design and size led us to light and sleek modern phones and smart equipment in a range of industries.
Indian Semiconductor industry

  • India’s semiconductor market is set to experience remarkable growth, with projected figures expected to reach $55 billion by 2026.
  • This signifies India’s growing emphasis on internal semiconductor production, as well as its desire to establish a formidable presence in the global semiconductor supply chains.
How is India working towards a robust semiconductor ecosystem?
  • MeitY has been actively working to create a conducive environment for electronics manufacturing.
  • Programme for Development of Semiconductor and Display Manufacturing Ecosystem in India
    • It was introduced with a view to ensure the development of a robust and sustainable semiconductor and display ecosystem in India.
    • The program aims to extend fiscal support for the establishment of Semiconductor Fabs, Display Fabs, Fabs for Compound Semiconductors/Silicon Photonics/Sensors/Discrete Semiconductors and Semiconductor Assembly, Testing, Marking, and Packaging (ATMP)/Outsourced Semiconductor Assembly and Test (OSAT) facilities.
  • Further, the India Semiconductor Mission (ISM) has been established under Digital India Corporation (DIC) to drive India’s strategies for the development of the semiconductor and display manufacturing ecosystem in the country.
  • SEMICONINDIA 2023
    • The ‘SemiconIndia 2023’ is being organised by India Semiconductor Mission in partnership with industry and industry associations.
    • The aim is to make India a global hub for Semiconductor Design, Manufacturing and Technology Development which will help propel the vision of India Semiconductor Mission.
About Semiconductors

  • Semiconductors are made from tiny fragments of raw materials.
  • The raw materials such as silicon, germanium, and gallium arsenide.
  • They are then altered in a process called doping so that they will sometimes conduct electricity and sometimes not.
  • The silicon disc or wafer yields dozens of semiconductor chips.
Silicon Distribution
  • Silicon is one of the most common elements found in the earth’s crust, second only to oxygen.
  • Countries supply the majority of silicon: China, Russia, Brazil, Norway, United States, France, and Malaysia. China has the biggest share. 
Gallium
  • Around 80% is produced in China.
  • Gallium is used to make gallium arsenide for use in electronics.

TRIDENT Ghost Particle Detector

Source: Times of India
GS II: Science and Technology


Overview

Representation purpose Photo by Pixabay
  1. News in Brief
  2. About TRIDENT?
  3. What are Neutrinos?
  4. Neutrino Observatory in Inida

Why in the News?

China is undertaking a massive scientific endeavour by constructing the world’s largest ghost particle detector beneath the Western Pacific Ocean’s surface

  • It is named the Tropical Deep-sea Neutrino Telescope (TRIDENT) or Ocean Bell in Chinese.
News in Brief

  • The project is set for completion in 2030.
  • It aims to capture elusive neutrinos as they briefly become detectable in the deep ocean depths.
  • It provides valuable insights into their cosmic origins.
  • Neutrinos, are often referred to as ghost particles.
About TRIDENT?

  • TRIDENT, anchored 11,500 feet (3,500 meters) below the ocean’s surface.
  • Employs the Earth itself as a shield to detect neutrinos penetrating from the opposite side of the planet.
  • TRIDENT is near the equator which makes it receive neutrinos coming from all directions with the rotation of the Earth.
  • The location also enables all-sky observation without any blind spots.
  • TRIDENT Ghost Particle Detector will utilize more than 24,000 optical sensors.
    • It will distributed across 1,211 strings.
    • Each is 2,300 feet (700m) in length, ascending from the seabed.
    • It is arranged in a Penrose tiling pattern.
    • The detector will span 2.5 miles (4 kilometres) in diameter.
    • Scan an impressive 1.7 cubic miles (7.5 cubic kilometres).
What are Neutrinos?

  • They are subatomic particles with almost zero mass and no electrical charge.
  • They pass through matter with minimal interaction, making them notoriously difficult to detect.
  • Why they are called Ghost Particles?
    • They rarely collide with atoms and are difficult to find.
    • They can only be seen when they interact with other particles rarely.
    • That is why they are called ghost particles.
  • It is believed that Neutrinos are created from radioactive decay.
  • Nuclear forces treat electrons and neutrinos identically.
  • There is evidence that neutrinos are essential for understanding the origins of our universe.
Neutrino Observatory in Inida

  • India-based Neutrino Observatory (INO) will observe neutrinos produced in the atmosphere of the Earth.
  • This observation will tell us more about the properties of neutrino particles, whose main source is the Sun and the Earth’s atmosphere.
  • The neutrino detector will be a magnetized iron calorimeter, which will be the heaviest one made by any country.
  • The site identified is in Bodi West Hills, in Theni district, Tamil Nadu.

Bharat National Cyber Security Exercise (NCX) 2023

Source: PIB
GS III: Internal Security


Overview

Image by Darwin Laganzon from Pixabay
  1. News in Brief
  2. About Cybersecurity

Why in the News?

Bharat National Cyber Security Exercise (NCX) 2023 has concluded with a focus on elevating the cybersecurity preparedness of India to new heights.

News in Brief

  • The Bharat National Cyber Security Exercise (NCX) 2023, is an event of monumental significance spanning from October 9th to 20th October 2023.
  • This momentous occasion is a remarkable milestone in India’s unwavering quest for cybersecurity excellence.
  • This flagship event served as a unifying platform for over 300 participants.
  • Also representing a diverse spectrum of government agencies, public organizations, and the private sector, all resolutely committed to the safeguarding of critical information infrastructure.
  • Organized by the National Security Council Secretariat (NSCS), Government of India(GoI), in strategic partnership with Rashtriya Raksha University(RRU).
About Cybersecurity

  • Cybersecurity is the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  • As our society becomes increasingly dependent on digital technologies, the importance of cybersecurity cannot be overstated.
  • It encompasses a wide range of practices, technologies, and measures that work together to safeguard the integrity, confidentiality, and availability of data and information systems.
  • This comprehensive approach is vital because cyber threats and attacks are constantly evolving in complexity and sophistication.
Components of Cybersecurity
  • Network Security
    • This involves the protection of the integrity and confidentiality of data as it flows between devices on a network.
    • Firewalls, intrusion detection systems, and intrusion prevention systems are common network security tools.
  • Endpoint Security
    • Endpoint devices like computers, smartphones, and IoT devices are often vulnerable points in a network.
    • Endpoint security involves securing these devices with antivirus software, encryption, and regular updates.
  • Application Security
    • This focuses on ensuring that software and applications are free from vulnerabilities that could be exploited by cybercriminals. Secure coding practices and regular patching are essential here.
  • Cloud Security
    • With the increasing adoption of cloud services, cloud security is crucial.
    • It involves measures to protect data stored in cloud environments and the security of the cloud platform itself.
  • Data Security
    • Data is a prime target for cyberattacks.
    • Data security involves protecting data through encryption, access control, and backup procedures.
  • Identity and Access Management (IAM)
    • This ensures that only authorized individuals or systems can access resources.
    • Multi-factor authentication (MFA) is a common IAM technique.
  • Security Awareness Training
    • People are often the weakest link in cybersecurity.
    • Training and awareness programs help employees recognize and respond to security threats.
Cyber Threats
  • Malware: Malicious software, such as viruses, worms, Trojans, and ransomware, can disrupt systems and steal or encrypt data.
  • Phishing: Phishing attacks use deceptive emails or websites to trick individuals into revealing sensitive information or downloading malicious attachments.
  • Denial of Service (DoS) Attacks: These attacks overwhelm a system or network, making it unavailable to users.
  • Advanced Persistent Threats (APTs): These are complex, long-term attacks typically aimed at high-value targets, like government or corporate entities.
  • Insider Threats: Employees or individuals with insider access pose a significant threat to organizations. They can intentionally or unintentionally compromise security.
Cybersecurity Measures
  • Firewalls and Intrusion Detection Systems: These tools monitor network traffic and block or alert to suspicious activity.
  • Antivirus and Anti-Malware Software: These scan systems for known malware and remove or quarantine it.
  • Encryption: Encrypting data ensures that even if it’s intercepted, it remains unreadable without the correct decryption key.
  • Regular Updates and Patch Management: Keeping systems and software up to date is essential to fix vulnerabilities.
  • Incident Response Plan: Having a well-defined plan in place to respond to cybersecurity incidents is crucial to minimizing damage and downtime.
  • User Education: Regular training for employees helps them recognize and avoid common threats like phishing.
Challenges in Cybersecurity
  • Cybersecurity Skills Gap: There’s a shortage of skilled cybersecurity professionals globally, making it challenging to defend against evolving threats.
  • Rapidly Evolving Threat Landscape: Cyber threats constantly evolve and become more sophisticated, making it difficult to keep up.
  • Data Privacy and Compliance: Increasingly strict regulations around data privacy require organizations to invest in compliance efforts.
  • IoT Security: The proliferation of the Internet of Things devices presents new security challenges, as many of these devices have weak security measures.

Prelims


PM SVANidhi Scheme


News: A recent report highlights the significant influence of the PM SVANidhi Scheme on empowering street vendors and strengthening the country’s social fabric.

  • It is a micro-credit scheme.
  • Aims to provide affordable working capital loans to street vendors affected by the COVID-19 pandemic.
  • It was launched by the Ministry of Housing and Urban Affairs (MoHUA).
  • It helps in the resumption of their livelihood activities.
  • Offers a working capital loan of up to ₹10,000 for one year.
  • 43% of the beneficiaries are women
  • Over 53 lakh street vendors have benefited.

Daily Current Affairs: Click Here

Rate this Article and Leave a Feedback
Exit mobile version