Skip to main content
GKSolverGKSolver
HomeExam NewsMCQsMainsUPSC Prep
Login
Menu
Daily
HomeDaily NewsExam NewsStudy Plan
Practice
Essential MCQsEssential MainsUPSC PrepBookmarks
Browse
EditorialsStory ThreadsTrending
Home
Daily
MCQs
Saved
News

© 2025 GKSolver. Free AI-powered UPSC preparation platform.

AboutContactPrivacyTermsDisclaimer
GKSolverGKSolver
HomeExam NewsMCQsMainsUPSC Prep
Login
Menu
Daily
HomeDaily NewsExam NewsStudy Plan
Practice
Essential MCQsEssential MainsUPSC PrepBookmarks
Browse
EditorialsStory ThreadsTrending
Home
Daily
MCQs
Saved
News

© 2025 GKSolver. Free AI-powered UPSC preparation platform.

AboutContactPrivacyTermsDisclaimer
5 minPolitical Concept

National Cyber Security Policy - Key Objectives

Mind map showing the key objectives of the National Cyber Security Policy.

National Cyber Security Policy

CII Protection

Joint Exercises

Cybersecurity Education

Citizen Education

This Concept in News

1 news topics

1

VIT Vice-President Advocates AI as Co-Pilot in Legal Profession

2 March 2026

The news about AI in the legal profession underscores the need for a dynamic and adaptive cybersecurity policy. The integration of AI introduces new vulnerabilities and threats that must be addressed proactively. This news highlights the importance of the policy's provisions for research and development in cybersecurity technologies, as well as its focus on addressing emerging technologies. The news also challenges the policy to evolve and adapt to the changing landscape of cyber threats. For example, the policy may need to address the ethical implications of using AI in cybersecurity, as well as the potential for AI to be used for malicious purposes. Understanding the National Cyber Security Policy is crucial for analyzing the implications of AI in the legal profession and developing effective strategies for mitigating cyber risks. It is important to remember that technology is a double-edged sword and must be used responsibly.

5 minPolitical Concept

National Cyber Security Policy - Key Objectives

Mind map showing the key objectives of the National Cyber Security Policy.

National Cyber Security Policy

CII Protection

Joint Exercises

Cybersecurity Education

Citizen Education

This Concept in News

1 news topics

1

VIT Vice-President Advocates AI as Co-Pilot in Legal Profession

2 March 2026

The news about AI in the legal profession underscores the need for a dynamic and adaptive cybersecurity policy. The integration of AI introduces new vulnerabilities and threats that must be addressed proactively. This news highlights the importance of the policy's provisions for research and development in cybersecurity technologies, as well as its focus on addressing emerging technologies. The news also challenges the policy to evolve and adapt to the changing landscape of cyber threats. For example, the policy may need to address the ethical implications of using AI in cybersecurity, as well as the potential for AI to be used for malicious purposes. Understanding the National Cyber Security Policy is crucial for analyzing the implications of AI in the legal profession and developing effective strategies for mitigating cyber risks. It is important to remember that technology is a double-edged sword and must be used responsibly.

  1. Home
  2. /
  3. Concepts
  4. /
  5. Political Concept
  6. /
  7. National Cyber Security Policy
Political Concept

National Cyber Security Policy

What is National Cyber Security Policy?

The National Cyber Security Policy is a framework document outlining India's strategy to protect its cyberspace. It aims to create a secure and resilient digital ecosystem by addressing vulnerabilities, preventing cybercrimes, and promoting cybersecurity awareness. The policy encompasses various aspects, including infrastructure protection, incident response, skill development, and international cooperation. It's not just about technology; it's about safeguarding India's economy, national security, and citizens' data in the digital age. Think of it as a national defense strategy, but for the internet. The policy aims to reduce cyber risk and create a safe cyberspace for economic growth. India's current policy was released in 2013 and is currently being updated.

Historical Background

India's journey towards a formal cybersecurity policy began in the early 2000s, driven by increasing cyber threats and the growing reliance on digital infrastructure. The first significant step was the establishment of the Information Technology Act in 2000a law dealing with cybercrime and electronic transactions. However, as cyber threats became more sophisticated, the need for a comprehensive policy became evident. The first National Cyber Security Policy was formulated in 2013. This policy aimed to create a secure and resilient cyberspace for India. It addressed key areas such as protecting critical infrastructure, promoting cybersecurity awareness, and developing skilled cybersecurity professionals. Currently, the government is working on a new cybersecurity strategy to address emerging challenges like artificial intelligence-based threats and data protection. This new policy is expected to be more dynamic and adaptive to the evolving cyber landscape.

Key Points

12 points
  • 1.

    The policy emphasizes the protection of critical information infrastructure (CII). This includes systems and networks vital to national security, economy, and public health. Think of power grids, banking systems, and transportation networks. The goal is to prevent disruptions that could have severe consequences. For instance, a cyberattack on a power grid could cause widespread blackouts, impacting hospitals, businesses, and homes.

  • 2.

    It promotes the creation of a secure cyber ecosystem through public-private partnerships. The government recognizes that it cannot tackle cybersecurity challenges alone and needs the expertise and resources of the private sector. This collaboration involves sharing threat intelligence, developing security standards, and conducting joint exercises. For example, the government might partner with a cybersecurity firm to protect critical infrastructure.

  • 3.

    The policy focuses on developing skilled cybersecurity professionals through training and education programs. A shortage of skilled professionals is a major challenge in the cybersecurity field. The policy aims to address this by promoting cybersecurity education in schools and universities, as well as providing specialized training programs for professionals. For example, the government might fund cybersecurity courses at IITs and NITs.

Visual Insights

National Cyber Security Policy - Key Objectives

Mind map showing the key objectives of the National Cyber Security Policy.

National Cyber Security Policy

  • ●Protect Critical Infrastructure
  • ●Promote Public-Private Partnerships
  • ●Develop Skilled Professionals
  • ●Enhance Cybersecurity Awareness

Recent Real-World Examples

1 examples

Illustrated in 1 real-world examples from Mar 2026 to Mar 2026

VIT Vice-President Advocates AI as Co-Pilot in Legal Profession

2 Mar 2026

The news about AI in the legal profession underscores the need for a dynamic and adaptive cybersecurity policy. The integration of AI introduces new vulnerabilities and threats that must be addressed proactively. This news highlights the importance of the policy's provisions for research and development in cybersecurity technologies, as well as its focus on addressing emerging technologies. The news also challenges the policy to evolve and adapt to the changing landscape of cyber threats. For example, the policy may need to address the ethical implications of using AI in cybersecurity, as well as the potential for AI to be used for malicious purposes. Understanding the National Cyber Security Policy is crucial for analyzing the implications of AI in the legal profession and developing effective strategies for mitigating cyber risks. It is important to remember that technology is a double-edged sword and must be used responsibly.

Related Concepts

CybersecurityBiotechnologyInformation Technology Act, 2000

Source Topic

VIT Vice-President Advocates AI as Co-Pilot in Legal Profession

Science & Technology

UPSC Relevance

The National Cyber Security Policy is highly relevant for the UPSC exam, particularly for GS Paper 3 (Economy, Science and Technology, Environment, and Security). Questions can be asked about the policy's objectives, key provisions, and impact on national security and the economy. It's also relevant for GS Paper 2 (Governance, Constitution, Polity, Social Justice and International relations) when discussing data protection and international cooperation.

In prelims, expect factual questions about the policy's year of launch, implementing agencies, and key concepts. In mains, expect analytical questions about the policy's effectiveness, challenges in implementation, and the need for updates. Recent developments, such as the new data protection law and cybersecurity threats, are also important.

Essay topics related to cybersecurity, data privacy, and the digital economy are also possible. Understanding the policy's connection to current events is crucial.

❓

Frequently Asked Questions

6
1. What's the single biggest difference between the Information Technology Act, 2000 and the National Cyber Security Policy that UPSC loves to test?

The IT Act, 2000 is a law that provides a legal framework for electronic transactions and cybercrimes, including penalties. The National Cyber Security Policy, on the other hand, is a policy document that outlines India's strategy for cybersecurity, focusing on creating a secure cyber ecosystem, protecting critical infrastructure, and promoting awareness. Think of the IT Act as the 'cyber law' and the Policy as the 'cyber defense strategy'.

Exam Tip

Remember: Act = Law, Policy = Strategy. MCQs often try to confuse you by attributing legal powers to the Policy that only the Act possesses.

2. Why do students often confuse 'critical information infrastructure (CII) protection' with general cybersecurity awareness, and what's the correct distinction for exam purposes?

CII protection focuses on safeguarding specific systems and networks vital to national security, the economy, and public health (e.g., power grids, banking systems). Cybersecurity awareness aims to educate the general public about cyber threats and how to protect themselves (e.g., phishing scams, weak passwords). CII protection involves specialized security measures and protocols, while cybersecurity awareness relies on public education and behavioral changes. The Policy prioritizes CII because a successful attack there has catastrophic consequences.

On This Page

DefinitionHistorical BackgroundKey PointsVisual InsightsReal-World ExamplesRelated ConceptsUPSC RelevanceSource TopicFAQs

Source Topic

VIT Vice-President Advocates AI as Co-Pilot in Legal ProfessionScience & Technology

Related Concepts

CybersecurityBiotechnologyInformation Technology Act, 2000
  1. Home
  2. /
  3. Concepts
  4. /
  5. Political Concept
  6. /
  7. National Cyber Security Policy
Political Concept

National Cyber Security Policy

What is National Cyber Security Policy?

The National Cyber Security Policy is a framework document outlining India's strategy to protect its cyberspace. It aims to create a secure and resilient digital ecosystem by addressing vulnerabilities, preventing cybercrimes, and promoting cybersecurity awareness. The policy encompasses various aspects, including infrastructure protection, incident response, skill development, and international cooperation. It's not just about technology; it's about safeguarding India's economy, national security, and citizens' data in the digital age. Think of it as a national defense strategy, but for the internet. The policy aims to reduce cyber risk and create a safe cyberspace for economic growth. India's current policy was released in 2013 and is currently being updated.

Historical Background

India's journey towards a formal cybersecurity policy began in the early 2000s, driven by increasing cyber threats and the growing reliance on digital infrastructure. The first significant step was the establishment of the Information Technology Act in 2000a law dealing with cybercrime and electronic transactions. However, as cyber threats became more sophisticated, the need for a comprehensive policy became evident. The first National Cyber Security Policy was formulated in 2013. This policy aimed to create a secure and resilient cyberspace for India. It addressed key areas such as protecting critical infrastructure, promoting cybersecurity awareness, and developing skilled cybersecurity professionals. Currently, the government is working on a new cybersecurity strategy to address emerging challenges like artificial intelligence-based threats and data protection. This new policy is expected to be more dynamic and adaptive to the evolving cyber landscape.

Key Points

12 points
  • 1.

    The policy emphasizes the protection of critical information infrastructure (CII). This includes systems and networks vital to national security, economy, and public health. Think of power grids, banking systems, and transportation networks. The goal is to prevent disruptions that could have severe consequences. For instance, a cyberattack on a power grid could cause widespread blackouts, impacting hospitals, businesses, and homes.

  • 2.

    It promotes the creation of a secure cyber ecosystem through public-private partnerships. The government recognizes that it cannot tackle cybersecurity challenges alone and needs the expertise and resources of the private sector. This collaboration involves sharing threat intelligence, developing security standards, and conducting joint exercises. For example, the government might partner with a cybersecurity firm to protect critical infrastructure.

  • 3.

    The policy focuses on developing skilled cybersecurity professionals through training and education programs. A shortage of skilled professionals is a major challenge in the cybersecurity field. The policy aims to address this by promoting cybersecurity education in schools and universities, as well as providing specialized training programs for professionals. For example, the government might fund cybersecurity courses at IITs and NITs.

Visual Insights

National Cyber Security Policy - Key Objectives

Mind map showing the key objectives of the National Cyber Security Policy.

National Cyber Security Policy

  • ●Protect Critical Infrastructure
  • ●Promote Public-Private Partnerships
  • ●Develop Skilled Professionals
  • ●Enhance Cybersecurity Awareness

Recent Real-World Examples

1 examples

Illustrated in 1 real-world examples from Mar 2026 to Mar 2026

VIT Vice-President Advocates AI as Co-Pilot in Legal Profession

2 Mar 2026

The news about AI in the legal profession underscores the need for a dynamic and adaptive cybersecurity policy. The integration of AI introduces new vulnerabilities and threats that must be addressed proactively. This news highlights the importance of the policy's provisions for research and development in cybersecurity technologies, as well as its focus on addressing emerging technologies. The news also challenges the policy to evolve and adapt to the changing landscape of cyber threats. For example, the policy may need to address the ethical implications of using AI in cybersecurity, as well as the potential for AI to be used for malicious purposes. Understanding the National Cyber Security Policy is crucial for analyzing the implications of AI in the legal profession and developing effective strategies for mitigating cyber risks. It is important to remember that technology is a double-edged sword and must be used responsibly.

Related Concepts

CybersecurityBiotechnologyInformation Technology Act, 2000

Source Topic

VIT Vice-President Advocates AI as Co-Pilot in Legal Profession

Science & Technology

UPSC Relevance

The National Cyber Security Policy is highly relevant for the UPSC exam, particularly for GS Paper 3 (Economy, Science and Technology, Environment, and Security). Questions can be asked about the policy's objectives, key provisions, and impact on national security and the economy. It's also relevant for GS Paper 2 (Governance, Constitution, Polity, Social Justice and International relations) when discussing data protection and international cooperation.

In prelims, expect factual questions about the policy's year of launch, implementing agencies, and key concepts. In mains, expect analytical questions about the policy's effectiveness, challenges in implementation, and the need for updates. Recent developments, such as the new data protection law and cybersecurity threats, are also important.

Essay topics related to cybersecurity, data privacy, and the digital economy are also possible. Understanding the policy's connection to current events is crucial.

❓

Frequently Asked Questions

6
1. What's the single biggest difference between the Information Technology Act, 2000 and the National Cyber Security Policy that UPSC loves to test?

The IT Act, 2000 is a law that provides a legal framework for electronic transactions and cybercrimes, including penalties. The National Cyber Security Policy, on the other hand, is a policy document that outlines India's strategy for cybersecurity, focusing on creating a secure cyber ecosystem, protecting critical infrastructure, and promoting awareness. Think of the IT Act as the 'cyber law' and the Policy as the 'cyber defense strategy'.

Exam Tip

Remember: Act = Law, Policy = Strategy. MCQs often try to confuse you by attributing legal powers to the Policy that only the Act possesses.

2. Why do students often confuse 'critical information infrastructure (CII) protection' with general cybersecurity awareness, and what's the correct distinction for exam purposes?

CII protection focuses on safeguarding specific systems and networks vital to national security, the economy, and public health (e.g., power grids, banking systems). Cybersecurity awareness aims to educate the general public about cyber threats and how to protect themselves (e.g., phishing scams, weak passwords). CII protection involves specialized security measures and protocols, while cybersecurity awareness relies on public education and behavioral changes. The Policy prioritizes CII because a successful attack there has catastrophic consequences.

On This Page

DefinitionHistorical BackgroundKey PointsVisual InsightsReal-World ExamplesRelated ConceptsUPSC RelevanceSource TopicFAQs

Source Topic

VIT Vice-President Advocates AI as Co-Pilot in Legal ProfessionScience & Technology

Related Concepts

CybersecurityBiotechnologyInformation Technology Act, 2000
  • 4.

    It mandates incident response mechanisms to effectively handle cyberattacks. This includes establishing incident response teams, developing protocols for reporting and investigating incidents, and coordinating with international agencies. For example, CERT-In Indian Computer Emergency Response Team is the national agency for responding to cyber incidents.

  • 5.

    The policy aims to enhance cybersecurity awareness among citizens and organizations. Many cyberattacks succeed because of human error, such as clicking on phishing links or using weak passwords. The policy promotes cybersecurity awareness campaigns to educate people about these risks and how to protect themselves. For example, the government might run public service announcements on television and social media.

  • 6.

    It encourages research and development in cybersecurity technologies. This includes funding research projects, promoting innovation, and supporting the development of indigenous cybersecurity solutions. For example, the government might provide grants to startups working on new cybersecurity technologies.

  • 7.

    The policy promotes international cooperation on cybersecurity issues. Cyber threats are often transnational, requiring collaboration with other countries to address them effectively. This includes sharing threat intelligence, participating in joint exercises, and developing international norms and standards. For example, India might work with the US and other countries to combat cybercrime.

  • 8.

    It emphasizes the importance of data protection and privacy. The policy recognizes that data is a valuable asset and must be protected from unauthorized access and misuse. This includes implementing data protection laws, promoting data encryption, and ensuring that organizations are accountable for protecting the data they collect. For example, the Digital Personal Data Protection Act, 2023 aims to protect the privacy of Indian citizens.

  • 9.

    The policy addresses cyber warfare and national security threats. This includes developing capabilities to defend against cyberattacks, deterring potential adversaries, and responding to cyber warfare incidents. For example, India might develop offensive cyber capabilities to deter potential attackers.

  • 10.

    It establishes a framework for regulating cybersecurity practices. This includes setting standards for cybersecurity products and services, conducting audits and inspections, and enforcing compliance with cybersecurity regulations. For example, the government might require critical infrastructure providers to implement specific security measures.

  • 11.

    The policy promotes the use of open standards and interoperable technologies. This ensures that cybersecurity solutions from different vendors can work together seamlessly. For example, the policy might encourage the use of open-source cybersecurity tools.

  • 12.

    It includes provisions for addressing emerging technologies such as artificial intelligence (AI) and the Internet of Things (IoT). These technologies present new cybersecurity challenges that must be addressed proactively. For example, the policy might require IoT devices to have built-in security features.

  • Exam Tip

    MCQs often present scenarios where a general cyberattack is described, but the correct answer is related to CII if the target is a critical infrastructure asset.

    3. The 2013 National Cyber Security Policy aimed to create 5 lakh cybersecurity professionals. Did it succeed, and what are the current challenges in cybersecurity skill development?

    While the 2013 policy set an ambitious goal, India still faces a significant shortage of skilled cybersecurity professionals. The target was not fully met. Current challenges include: answerPoints: * Rapidly evolving threat landscape: New cyber threats emerge constantly, requiring continuous upskilling and training. * Lack of qualified trainers and educators: There's a shortage of experienced cybersecurity professionals to train the next generation. * Limited awareness and interest: Many students and professionals are not aware of the opportunities in the cybersecurity field. * Brain Drain: Skilled professionals often seek opportunities abroad.

    Exam Tip

    UPSC might ask about the reasons for the cybersecurity skills gap in India. Remember the points about evolving threats and lack of trainers.

    4. How does the National Cyber Security Policy work in practice? Give a real example of it being invoked or applied.

    While it's difficult to point to one specific instance of the *entire* policy being invoked, its principles are applied regularly. For example, after a series of cyberattacks targeting Indian power grids in 2020 and 2021 (attributed to a foreign actor), CERT-In, acting under the policy's framework for incident response, issued advisories, coordinated with power companies to implement enhanced security measures, and shared threat intelligence with international partners. This coordinated response, aimed at protecting critical infrastructure, exemplifies the policy's practical application.

    5. What are the strongest arguments critics make against the National Cyber Security Policy, and how would you respond to them?

    Critics often argue that the National Cyber Security Policy (2013) is outdated and lacks teeth. They point to the rapidly evolving threat landscape and the emergence of new technologies (like AI) that the policy doesn't adequately address. Some argue it's too broad and lacks specific, measurable goals. I would respond by acknowledging these limitations but emphasizing that the policy provides a foundational framework. The upcoming new National Cyber Security Strategy aims to address these gaps by incorporating emerging technologies, setting clear objectives, and strengthening enforcement mechanisms. Furthermore, the Digital Personal Data Protection Act, 2023 complements the policy by providing a legal framework for data protection.

    6. In an MCQ, what is the most common trap examiners set regarding the scope of the Digital Personal Data Protection Act, 2023, in relation to the National Cyber Security Policy?

    The most common trap is to suggest that the Digital Personal Data Protection Act (DPDP Act) *replaces* the National Cyber Security Policy. The DPDP Act specifically addresses data privacy and protection, setting rules for how personal data is collected, processed, and stored. The National Cyber Security Policy is broader, encompassing all aspects of cybersecurity, including infrastructure protection, incident response, and international cooperation. The DPDP Act *complements* the Policy by providing a legal framework for one specific aspect of cybersecurity: data protection.

    Exam Tip

    Look for keywords like 'replaces' or 'supersedes' in the MCQ options. If the option suggests the DPDP Act completely replaces the Policy, it's likely incorrect.

  • 4.

    It mandates incident response mechanisms to effectively handle cyberattacks. This includes establishing incident response teams, developing protocols for reporting and investigating incidents, and coordinating with international agencies. For example, CERT-In Indian Computer Emergency Response Team is the national agency for responding to cyber incidents.

  • 5.

    The policy aims to enhance cybersecurity awareness among citizens and organizations. Many cyberattacks succeed because of human error, such as clicking on phishing links or using weak passwords. The policy promotes cybersecurity awareness campaigns to educate people about these risks and how to protect themselves. For example, the government might run public service announcements on television and social media.

  • 6.

    It encourages research and development in cybersecurity technologies. This includes funding research projects, promoting innovation, and supporting the development of indigenous cybersecurity solutions. For example, the government might provide grants to startups working on new cybersecurity technologies.

  • 7.

    The policy promotes international cooperation on cybersecurity issues. Cyber threats are often transnational, requiring collaboration with other countries to address them effectively. This includes sharing threat intelligence, participating in joint exercises, and developing international norms and standards. For example, India might work with the US and other countries to combat cybercrime.

  • 8.

    It emphasizes the importance of data protection and privacy. The policy recognizes that data is a valuable asset and must be protected from unauthorized access and misuse. This includes implementing data protection laws, promoting data encryption, and ensuring that organizations are accountable for protecting the data they collect. For example, the Digital Personal Data Protection Act, 2023 aims to protect the privacy of Indian citizens.

  • 9.

    The policy addresses cyber warfare and national security threats. This includes developing capabilities to defend against cyberattacks, deterring potential adversaries, and responding to cyber warfare incidents. For example, India might develop offensive cyber capabilities to deter potential attackers.

  • 10.

    It establishes a framework for regulating cybersecurity practices. This includes setting standards for cybersecurity products and services, conducting audits and inspections, and enforcing compliance with cybersecurity regulations. For example, the government might require critical infrastructure providers to implement specific security measures.

  • 11.

    The policy promotes the use of open standards and interoperable technologies. This ensures that cybersecurity solutions from different vendors can work together seamlessly. For example, the policy might encourage the use of open-source cybersecurity tools.

  • 12.

    It includes provisions for addressing emerging technologies such as artificial intelligence (AI) and the Internet of Things (IoT). These technologies present new cybersecurity challenges that must be addressed proactively. For example, the policy might require IoT devices to have built-in security features.

  • Exam Tip

    MCQs often present scenarios where a general cyberattack is described, but the correct answer is related to CII if the target is a critical infrastructure asset.

    3. The 2013 National Cyber Security Policy aimed to create 5 lakh cybersecurity professionals. Did it succeed, and what are the current challenges in cybersecurity skill development?

    While the 2013 policy set an ambitious goal, India still faces a significant shortage of skilled cybersecurity professionals. The target was not fully met. Current challenges include: answerPoints: * Rapidly evolving threat landscape: New cyber threats emerge constantly, requiring continuous upskilling and training. * Lack of qualified trainers and educators: There's a shortage of experienced cybersecurity professionals to train the next generation. * Limited awareness and interest: Many students and professionals are not aware of the opportunities in the cybersecurity field. * Brain Drain: Skilled professionals often seek opportunities abroad.

    Exam Tip

    UPSC might ask about the reasons for the cybersecurity skills gap in India. Remember the points about evolving threats and lack of trainers.

    4. How does the National Cyber Security Policy work in practice? Give a real example of it being invoked or applied.

    While it's difficult to point to one specific instance of the *entire* policy being invoked, its principles are applied regularly. For example, after a series of cyberattacks targeting Indian power grids in 2020 and 2021 (attributed to a foreign actor), CERT-In, acting under the policy's framework for incident response, issued advisories, coordinated with power companies to implement enhanced security measures, and shared threat intelligence with international partners. This coordinated response, aimed at protecting critical infrastructure, exemplifies the policy's practical application.

    5. What are the strongest arguments critics make against the National Cyber Security Policy, and how would you respond to them?

    Critics often argue that the National Cyber Security Policy (2013) is outdated and lacks teeth. They point to the rapidly evolving threat landscape and the emergence of new technologies (like AI) that the policy doesn't adequately address. Some argue it's too broad and lacks specific, measurable goals. I would respond by acknowledging these limitations but emphasizing that the policy provides a foundational framework. The upcoming new National Cyber Security Strategy aims to address these gaps by incorporating emerging technologies, setting clear objectives, and strengthening enforcement mechanisms. Furthermore, the Digital Personal Data Protection Act, 2023 complements the policy by providing a legal framework for data protection.

    6. In an MCQ, what is the most common trap examiners set regarding the scope of the Digital Personal Data Protection Act, 2023, in relation to the National Cyber Security Policy?

    The most common trap is to suggest that the Digital Personal Data Protection Act (DPDP Act) *replaces* the National Cyber Security Policy. The DPDP Act specifically addresses data privacy and protection, setting rules for how personal data is collected, processed, and stored. The National Cyber Security Policy is broader, encompassing all aspects of cybersecurity, including infrastructure protection, incident response, and international cooperation. The DPDP Act *complements* the Policy by providing a legal framework for one specific aspect of cybersecurity: data protection.

    Exam Tip

    Look for keywords like 'replaces' or 'supersedes' in the MCQ options. If the option suggests the DPDP Act completely replaces the Policy, it's likely incorrect.