Advanced AI models — including Mythos, which has reportedly found long-undetected bugs in widely used software like OpenBSD (a security-hardened operating system) and FFmpeg (popular video software) — are transforming cybersecurity by automating vulnerability detection and defence; major industry trends include defensive coalitions like Project Glasswing involving AWS, Google, and Microsoft to coordinate protection against cyber threats; integration of cybersecurity into cloud platforms (e.g., Google's acquisition of Wiz enabling automatic scanning of customer systems); funding of open-source security maintainers; AI-driven full-service cybersecurity platforms; controlled deployment of the most powerful tools (e.g., Mythos restricted to trusted firms); and competitive launches of cyber-focused AI models including OpenAI's GPT-5.4-Cyber.
उन्नत AI मॉडल — जिनमें Mythos शामिल है, जिसने व्यापक रूप से उपयोग किए जाने वाले सॉफ़्टवेयर जैसे OpenBSD (एक सुरक्षा-सुदृढ़ ऑपरेटिंग सिस्टम) एवं FFmpeg (लोकप्रिय वीडियो सॉफ़्टवेयर) में लंबे समय से अनदेखे बग ढूँढे हैं — स्वचालित भेद्यता पहचान एवं रक्षा द्वारा साइबर सुरक्षा को बदल रहे हैं; प्रमुख उद्योग रुझानों में AWS, Google, एवं Microsoft को शामिल करने वाले Project Glasswing जैसे रक्षात्मक गठबंधन शामिल हैं; क्लाउड प्लेटफ़ॉर्म में साइबर सुरक्षा का एकीकरण (जैसे Google द्वारा Wiz का अधिग्रहण); ओपन-सोर्स सुरक्षा रखरखावकर्ताओं का वित्तपोषण; AI-संचालित पूर्ण-सेवा साइबर सुरक्षा प्लेटफ़ॉर्म; सबसे शक्तिशाली उपकरणों की नियंत्रित परिनियोजन (जैसे Mythos विश्वसनीय फ़र्मों तक सीमित); एवं OpenAI के GPT-5.4-Cyber सहित साइबर-केंद्रित AI मॉडल के प्रतिस्पर्धी लॉन्च।
Why in News
Advanced AI models are reshaping cybersecurity by automating vulnerability detection and defence — making major technology firms central to global digital security infrastructure. KEY TRENDS in how AI companies are building cybersecurity tools: (1) AI-BASED VULNERABILITY DETECTION — AI tools scan large codebases and find hidden flaws faster than humans; for example, the AI model MYTHOS has reportedly found bugs in OpenBSD (a security-hardened open-source operating system) and FFmpeg (a widely used multimedia framework for video processing) that humans and conventional tools missed for years — demonstrating AI's capacity to uncover deep, unnoticed weaknesses. (2) BUILDING DEFENSIVE COALITIONS — companies collaborate to secure global software systems using shared AI tools; PROJECT GLASSWING is a coalition reported to include AMAZON WEB SERVICES (AWS), GOOGLE, and MICROSOFT, coordinating protection against cyber threats. (3) INTEGRATION WITH CLOUD PLATFORMS — cybersecurity is built directly into cloud systems for continuous monitoring; GOOGLE'S ACQUISITION OF WIZ (a major cloud-security firm) enables Google's cloud to automatically scan customer systems for risks — making security part of the cloud service rather than a separate tool. (4) FUNDING OPEN-SOURCE SECURITY — AI companies support developers and foundations to fix vulnerabilities in widely used software; this improves security of global digital infrastructure used by millions. (5) AI-DRIVEN CYBERSECURITY PLATFORMS — companies offer complete security systems combining detection, prevention, and response; integrating AI + cloud + security to offer full-service cybersecurity provision. (6) EXCLUSIVE ACCESS AND CONTROLLED DEPLOYMENT — the most powerful AI tools are restricted to selected organisations; for example, Mythos has reportedly not been publicly released, with only trusted firms getting access — preventing misuse but also concentrating defensive capability among a few companies. (7) COMPETITION AMONG AI FIRMS — companies compete to build more advanced AI security tools; OPENAI launched GPT-5.4-CYBER, a cyber-focused model, in this competitive space. KEY POLICY TENSIONS: (a) BENEFITS — faster vulnerability discovery, automated defence, scalable cloud security, open-source ecosystem support; (b) RISKS — concentration of defensive capability in few private firms; potential dual-use risk (offensive uses of similar AI capabilities); transparency vs controlled-access tradeoffs; reliance on private actors for critical-infrastructure defence; potential displacement of human security researchers. INDIA'S CYBERSECURITY ARCHITECTURE provides relevant context: CERT-In (Indian Computer Emergency Response Team) under the Ministry of Electronics and Information Technology coordinates cyber-incident response; the Information Technology Act, 2000 (and 2008 amendments) is the primary cyber-legislation; the Digital Personal Data Protection Act, 2023 governs personal data; the National Cyber Security Strategy is in development. India hosts a fast-growing cybersecurity industry and is a major target for cyber attacks given the size of its digital ecosystem.
At a Glance
- Industry trend
- AI companies building cybersecurity tools — automating detection and defence
- Example AI model
- Mythos — reportedly found long-undetected bugs in OpenBSD and FFmpeg
- OpenBSD
- Security-hardened open-source operating system
- FFmpeg
- Widely used open-source multimedia framework for video processing
- Defensive coalition example
- Project Glasswing — reportedly includes AWS, Google, Microsoft
- Cloud-security acquisition
- Google acquired Wiz — integrates security into cloud platform
- Open-source security funding
- AI firms funding maintainers of widely used open-source software
- Controlled deployment example
- Mythos reportedly restricted to trusted firms; not publicly released
- Competitive product example
- OpenAI GPT-5.4-Cyber — cyber-focused AI model
- Key benefit
- Faster vulnerability discovery; scalable defence; integrated cloud security
- Key risks
- Concentration of capability in few firms; dual-use risk; transparency tradeoffs
- India cyber-architecture
- CERT-In; IT Act 2000 (amended 2008); DPDP Act 2023; National Cyber Security Strategy in development
ADVANCED AI MODELS are reshaping cybersecurity by automating detection and defence, making major technology firms central to global digital security infrastructure. The reportage describes seven key trends: (1) AI-BASED VULNERABILITY DETECTION — AI tools scan large codebases and find hidden flaws faster than humans. The reported example: the AI model MYTHOS has reportedly found bugs in OPENBSD (a security-hardened open-source operating system known for code-quality and audit standards) and FFMPEG (a widely used open-source multimedia framework for video and audio processing, embedded in countless applications) that humans and conventional tools missed for years — demonstrating AI's capacity to uncover deep, long-unnoticed weaknesses in complex software. (2) BUILDING DEFENSIVE COALITIONS — companies collaborate to secure global software systems using shared AI tools. PROJECT GLASSWING is a coalition reported to include AMAZON WEB SERVICES (AWS), GOOGLE, and MICROSOFT, coordinating protection against cyber threats. Coalitions of this kind aim to pool detection capability and threat intelligence across major cloud providers. (3) INTEGRATION WITH CLOUD PLATFORMS — cybersecurity is built directly into cloud systems for continuous monitoring. The reported example: GOOGLE'S ACQUISITION OF WIZ (a major cloud-security firm originally founded in 2020 in Israel) enables Google's cloud to automatically scan customer systems for risks — making security part of the cloud service rather than a separate tool. (4) FUNDING OPEN-SOURCE SECURITY — AI companies support developers and foundations to fix vulnerabilities found in widely used software; this improves the security of global digital infrastructure used by millions, particularly the 'long-tail' of open-source dependencies that underpin modern software but are often maintained by small volunteer teams. (5) AI-DRIVEN CYBERSECURITY PLATFORMS — companies offer complete security systems combining DETECTION + PREVENTION + RESPONSE. Integration of AI + cloud + security positions firms as full-service cybersecurity providers. (6) EXCLUSIVE ACCESS AND CONTROLLED DEPLOYMENT — the most powerful AI tools are restricted to selected organisations. The reported example: Mythos has reportedly not been publicly released, with only trusted firms getting access. Rationale: prevents misuse (the same capabilities that detect vulnerabilities could be used offensively to find attack surfaces) but also concentrates defensive capability among a few companies — a key policy tension. (7) COMPETITION AMONG AI FIRMS — companies compete to build more advanced AI security tools. The reported example: OPENAI LAUNCHED GPT-5.4-CYBER, a cyber-focused AI model, in this competitive space. KEY POLICY TENSIONS surfaced by these trends: (a) BENEFITS — faster vulnerability discovery; automated defence at machine speed; scalable cloud security integrated into platforms used by millions; open-source ecosystem support filling gaps left by under-resourced maintainers; full-service security delivery integrating multiple capability layers. (b) RISKS — concentration of defensive capability in a small number of private firms; dual-use risk (offensive applications of vulnerability-discovery AI); transparency versus controlled-access tradeoffs; private-actor dependence for critical-infrastructure defence; potential displacement of human security researchers; equity issues if smaller firms cannot access elite tools. INDIA'S CYBERSECURITY ARCHITECTURE provides relevant context: (1) CERT-In (Indian Computer Emergency Response Team) — under the Ministry of Electronics and Information Technology (MeitY); coordinates cyber-incident response; CERT-In Directions on cyber-incident reporting (April 2022) require service providers to report incidents within six hours and maintain logs. (2) Information Technology Act, 2000 (with major amendments in 2008) — primary cyber-legislation in India; covers offences, intermediaries, electronic governance. (3) Digital Personal Data Protection Act, 2023 (DPDPA) — governs personal data; complements cybersecurity framework. (4) National Cyber Security Strategy under development. (5) National Critical Information Infrastructure Protection Centre (NCIIPC) — protects critical sectors (banking, power, telecom, transport, health). (6) Cyber Crime Coordination Centre (I4C) — operationalised 2018-19; coordinates cybercrime response. (7) Indian Cyber Crime Coordination Helpline (1930). For UPSC and SSC contexts, this story illustrates: AI's transformative role in cybersecurity; concentration-of-capability concerns; public-private partnership in cybersecurity; integration with cloud computing; India's cybersecurity policy architecture. NOTE ON FACTUAL CARE: claims about specific AI models (Mythos, GPT-5.4-Cyber) and the Project Glasswing coalition reflect what the source reportage describes; the underlying tools and coalitions are evolving, and exam-relevance lies in the trends and India's cyber-architecture rather than specific product names.
उन्नत AI मॉडल स्वचालित पहचान एवं रक्षा के माध्यम से साइबर सुरक्षा को बदल रहे हैं, प्रमुख प्रौद्योगिकी फ़र्मों को वैश्विक डिजिटल सुरक्षा अवसंरचना के लिए केंद्रीय बना रहे हैं। 7 प्रमुख रुझान: (1) AI-आधारित भेद्यता पहचान — AI उपकरण बड़े कोडबेस को स्कैन करते हैं एवं छिपी हुई खामियों को मनुष्यों की तुलना में तेज़ी से ढूँढते हैं; उदाहरण: AI मॉडल Mythos ने OpenBSD (एक सुरक्षा-सुदृढ़ ओपन-सोर्स ऑपरेटिंग सिस्टम) एवं FFmpeg (एक व्यापक रूप से उपयोग किया जाने वाला ओपन-सोर्स मल्टीमीडिया ढाँचा) में लंबे समय से अनदेखे बग ढूँढे हैं। (2) रक्षात्मक गठबंधन का निर्माण — Project Glasswing में AWS, Google, Microsoft शामिल हैं। (3) क्लाउड प्लेटफ़ॉर्म में एकीकरण — Google द्वारा Wiz का अधिग्रहण। (4) ओपन-सोर्स सुरक्षा का वित्तपोषण। (5) AI-संचालित साइबर सुरक्षा प्लेटफ़ॉर्म। (6) विशिष्ट पहुँच एवं नियंत्रित परिनियोजन — Mythos केवल विश्वसनीय फ़र्मों तक सीमित। (7) AI फ़र्मों के बीच प्रतिस्पर्धा — OpenAI ने GPT-5.4-Cyber लॉन्च किया। नीति तनाव: लाभ बनाम जोख़िम (कुछ फ़र्मों में क्षमता का संकेंद्रण, दोहरे उपयोग का जोख़िम, पारदर्शिता बनाम नियंत्रित-पहुँच ट्रेडऑफ़)। भारत का साइबर सुरक्षा ढाँचा: (1) CERT-In (Indian Computer Emergency Response Team) — MeitY के तहत (2) सूचना प्रौद्योगिकी अधिनियम, 2000 (2008 में संशोधित) (3) डिजिटल व्यक्तिगत डेटा सुरक्षा अधिनियम, 2023 (DPDPA) (4) NCIIPC — महत्वपूर्ण क्षेत्रों की रक्षा (5) Cyber Crime Coordination Centre (I4C) (6) हेल्पलाइन 1930।
- 1. AI-based vulnerability detection1. AI-आधारित भेद्यता पहचानMythos found bugs in OpenBSD + FFmpeg· Mythos ने OpenBSD + FFmpeg में बग ढूँढे
- 2. Defensive coalitions2. रक्षात्मक गठबंधनProject Glasswing — AWS + Google + Microsoft· Project Glasswing
- 3. Integration with cloud platforms3. क्लाउड एकीकरणGoogle acquired Wiz — security in cloud· Google ने Wiz खरीदा
- 4. Funding open-source security4. ओपन-सोर्स सुरक्षा वित्तपोषणAI firms support OSS maintainers· OSS रखरखावकर्ताओं का समर्थन
- 5. AI-driven cybersecurity platforms5. AI-संचालित प्लेटफ़ॉर्मDetection + Prevention + Response combined· पहचान + रोकथाम + प्रतिक्रिया
- 6. Exclusive access / controlled deployment6. नियंत्रित परिनियोजनMythos restricted to trusted firms· Mythos केवल विश्वसनीय फ़र्मों तक
- 7. Competition among AI firms7. AI फ़र्म प्रतिस्पर्धाOpenAI's GPT-5.4-Cyber· OpenAI का GPT-5.4-Cyber
Body / law निकाय / क़ानून | Role भूमिका | Authority / ministry प्राधिकरण / मंत्रालय |
|---|---|---|
CERT-In CERT-In | National cyber incident response साइबर घटना प्रतिक्रिया | Section 70B of IT Act; MeitY धारा 70B; MeitY |
IT Act, 2000 IT अधिनियम, 2000 | Primary cyber-legislation; cybercrime provisions added 2008 प्राथमिक साइबर क़ानून | MeitY MeitY |
DPDPA, 2023 DPDPA, 2023 | Personal data protection; Data Protection Board of India व्यक्तिगत डेटा सुरक्षा | MeitY MeitY |
NCIIPC NCIIPC | Critical infrastructure protection (banking, power, etc) महत्वपूर्ण अवसंरचना | Section 70A of IT Act; under NTRO धारा 70A; NTRO के तहत |
I4C + helpline 1930 I4C + हेल्पलाइन 1930 | Cybercrime coordination + reporting portal साइबर अपराध समन्वय | Ministry of Home Affairs गृह मंत्रालय |
Static GK
- •OpenBSD: Open-source Unix-like operating system founded in 1995; emphasises code-quality, security-hardened defaults, and proactive auditing; widely cited as one of the most secure operating systems available; project led by Theo de Raadt
- •FFmpeg: Open-source multimedia framework for handling video, audio, and other multimedia files and streams; embedded in countless applications across consumer electronics, streaming services, and media tools; project started in 2000
- •AWS (Amazon Web Services): Cloud-computing subsidiary of Amazon; launched 2006; world's largest cloud provider by market share; offers infrastructure, storage, AI, and security services across global data centres
- •Wiz (cloud security firm): Cloud-security company founded in 2020 in Israel; specialises in scanning cloud environments for vulnerabilities and misconfigurations; reported acquisition by Google announced for major sum, integrating security into Google Cloud Platform
- •Project Glasswing (per source): Reported defensive coalition involving major cloud and tech firms — including AWS, Google, and Microsoft — coordinating protection against cyber threats using shared AI tools
- •OpenAI: American AI research and deployment company; founded 2015; launched ChatGPT in 2022 driving generative-AI mainstream adoption; produces GPT family of models including (per source reportage) cyber-focused GPT-5.4-Cyber
- •CERT-In (Indian Computer Emergency Response Team): National nodal agency for cybersecurity incident response in India; established under Section 70B of the IT Act 2000 (added by 2008 Amendment); functions under Ministry of Electronics and Information Technology (MeitY); CERT-In Directions of April 2022 require service providers to report cyber incidents within six hours
- •Information Technology Act, 2000 (IT Act): Primary cyber-legislation in India; passed in 2000; major amendments in 2008 (added cybercrime provisions, intermediaries liability framework, electronic governance); administered by MeitY
- •Digital Personal Data Protection Act, 2023 (DPDPA): India's personal data protection legislation; passed in August 2023; replaces earlier Personal Data Protection Bill drafts; establishes Data Protection Board of India; framework around Data Fiduciaries, Data Principals, and Significant Data Fiduciaries; complements cybersecurity framework
- •National Critical Information Infrastructure Protection Centre (NCIIPC): Established in 2014 under Section 70A of the IT Act; protects India's critical information infrastructure across sectors like power, banking, telecom, transport, health; functions under National Technical Research Organisation (NTRO)
- •Indian Cyber Crime Coordination Centre (I4C): Operationalised 2018-19 under Ministry of Home Affairs; coordinates cybercrime response; works with state law-enforcement; runs the National Cyber Crime Reporting Portal (cybercrime.gov.in) and the cybercrime helpline 1930
- •National Cyber Security Strategy: India's strategic framework for cybersecurity; under development by the National Security Council Secretariat; will succeed the National Cyber Security Policy 2013
- •Ministry of Electronics and Information Technology (MeitY): Central ministry overseeing IT, electronics, internet governance, cybersecurity policy, and digital initiatives in India; administers IT Act 2000, DPDPA 2023, and CERT-In; runs Digital India programmes
Timeline
- 1995OpenBSD project founded — open-source Unix-like operating system focused on security.
- 2000FFmpeg multimedia framework project started; Information Technology Act, 2000 enacted in India.
- 2006Amazon Web Services (AWS) launched.
- 2008Information Technology (Amendment) Act, 2008 — major cybercrime provisions added in India.
- 2014National Critical Information Infrastructure Protection Centre (NCIIPC) established under Section 70A of IT Act.
- 2015OpenAI founded in San Francisco.
- 2018-19Indian Cyber Crime Coordination Centre (I4C) operationalised under Ministry of Home Affairs.
- 2020Wiz cloud-security firm founded in Israel.
- April 2022CERT-In Directions on cyber-incident reporting issued — six-hour reporting requirement for service providers.
- 2022OpenAI launches ChatGPT; brings generative AI into mainstream.
- August 2023Digital Personal Data Protection Act, 2023 passed by Parliament of India.
- 2026Reportage on AI companies building cybersecurity tools — including Mythos, Project Glasswing, Google's Wiz acquisition, OpenAI's GPT-5.4-Cyber.
- →Industry trend = AI companies BUILDING CYBERSECURITY TOOLS = automating detection + defence.
- →AI model example = MYTHOS — reportedly found bugs in OPENBSD + FFMPEG that humans missed for years.
- →OpenBSD = open-source Unix-like OS; security-hardened; founded 1995. FFmpeg = open-source multimedia framework; project started 2000.
- →DEFENSIVE COALITION = Project Glasswing — reportedly includes AWS + GOOGLE + MICROSOFT.
- →CLOUD INTEGRATION = Google ACQUIRED WIZ (cloud-security firm founded 2020 in Israel) — cybersecurity becomes part of cloud service.
- →OPEN-SOURCE FUNDING = AI firms fund maintainers of widely used open-source software.
- →FULL-SERVICE PLATFORMS = combining detection + prevention + response.
- →CONTROLLED DEPLOYMENT = MYTHOS not publicly released — only TRUSTED FIRMS get access. Prevents misuse but CONCENTRATES defensive capability.
- →COMPETITIVE LAUNCHES = OpenAI's GPT-5.4-CYBER — cyber-focused AI model.
- →BENEFITS: Faster vulnerability discovery + automated defence + scalable cloud security + open-source support.
- →RISKS: (1) Concentration of capability in few firms (2) Dual-use risk (offensive applications of vulnerability discovery) (3) Transparency vs controlled-access tradeoffs (4) Private-actor dependence for critical infrastructure (5) Displacement of human security researchers.
- →INDIA'S CYBER ARCHITECTURE: (1) CERT-In = INDIAN COMPUTER EMERGENCY RESPONSE TEAM. Under MeitY. Established under SECTION 70B of IT Act (added by 2008 Amendment). CERT-IN DIRECTIONS APRIL 2022 = 6-hour incident reporting requirement.
- →(2) IT ACT 2000 = primary cyber-legislation. MAJOR AMENDMENTS in 2008 (cybercrime provisions, intermediaries liability).
- →(3) DPDPA 2023 = Digital Personal Data Protection Act, August 2023. Establishes Data Protection Board of India. Data Fiduciaries + Data Principals.
- →(4) NCIIPC = National Critical Information Infrastructure Protection Centre. Established 2014 under SECTION 70A of IT Act. Under NTRO. Protects banking + power + telecom + transport + health.
- →(5) I4C = Indian Cyber Crime Coordination Centre. Under Ministry of Home Affairs. Operationalised 2018-19. Runs National Cyber Crime Reporting Portal (cybercrime.gov.in) + helpline 1930.
- →(6) MeitY = Ministry of Electronics and Information Technology. Administers IT Act, DPDPA, CERT-In, Digital India.
- →(7) National Cyber Security Strategy under development; will succeed National Cyber Security Policy 2013.
Exam Angles
Advanced AI models — including Mythos, which reportedly found long-undetected bugs in OpenBSD and FFmpeg — are transforming cybersecurity by automating detection and defence; key trends include defensive coalitions like Project Glasswing involving AWS, Google, and Microsoft; integration of cybersecurity into cloud platforms (Google's Wiz acquisition); AI-driven full-service security platforms; controlled deployment of powerful tools (Mythos restricted to trusted firms); and competitive AI launches (OpenAI's GPT-5.4-Cyber); India's cybersecurity architecture rests on CERT-In under MeitY (under Section 70B of IT Act), the IT Act 2000 (amended 2008), Digital Personal Data Protection Act 2023, NCIIPC, and the I4C with cybercrime helpline 1930.
Q1. The Indian Computer Emergency Response Team (CERT-In) — India's national nodal agency for cybersecurity incident response — functions under which Ministry?
- A.Ministry of Home Affairs
- B.Ministry of Electronics and Information Technology (MeitY)
- C.Ministry of Defence
- D.Ministry of External Affairs
tap to reveal answer
Answer: B. Ministry of Electronics and Information Technology (MeitY)
CERT-In (Indian Computer Emergency Response Team) functions under the Ministry of Electronics and Information Technology (MeitY). It was established under Section 70B of the Information Technology Act, 2000 (added by the 2008 Amendment). The CERT-In Directions of April 2022 require service providers to report cyber incidents within six hours.
Q2. Which Act is India's primary cyber-legislation, originally passed in 2000 with major amendments in 2008 adding cybercrime and intermediary liability provisions?
- A.Digital Personal Data Protection Act, 2023
- B.Information Technology Act, 2000
- C.Telecommunications Act, 2023
- D.Indian Penal Code, 1860
tap to reveal answer
Answer: B. Information Technology Act, 2000
The Information Technology Act, 2000 (IT Act) is India's primary cyber-legislation. Major amendments in 2008 added cybercrime provisions, intermediary liability framework, and electronic governance updates. The Act is administered by MeitY. The Digital Personal Data Protection Act, 2023 is a separate (and more recent) law focused specifically on personal data protection.
Q3. The defensive coalition 'Project Glasswing', referenced in the reportage on AI cybersecurity tools, reportedly includes which of the following companies?
- A.AWS, Google, and Microsoft
- B.Apple, Facebook, and Twitter
- C.Salesforce, Oracle, and IBM
- D.Tesla, Uber, and Airbnb
tap to reveal answer
Answer: A. AWS, Google, and Microsoft
Per the reportage, Project Glasswing is a defensive coalition that reportedly includes Amazon Web Services (AWS), Google, and Microsoft, coordinating protection against cyber threats using shared AI tools. Coalitions of this kind aim to pool detection capability and threat intelligence across major cloud providers.
Q4. Google's acquisition of Wiz — referenced as an example of integrating cybersecurity into cloud platforms — relates to which type of company?
- A.A social-media company
- B.A cloud-security firm
- C.An online retailer
- D.A search-engine startup
tap to reveal answer
Answer: B. A cloud-security firm
Wiz is a cloud-security firm — founded in 2020 in Israel — specialising in scanning cloud environments for vulnerabilities and misconfigurations. Google's acquisition of Wiz integrates cybersecurity directly into the Google Cloud Platform, making security part of the cloud service rather than a separate tool. This illustrates the broader trend of integration of security into cloud platforms.
Q5. Which of the following is the National Cyber Crime Reporting Portal helpline number in India?
- A.1090
- B.1098
- C.1930
- D.100
tap to reveal answer
Answer: C. 1930
The National Cyber Crime Reporting helpline number in India is 1930. The portal (cybercrime.gov.in) and helpline are run by the Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs, operationalised 2018-19. (1090 is the women-in-distress helpline in some states; 1098 is CHILDLINE; 100 is the police emergency helpline.)
Common Confusions
- Trap · Mythos vs GPT-5.4-Cyber — different tools
Correct: Per source: MYTHOS is described as an AI model that found bugs in OpenBSD and FFmpeg; OPENAI's GPT-5.4-CYBER is described as a separate cyber-focused model in the competitive space. Two distinct tools described in the source.
- Trap · OpenBSD vs FFmpeg — what each one is
Correct: OPENBSD = security-hardened OPEN-SOURCE OPERATING SYSTEM (Unix-like, founded 1995). FFMPEG = open-source MULTIMEDIA FRAMEWORK for video and audio processing (project started 2000). Different software categories.
- Trap · Project Glasswing members
Correct: Per source reportage: AWS + GOOGLE + MICROSOFT. NOT Apple, Facebook, Twitter, Tesla. Three major cloud providers.
- Trap · Wiz — what kind of company
Correct: WIZ = CLOUD-SECURITY FIRM (founded 2020 in Israel). NOT a social media company, retailer, or search-engine startup. Acquired by Google to integrate security into Google Cloud Platform.
- Trap · CERT-In ministry
Correct: Under MINISTRY OF ELECTRONICS AND INFORMATION TECHNOLOGY (MeitY). NOT under Ministry of Home Affairs (which oversees I4C — different body). Distinct ministerial homes for CERT-In vs I4C.
- Trap · CERT-In legal basis
Correct: Established under SECTION 70B of the IT ACT 2000 — added by the 2008 AMENDMENT. NOT under Section 70A (which is for NCIIPC). Don't confuse the two sections.
- Trap · NCIIPC vs CERT-In
Correct: NCIIPC = National Critical Information Infrastructure Protection Centre. Established 2014 under SECTION 70A of IT Act. Under NTRO. Protects critical sectors (banking, power, telecom, transport, health). CERT-In = different body — broader cyber incident response under MeitY (Section 70B). Both bodies, different focus.
- Trap · CERT-In Directions reporting requirement
Correct: April 2022 CERT-In Directions require service providers to report cyber incidents within SIX HOURS. NOT 24 hours, 72 hours, or immediately. Six-hour requirement is the stipulated timeline.
- Trap · Cybercrime helpline number
Correct: 1930 is the National Cyber Crime helpline number. NOT 100 (police), 108 (ambulance), 1098 (CHILDLINE), or 1090 (women in distress). Run by I4C through cybercrime.gov.in portal.
- Trap · DPDPA passage year
Correct: August 2023. Digital Personal Data Protection Act, 2023. NOT 2017 (when initial Justice Srikrishna Committee was formed) or 2019 (PDP Bill draft) or 2022 (revised DPDP Bill draft). The Act passed in August 2023.
- Trap · IT Act amendments year
Correct: Major amendments to the IT Act 2000 came in 2008 — adding cybercrime provisions (Sections 66, 67 etc.), intermediary liability, electronic governance. NOT 2010 or 2015. The 2008 amendments are the most important.
- Trap · MeitY — what it administers
Correct: Ministry of ELECTRONICS AND INFORMATION TECHNOLOGY. Administers IT Act 2000, DPDPA 2023, CERT-In, Digital India programmes. Under it: NIC, MyGov, UIDAI (statutory autonomy), CSC, DigiLocker, and others. Not Ministry of Communications.
- Trap · AI cybersecurity policy tensions — single or multiple?
Correct: MULTIPLE policy tensions: (1) Concentration of capability in few firms (2) Dual-use risk (3) Transparency vs controlled access (4) Private-actor dependence (5) Equity for smaller firms. Don't reduce to single concern.
- Trap · OpenAI founding year
Correct: 2015 (founded in San Francisco). Launched ChatGPT in 2022 — different milestones. Not 2018 or 2020.
- Trap · AWS launch year
Correct: 2006. Amazon Web Services launched in 2006 as cloud-computing subsidiary. World's largest cloud provider by market share. Not 2002 or 2010.
- Trap · OpenBSD founder
Correct: OpenBSD project led by Theo de Raadt; project founded 1995 (forked from NetBSD). Don't confuse OpenBSD (security focus) with FreeBSD (different BSD variant) or Linux (different OS family entirely).
Flashcard
Q · AI companies building cybersecurity tools + India's cyber architecture?tap to reveal
Suggested Reading
- CERT-In — India's cyber incident responsesearch: cert-in.org.in cyber incident reporting directions april 2022 six hour
- Indian Cyber Crime Coordination Centre (I4C)search: cybercrime.gov.in i4c indian cyber crime coordination centre helpline 1930
Prerequisites · concepts to brush up first
- Basic cybersecurity concepts
- Cloud computing platforms and major providers
- India's IT Act 2000 and amendments
- CERT-In and India's cyber response architecture
- Open-source software ecosystem