NSH eMag on Cyber Security

Page 1

Smart Labtech Pvt Ltd # 75B,Sy# 735, SV Co - Op. Industrial Estate, Phase-II, Balanagar, Hyderabad - 500037, TS, INDIA Phone: +91 40 23774310, 23774311, Fax +91 40 23774309 e-mail: info@smartlabtech.net | Url: www.smartlabtech.net Authorised marketers:

On the one hand, technological happening is advantageous, but it further has certain negative results The web world, sometimes known as cyberspace, is a vast community of millions and billions of individuals and websites Human beings use it for numerous purposes, such as shopping, films, tune, video games, transactions, and e-trade, among others Furthermore, due to the increased speed of the internet, the pace of data circulation has grown several fold.

Crime is a term used to describe wrong doing or offence, however, when it comes to cybercrime, it may be described as a crime committed over the internet that causes an unbearable loss to an individual, organisation or management.

We live in a technologically advanced period and all information is now fed into computers. Cybercrime is an unlawful action ranging from theft to using your system or IP address as a tool for executing a crime. The impact of cybercrimes on financial and investment activities in digital businesses is extensive.

According to a Check Point analysis, India sees a sharp increase in cyberattacks (an 18% increase in weekly cyberattacks on average) during the first quarter of 2023 compared to the same period in 2022 Cybercriminals are misusing advanced technologies like ChatGPT to generate malicious code that can be used to quickly launch cyberattacks

Criminals frequently utilise enticing websites and phoney emails that beg for personal information from internet users while posing as representatives of banks or other organisations It facilitates crooks' access to a victim's bank account and personal information People have fallen victim to cybercrime because of viruses, mail fraud, account hacking and software piracy Additionally, they experience issues with video transmission, pornographic email threats and unauthorised access mailing. As a result of all of these difficulties, cybersecurity has emerged as a serious worry for society.

Cybercrime is not something we cannot handle on our own. Similarly, we can prevent Cyber Crimes from occurring with a little common sense and reasoning.

To summarise, cybercrime is a harmful violation of someone's privacy or any content To protect the safety of oneself and the organisation, basic online regulations must be followed. Above all, cybercrime violates not just the law but also human rights.

Publisher’s Desk

Neo Science Hub

Vol:1 I Issue: 11 I August 2023

Owned, Printed, Published and

Edited by:

Venkata Satya Prasad Potharaju

Executive Editor

Dr Subramanian S Iyer

Sub-Editor/ Repor ter

Rashmi Kumari

Associate Editor

Raja Aditya

Design

Kar thik Beesu

Web Developer

Srinivas Kalyan M

Videography

MUV Ramesh Kumar & T Naresh

Video Editing

P Balakrishna

Printed at:

M/s Creative Offset Printers, 16-11-22/15, Krishna Tulasi

Nagar, Moosarambagh, Hyderabad, Telangana, India - 500036

Published From:

H No: 1-1-376-185, SRT 61,

Jawahar Nagar, Gandhi Nagar, RTC X Roads, Hyderabad, Telangana, India - 500020

For Feedback Contact us neosciencehub@gmail.com

The internet, computers, and software programmes have permeated every aspect of our modern lives and we now find ourselves submerged in a digital world

The stereotype of thieves in masks carrying out midnight burglaries has dwindled in the world of Information Technology. Instead, a noticeable transformation has occurred, characterised by inventive talents and technological competence. These people are among us: they are smart, self-taught whiz kid or rogue programmer skilled at modifying computer hardware or software, most of them agile members of Generation Z Let's get to know these brazen thieves that cleverly use their laptops to steal significant amounts of money This sinister threat hangs menacingly before us and becomes incredibly difficult to stop since it makes every single one of us an equally vulnerable target.

An 18-year-old hacker allegedly stole data from the ride share application Uber In a highly publicized data breach incident, Uber announced that the hacker is responsible for stealing data leading the company to take several of its internal communications and engineering systems offline as it investigated the extent of the hack. The intrusion seems to have affected several of Uber's internal systems. Security professionals are working hard to stay up as more and more complex attacks are discovered.

In this terrain, new kinds of white-collar crimes are constantly developing, which is always made possible by internet disciplines. As a result, be apprehensive of the potent force known as cybercrime, a field in which thefts may be accomplished snappily and simply by manipulating a computer interface. Fraudsters have become greedier and younger due to the ease of access to technology, resulting in a rise in cybercrimes.

According to Gartner, cybersecurity spending will reach $188 7 billion in 2023 and exceed $260 billion worldwide by 2026. In response to the increasing cyber threat, governments all around the globe have released guidelines to help businesses implement appropriate cyber-security measures.

In light of such vulnerabilities, earlier last month, the Parliamentary Standing Commit tee on Finance summoned senior officials of Google, Apple, Flipkart, Paytm, Yes Bank and others along with Indian Computer Emergency Response Team (CERT-In) to examine 'Cybersecurity and rising incidence of cyber/white collar crimes'. For presenting a threat to the country's economic stability, 38 apps involved in betting, gambling and money laundering and 94 apps involved in illegal lending services, were stopped.

In this issue, we try our best to understand the threats of these cybercrimes and ways to mitigate them.

Editor’s Desk 4 August 2023

INDIA'S CYBERSECURITY BATTLE

True Genius

41

snakes rarely become aggresive 6 August 2023 5

Cyber fraud: The Rising Threat and Steps to Repor t Complaints 10 Don't let phones take your life 14 Battle against Financial Cybercrimes 16 Privacy Concerns Surrounding Instagram Threads & X 19 Nationwide Upsurge in conjunctivitis cases 22 Chandrayaan-3: A New Chapter in India’s Space Odyssey 24 Beginner ’s Guide to Understanding NIR Spectroscopy 26 Why Is Big Pharma Putting Money into Blockchain? 30 38 Contents
The wave of digital innovation, they are also facing an equally formidable challenge an escalating cyber threat landscape Cybersecurity breaches have emerged as a dark cloud, looming over India's digital progress Srinivasa Ramanujan

India's Cybersecurity Battle Fortifying the Digital Frontier

In the fast-paced era of rapid digitization, India stands at the precipice of a transformative technological revolution However, while companies and organizations ride the wave of digital innovation, they are also facing an equally

formidable challenge an escalating cyber threat landscape Cybersecurity breaches have emerged as a dark cloud, looming over India's digital progress The recent cyberattack on Sun Pharmaceuticals serves as a stark reminder of the perils that await even the biggest players in the

industry. As India ranks third globally and first in the Asia-Pacific region in cyber scam incidents, it is clear that the nation faces a daunting cybersecurity battle that affects businesses, government organizations and individuals across all sectors.

NSH COVER STORY 6 August 2023

An Alarming Reality: Cyber-attacks on the Rise

The alarming rise in cyber-attacks is evident from the staggering statistics. Research by Group-IB, a Singapore-based cybersecurity firm, reveals that India ranks third globally among 111 countries affected by info-stealing malware distributed by scam groups. Palo Alto Networks, another cybersecurity firm, identifies India as the second-most targeted country in the Asia Pacific and Japan region,

with Australia following closely behind Check Point Research reports an average of 1,866 attacks per week on an organization in India during 2022, with the healthcare sector facing the brunt of these attacks. Cybercriminals have evolved into sophisticated threat actors, perpetrating ransomware attacks that can bring even giants like Sun Pharmaceuticals to their knees. Ransomware attacks involve encrypting a company's data and holding it hostage until a ransom is paid to the attackers. For Sun Pharmaceuticals, the impact was severe, with a ransomware group claiming responsibility for the incident The company had to employ containment and eradication protocols to mitigate the threat and safeguard its systems and data

Why is India Vulnerable: The Cybersecurity Conundrum

One critical aspect contributing to India's vulnerability is the absence of a robust cybersecurity system. Businesses and government organizations often spend inadequately on cybersecurity or neglect to gauge the potential damage that cyber warfare can cause The evolving geopolitical landscape has led to politically-driven attacks targeting military secrets, infrastructure and propagating disinformation campaigns, further exacerbating the threat. Resistance to adopting newer technologies poses another challenge Legacy technology's limitations fail to match the sophistication of modern cyberattacks, leaving organizations ill-equipped to defend against them. Harshil Doshi, Director of Sales (India and SAARC) at Securonix, urges organizations to upgrade their defence and offence systems to protect themselves effectively A lack of sufficient investment in cybersecurity around users and data also leaves organizations susceptible to breaches.

The Legal Frame work: The Need for Cybersecurity Laws

India currently lacks a dedicated law on cybersecurity and the existing Information Technology Act of 2000 falls short in dealing with the complexities of cyberspace. Emerging technologies like AI, cryptocurrency, IoT and others pose jurisdictional challenges that require appropriate regulations The Proposed Digital India Act (DIA), 2023, aims to address this issue by highlighting the need for global standard cyber laws, including data protection, cybercrime rules and data governance policy The DIA also emphasizes the Safe Harbour Principle for Intermediaries, a critical

NSH COVER STORY August 2023 7
Legacy technology's limitations fail to match the sophistication of modern cyberattacks, leaving organizations ill-equipped to defend against them.

aspect that requires further clarity

Bridging the Skill Gap: Cybersecurity Best Practices

As technology adoption accelerates, the frequency and severity of cyberattacks are bound to grow. Companies must prioritize staying updated about recent cyberattacks and the tools employed by attackers. Threat intelligence is crucial, but a lack of human resources often hinders its effective utilization Password hygiene remains a significant area of concern and using the same passwords for multiple logins is a common vulnerability

Implementing a zero-trust initiative can be a strategic approach to cybersecurity, continuously validating digital interactions and eliminating implicit trust Organizations must remain vigilant in monitoring users and data to predict

and contain breaches before they escalate Awareness campaigns should go beyond phishing emails, as attackers personalize and craft their attacks to bypass defences Choosing proactivity over reactivity is imperative in safeguarding digital assets

India's Progress in Cybersecurity

While cybersecurity challenges persist, India is making progress in its efforts to combat cyber threats. The increasing awareness of cyberattacks and data breaches holds companies accountable and encourages them to invest more in security The Proposed Digital India Act represents a step towards comprehensive cybersecurity laws, but continued research, development and collaboration are crucial in strengthening India's cybersecurity framework

As the nation strives for digital transformation, bolstering cybersecurity measures is not just a necessity but an absolute imperative The battle for India's digital future is being waged on multiple fronts and unity among businesses, government authorities and cybersecurity companies is vital. By embracing cutting-edge technologies, prioritizing cybersecurity and fostering a culture of vigilance and preparedness, India can secure its digital realm and emerge as a global leader in cybersecurity The future beckons and it is up to us to protect it.

India's Digital Boom: The Cybersecurity Wake-up Call

India's rapid digital transformation has catapulted it into the global spotlight as a digital powerhouse. With this digital revolution, however, comes a pressing need for robust cybersecurity measures to safeguard critical information infrastructure In the midst of this digital boom, the country faces an unprecedented demand for cybersecurity professionals. Cybersecurity jobs in India have reached staggering numbers, with over 40,000 openings in May 2023. But a troubling revelation surfacesalmost 30% of these vacancies remain unfilled due to a severe skill shortage. As we delve into India's cybersecurity landscape, we unravel the challenges, opportunities, and critical quest to bridge the skill gap for a secure digital future

The Soaring Demand

India's exponential digital growth across sectors fuels the soaring demand for cybersecurity professionals From data privacy to cloud security, AI security and network security, businesses are clamouring for skilled experts to shield their digital assets. Notably, soft skills like problem-solving, communication, teamwork and collaboration are highly sought after to complement technical expertise. Roles such as IT auditors, Information Security analysts, Network/IT Security Engineers, Security Testing/Penetration Testers and Computer Forensics analysts top the charts in the cybersecurity job market.

NSH COVER STORY 8 August 2023

Unveiling the Skill Gap

The cybersecurity skill gap in 2023 stems from multiple factors One significant aspect is the prevailing misperception that only those with a technical IT background can pursue a cybersecurity career This notion discourages non-traditional candidates from considering cybersecurity roles, exacerbating the skill gap. However, the technical skills required can often be acquired on the job through proper training and apprenticeships, creating opportunities for individuals from diverse backgrounds

Institutional Collaboration

To bridge the skill gap, an institutional collaboration between the private sector, managing most IT infrastructures and the government, shaping education, public service systems, is essential. Local-level initiatives must raise awareness and dispel misconceptions about cybersecurity careers, attracting a broader pool of talent. Clear and specific job descriptions can attract potential candidates and prevent ambiguity in recruitment

The Importance of Diversity

As India strives to increase cybersecurity jobs, fostering diversity becomes crucial. At present, women

constitute only 24% of cybersecurity professionals, revealing the need for gender representation Scholarships and initiatives for women and underrepresented groups can promote cultural diversity and narrow the gender gap

Retaining Talent

Efforts to bridge the skill gap must be complemented by robust retention strategies Research indicates that cybersecurity professionals face high levels of stress and overwork, leading to high attrition rates. Flexible work arrangements, employee well-being solutions, and competitive incentives can ensure the retention of skilled professionals.

The Untapped Opportunity

While challenges abound, the cybersecurity skill gap presents an untapped opportunity The abundance of job openings in the field paves the way for creating long-term careers, even for those outside the formal education system or with nontechnical backgrounds The World Economic Forum's multistakeholder initiative aims to raise awareness about the cybersecurity skills deficit and its implications, shaping strategic approaches to build sustainable cyber talent pipelines

Future Direction

Addressing the skill gap requires both short-term and long-term strategic planning. Raising awareness, providing training and recruiting from diverse pools can address immediate demand. Integrating cybersecurity education into mainstream curricula, fostering industry-academia collaboration and creating clear career paths are pivotal for nurturing a skilled cybersecurity workforce.

As India navigates the digital landscape, the quest to bridge the cybersecurity skill gap takes centre stage By harnessing untapped potential, promoting diversity and adopting retention strategies, India can establish itself as a global leader in cybersecurity With a secure and skilled workforce, the country can unlock the door to a safe digital future, reinforcing its position as a digital powerhouse on the global stage. As the nation embraces its cybersecurity mission, it embarks on a transformative journey towards a secure and resilient digital future.

NSH COVER STORY August 2023 9
- Rashmi Kumari
Cybersecurity jobs in India have reached staggering numbers, with over 40,000 openings in May 2023. 30% of these vacancies remain unfilled due to a severe skill shortage. As we delve into India's cybersecurity landscape, we unravel the challenges and opportunities.

CYBER FRAUD The Rising Threat and Steps to Report Complaints

In recent years, c fraud has become growing concern with the number of incidents increasing steadily. According to the National Crime Records Bureau (NCRB), there were 52,974 registered cases of cyber crimes in 2021 alone, marking a nearly 6 per cent increase from the previous year. However, these figures are only based on reported cases, indicating that th actual number of c ybercri incidents is likely much h when considering under-re cases.

Reasons for Under-

O ne of the primary reasons for under-reporting c yber crimes is that people often hesitate to file a complaint for minimal financial losses, considering it a hassle Additionally, many individuals lack awareness about different types of c ybercrimes and the proper mechanisms for reporting them.

Understanding Cyber Fraud

Cyber fraud, also known as online fraud or internet fraud, involves the use of the internet to steal money or personal information. Fraudsters employ various methods, such as contacting

viduals through SMS, calls, mails, or using malicious nks to gain access to sensitive data stored on computers, mobile devices, or networks. This information can include bank account numbers, credit card details, social security numbers, and personal information.

Common Types of Cyber Fraud

As technology advances, ber scammers continually ise new ways to target iduals and their finances. re five common types of

d:

cams: Scammers send text messages, or make phone calls, posing as legitimate organizations to trick individuals into revealing sensitive information like usernames, passwords and OTPs

Identity Theft: In identity theft, scammers obtain someone's personal information, such as name, address, and social security number and use it for fraudulent activities like opening accounts or applying for loans

Malware: Scammers distribute malicious links and apps designed to damage or gain unauthorized access to computer systems, allowing them to extract sensitive information for financial gain

NSH INFORMATION HUB 10 August 2023
A c c o r d i n g t o t h e N a t i o n a l C r i m e Records Bureau (NCRB), there were 5 2 , 9 7 4 r e g i s t e r e d c a s e s o f c y b e r c r i m e s i n 2 0 2 1 a l o n e , m a r k i n g a nearly 6 per cent increase from the previous year.

Common forms of malware include viruses, worms, Trojan horses, and ransomware

Job Scams: Scammers target individuals by offering fake job opportunities online, intending to deceive them and steal their money.

O nline Shopping Scams: Cybercriminals establish fake e-commerce websites or advertise counterfeit products on legitimate platforms, tricking unsuspecting users into making purchases They may also steal credit card details for further financial exploitation

National Cyber Crime Reporting Portal

The Indian government has introduced the National Cyber Crime Reporting portal, which serves as an online platform for victims/complainants to report cybercrime complaints, including c yber fraud. The portal emphasizes addressing cyber crimes against women and children.

Steps to Report Cyber Fraud

To re port c ybe r fraud, you can follo w these steps:

u O pen your web browser and visit the National Cyber Crime Reporting portal at https://cybercrime.gov.in.

u O n the homepage, click on 'File a complaint.'

u Read and accept the terms and conditions on the following page.

u Click on the 'Report other cybercrime' button

u Choose the 'citizen login' option and provide the necessary details, such as name, email, and phone number

u Enter the OTP sent to your registered phone number and fill in the captcha. Then, click on the submit button

u On the next page, fill in the details of the cybercrime you want to report using the provided form.

u The form is divided into four parts: General Information, Victim Information, Cybercrime Information, and Preview Fill in the relevant details in each section and review the information on the preview page

u If you have any information about the alleged suspect, provide the details on the following page

u Verify the information provided and click on the 'Submit' button.

u You will receive a confirmation message stating that your complaint has been registered Additionally, an email will be sent to you with the complaint ID and other relevant details

Required Documents

When filing a report for cyber fraud related to online transactions, lottery scams, ATM transactions, fake calls, or Internet banking, you must at tach proof of the alleged fraudulent transactions. Supporting evidence, such as bank statements, proof of address, identification documents, and any suspicious messages or emails received, should also be included.

Conclusion

u After verifying the information, click on the 'Submit' button.

u You will be directed to an incident details page where you can provide supporting evidence, such as screenshots or files. O nce completed, click on 'Save and Next '

Cyber fraud poses a significant threat in today's digital age To combat this rising menace, it is crucial to raise awareness about the various types of cyber crimes and provide accessible channels for reporting incidents The National Cyber Crime Reporting portal in India is a valuable resource that allows individuals to report c yber fraud and seek justice. By actively reporting such crimes, we can collectively work towards a safer online environment. - NSH

NSH INFORMATION HUB August 2023 11
It is crucial to raise awareness about the various types of cyber crimes and provide accessible channels for reporting incidents. The National Cyber Crime Reporting portal in India is a valuable resource that allows individuals to report cyber fraud and seek justice.

EVOLVING THREATSCAPE Navigating the Changing Landscape of Cybersecurity

F

ew instances of well-known cybercrimes from the past:

Large-scale D ata Breach - Equifax (2017): In 2017, Equifax, one of the major credit reporting agencies in the United States, suffered a massive data breach. Hackers gained unauthorized access to the personal information of approximately 147 million Americans, including names, Social Security numbers, birth dates, addresses and in some cases driver's license numbers The breach was a severe blow to consumer trust and raised concerns about data security.

Olympic D estroyer (2018): The Olympic Destroyer cyberattack occurred during the opening ceremony of the 2018 Winter Olympics in Pyeongchang, South Korea The attack disrupted the event's IT infrastructure, including Wi-Fi networks, the official website and ticketing systems. It was a sophisticated attack designed to create chaos and confusion, and it initially appeared to be the work of state-sponsored actors.

Ransomware Attack - WannaCry (2017): The WannaCry ransomware attack targeted computers running Microsoft Windows in May 2017. It spread rapidly across the globe, affecting hundreds of thousands of computers in more than 150 countries, including India Several Indian institutions, including some banks, were impacted by the attack The ransomware encrypted users' data and demanded a ransom in Bitcoin to unlock the files It notably affected various organizations, including the UK's National Health Service (NHS), causing disruptions to healthcare services.

NotPetya (2017): NotPetya was a destructive malware that initially appeared

12 August 2023
NSH INFORMATION HUB

to be a variant of the Petya ransomware. It spread rapidly across networks and targeted organizations primarily in Ukraine but also impacted many international companies NotPetya caused significant financial losses by disrupting critical systems and destroying data. The attack was attributed to Russia, but its precise purpose remains unclear

D istributed D enial of Service (DD oS)

Attack - D yn Attack (2016): In October 2016, a massive DDoS attack targeted Dyn, a major DNS provider. The attack disrupted access to popular websites and services like Twitter, Reddit, Spotify and GitHub among others Cybercriminals used a botnet composed of insecure Internet of Things (IoT ) devices to flood Dyn's servers with traffic, leading to widespread outages

Financial Cybercrime - Carbanak (2013-2016): The Carbanak cybercriminal group targeted banks worldwide from 2013 to 2016 Using sophisticated malware and social engineering techniques, they stole hundreds of millions of dollars from banks in various countries, including the United States, Russia, and several European nations.

Cyber Espionage - Stuxnet (2010): Stuxnet was a highly sophisticated worm that targeted Iran's nuclear program. It specifically aimed to sabotage centrifuges used for uranium enrichment. It is widely believed to have been a joint cyber operation by the United States and Israel.

O peration Aurora (2009): Operation

Aurora was a series of coordinated cyberattacks targeting several major technology companies, including Google, Adobe and Juniper Networks The attackers exploited vulnerabilities in Internet Explorer to gain unauthorized access to corporate networks. The motive behind the attacks was believed to be intellectual property theft and espionage, with China being suspected as the originator.

Identity Theft - TJX Companies (2007):

In 2007, TJX Companies, the parent company of retailers like T.J. Maxx and Marshalls, suffered a massive data breach Hackers stole data from over 94 million

credit and debit card accounts over a period of several years, making it one of the largest retail data breaches in history.

Few major cybercrime occurrences in India

The Cyber Underworld: Exploring the Shadows of D igital Crime

Social Media Hacking - Twitter

Account Hacks (2020): Several highprofile Twitter accounts in India, including those of politicians and celebrities, were hacked in 2020 The attackers used the compromised accounts to spread misinformation and promote cryptocurrency scams.

Instances of social media account hacking and cyberbullying are common in India Hackers gain access to individuals' social media accounts and use them for spreading false information, defamatory content, or engaging in harassment These incidents can cause reputational damage and emotional distress to the victims.

Cyber Espionage - Chinese Hacking Group (2019): In 2019, a Chinese statesponsored hacking group was reported to have targeted Indian government agencies and organizations The group, known as APT41, engaged in cyber espionage and data theft, posing a threat to national security and sensitive information

Large-scale D ata Breach - Aadhaar

D ata Leak (2018): Aadhaar is India's biometric-based national identification system. In 2018, it was reported that the personal data of millions of Aadhaar users was available for purchase on the dark web The leaked data included names, Aadhaar numbers, and other personal information, raising concerns about privacy and data security.

Cosmos Bank Cyber Heist (2018): Cosmos Bank, one of the largest cooperative banks in India, fell victim to a cyber-attack in 2018. Hackers used malware to compromise the bank's systems and executed fraudulent transactions totalling over $13 5 million The attack highlighted vulnerabilities in

the banking sector's cybersecurity infrastructure

Identity Theft - Facebook D ata Leak (2018): In 2018, it was revealed that the personal data of millions of Facebook users, including those in India, had been harvested by a third-party firm without proper consent The data was then misused for various purposes, including targeted advertising and influencing political campaigns.

D ata Theft - Zomato D ata Breach (2017): Zomato, a popular food delivery app in India, experienced a data breach in 2017 where the personal information of millions of users was stolen. The breach highlighted the importance of strong data protection measures for online platforms.

Financial Cybercrime - D ebit Card

D ata Breach (2016): In 2016, it was reported that a large number of debit cards issued by various Indian banks were compromised Cybercriminals stole card data and carried out unauthorized transactions, leading to financial losses for the affected bank customers.

O nline Banking Fraud - Paytm

Phishing Attacks: Paytm, India's leading digital payment platform, has been a target of phishing attacks where cybercriminals attempt to steal users' login credentials and financial information through fake websites or messages Such incidents have led to financial losses for some users.

O ngoing Phishing Attacks: Phishing attacks, where attackers trick individuals into revealing sensitive information such as login credentials or financial details, are prevalent in India Various phishing campaigns have targeted Indian users, including fake emails and websites impersonating banks, government agencies, and popular e-commerce platforms.

It is essential for individuals, organizations, and the government to remain vigilant, implement robust security measures, and promote cybersecurity awareness to mitigate these risks

August 2023 13
NSH INFORMATION HUB

DON'T LET PHONES TAKE YOURLIFE

Anil Rachamalla

With an average internet session lasting 6 hours and 26 minutes. Out of 1.10 billion internet users in India, 96.7% watch online videos, 82% watch live streaming, 52% listen to FM radio stations and 50% listen to podcasts. It’s important to note that 86% of the consumption happens on smartphones. Don’t let smartphones interrupt you.

Our life is very much influenced by smartphones with the huge functionality, use and accessibility of smartphones which are just few clicks away Smartphones are now so frightening that even recently psychologists, psychiatrists and civil societies are advising to stay away from

NSH CYBER GYAN 14 August 2023

them to avoid addiction to smartphones.

With the unprecedented access to various social media platforms like Facebook, Twitter, Google and Instagram for information globally, we are giving a buffet lunch for hackers and stalkers by making ourselves vulnerable to hackers at anytime and anywhere as they wanted

The most important things that can make you smarter than smartphones are: (a) don’t let smartphones interrupt you; (b) don’t let smartphones distract you; (c) don’t let smartphones invade your privacy; (d) don’t let smartphones ruin your sleep and (d) don’t let smartphones spoil your morning. The smartphone is an amazing human invention, but you must ensure it serves us rather than let it rule our lives.

Latest Internet Smartphone Usage Statistics

India has a population of 1 40 billion people, of which 79% (1 10 billion) use mobile phones, 45% (624 million) use the internet and 32% (448 million) use social media, with an average internet

session lasting 6 hours and 26 minutes. Out of 1.10 billion internet users in India, 96.7% watch online videos, 82% watch live streaming, 52% listen to FM radio stations, and 50% listen to podcasts It’s important to note that 86% of the consumption happens on smartphones

Manage Your Smartphone Better

u Check how your Smartphone applications access your data

https://reports.exodusprivacy.eu.org/en/

u Fact-checking an image (Reverse image check) –https://images google com

u Un-shorten short web links

https://www.unshorten.it

u Check if the website is doing phishing activity –https://isitphishing.org/

u Allowing subscribers to telecom confirm their registered numbers and remove numbers that were registered without their knowledge. https://tafcop dgtelecom gov in

u Allowing subscribers to identify the sender of bulk SMS. https://smsheader trai gov in/

u Platform for determining whether the video was genuine or a deepfake. https://platform sensity ai/deepfakedetection

Few Signs, That Tell You That You Might Need a Digital Break

u Often feeling anxious or stressed out if you cannot find your smartphone

u Often feel compelled to check your smartphone every few minutes

u Often feel depressed, anxious or restless after spending time on social media

u Often preoccupied in posting, comments, re-sharing, liking and expecting others to also do the same for your posts

u Often you find yourself staying up late or getting up early to play/stay on social media on your smartphone

u You experience trouble concentrating, without having to check your smartphone

u You check your smartphone for every notification that comes to you.

Tips To Take A Digital Break

u Disable Notification on your Smartphone, It keeps you informed of what you are supposed to be informed, It makes you do what you don’t want to do and It makes you feel what you don’t want to feel

u Make your bedroom a smartphonefree zone.

u Charge your electronic devices outside the bedroom

u Access social media from your computer instead of your Smartphone and it’s recommended you set a Social Media schedule

u Keep only important tools on your home screen.

u Keep your phone away during meals with friends and families, it’s the only time for you to connect, converse and collaborate with your family members.

u Create a device-free meeting zones in your workplace. i.e., No phones, and tablets, engage in social conversations with one another during meetings

u Use Grey Scale mode on your Smartphone, it avoids you to use Smartphone longer times

u Have more green time (Playing physical games) than screen time (Playing online games)

u Track your usage using the “Screen Time” App on iOS Smartphones.

u Track your usage using the “Digital Wellbeing” App on Android Smartphones

u Make Use of Productivity Apps, that are available on App-store and Playstore

Stay tuned to the Cyber Gyan Column contributed by Anil Rachamalla from the End Now Foundation

https://www.endnowfoundation.org

NSH CYBER GYAN August 2023 15
- NSH

BATTLE AGAINST FINANCIAL CYBERCRIMES:

Insights from Cybersecurity Expert

Be alert and careful when shopping online, making transactions or signing into their online bank and government portals. We should make payments and transfers only through official sites. Be careful not to click on suspicious links sent through SMS, emails, WhatsApp & telegram.

As the digital revolution continues to revolutionise India's economy, new difficulties emerge Financial cybercrimes have become a menacing threat, putting individuals, businesses and even the nation's security at risk. To shed light on this pressing issue, in an exclusive interview with Neo Science Hub, Dr Sshruti Mantri, an eminent figure in the world of cybersecurity unravels the current challenges we face in cybercrime and security. Her expertise in Cyber Security and Cryptography, Business Analytics and Artificial Intelligence is second to none

What is a financial cybercrime and how to prevent it?

Cyber crimes in the financial sector or banking and finance domain are

NSH INTERVIEW 16 August 2023

the act of obtaining financial gain through profit-driven criminal activity, including identity fraud, ransomware attacks, email, internet fraud and attempts to steal financial accounts, credit cards, or other payment card information The attackers exploit vulnerabilities in systems, networks, and human psychology/weakness to steal payment card information, gain access to financial accounts to initiate unauthorized transactions, extortion, identity fraud to apply for financial products, and so on The attackers use social engineering techniques to manipulate victims into providing confidential information. This can be everything from fake emails supposedly sent by Netflix asking you to pay your subscription invoice, to illegitimate replica emails pretending to be from Paypal or iTunes informing you of your monthly invoice–trying to get you to click on a fraudulent link Thus, prevention mechanisms are not only the responsibility of the organization but also every individual accessing the internet and different services. They need to always be alert and careful when shopping online, making transactions or signing into their online bank and government portals We should make payments and transfers only through official sites Be careful not to click on suspicious links sent through SMS, emails, WhatsApp and telegram, etc., always verify the sender’s identity and ask for a second opinion if in doubt Ensure to update software and operation system from time to time; Use anti-virus software for desktop/laptop and mobile devices and keep it updated; Use strong passwords and change them from time to time; do not give out personal information to tele-callers and keep an eye on your bank statements.

personnel/ prosecutors/ judicial officers, improving cyber forensics facilities, etc to prevent such crimes and to speed up the investigation Most of the state governments have also set up centres of excellence in cyber security to work and research in the domain of security. The Government has launched the national cybercrime

Act, of 2000. The Act was enacted to provide a legal framework for electronic transactions and to deal with cybercrime The Act defines various offences related to cybercrime, such as hacking, phishing, identity theft, and lays down the punishment for these offences.

What are the main causes for the surge in bank fraud cases in India over the last decade, according to the Reserve Bank of India (RBI)?

According to the RBI report, the total number of fraudulent cases in banking systems was around 13000+. Of this, almost 49 per cent were in digital payment. UPI transactions are one of the most important and convenient online transaction methods at present The pandemic accelerated the use of UPI and made it hugely popular among all age groups Thereby making it popular among cyber attackers to exploit them. The Cyber-attacks on UPI systems are subject to phishing, fraudulent sellers, money mules, SIM cloning, malware, fake calls, etc

Central Government has taken steps to spread awareness about cyber-crimes, issue alerts/advisories, capacity building/training of law enforcement

reporting portal, www cybercrime gov in to enable complainants/victims to report complaints related to cyber-crimes such as banking and financial frauds, Child Pornography/Child Sexual Abuse Material, rape/gang rape imageries or sexually explicit content. The victim can also call the national helpline number ‘1930’ to register cybercrime To file a FIR about a cybercrime, the victim can approach the nearest police station Every police station is quipped to register a cybercrime. The government has rolled out a scheme for the establishment of the Indian Cyber Crime Coordination Centre (I4C) to handle issues related to cybercrime in the country in a comprehensive and coordinated manner Indian Computer Emergency Response Team (CERT-In) issues alerts and advisories regarding the latest cyber threats/vulnerabilities and counter measures to protect computers and networks regularly. The primary law related to cybercrime in India is the Information Technology

Do customers know and understand internet banking scams i.e., phishing, vishing and smishing to defend themselves?

Cyber-attacks of all kinds are on the rise globally, and India is reportedly one of the biggest targets with its large and vulnerable tech-connected population Today, India is wide-open with 24/7 connectivity, and close to 60% of the population has Internet access: large data volumes coupled with rapidly increased connectivity lead to more vulnerabilities.

There also exists a gap between the banking industry and its customers, when comes to fraud awareness and understanding of Internet banking scams. To which the fraudster takes advantage of the gap, particularly in phishing, vishing, and smishing scams Many customers are not understanding these types of scams mainly because they disregard the bank's fraud awareness information or security

India is ranked third in the world after China and Russia in cybercrimes, what steps has the Government taken to regulate cybercrimes?
NSH INTERVIEW August 2023 17
Today, India is wide-open with 24/7 connectivity, and close to 60% of the population has Internet access: large data volumes coupled with rapidly increased connectivity lead to more vulnerabilities.

alerts especially as these messages are mostly in English Therefore, they disadvantage themselves from being able to safeguard their banking channels against scammers. Although the banking industry and the related stakeholders are regularly issuing various fraud awareness about phishing, vishing, and smishing scams the question remains whether this reaches the consumers in a language understood by the consumer and in a way that is intended by the banks for customers to apply them in their daily digital banking needs.

When a cyber financial fraud happens, what steps should the victim take asap?

In the event of a cybercrime, the victim can register a complaint on the national cyber-crime portal or call on the national cyber-crime number and register a complaint at the nearest police station. In the event of financial fraud, the victim should also notify the bank in order for the bank to expedite the process and assist with the investigation

GPS trackers, ‘smart’ wearables and other IoT devices can hold valuable data, and those that do not have robust security software are vulnerable, what’s your take on such devices?

Smart wearable devices' privacy and security share similar risks as other IoT and smart devices. Most concerns around smartwatch privacy are based on the hazards of connected tech and the lack of cybersecurity standards surrounding the IoT For example, smartwatch data can tell a fraudster a lot about you and your activities All the info gathered, sent, and received by these devices becomes perfect for hijacking one’s identity and life. Smartwatches gather tons of personalized information on youpassing it through connections like Bluetooth and the internet Your GPS location, motion tracking, credit card transactions, calendar in combination, can reveal your ATM PINs, passwords, daily routine, and more.

User data compiled on these devices are sent from the service provider to third parties this data may also be used by

some third parties to create advertising profiles on you This data might even end up with many different companies, generating more points of attack to breach your privacy.

77 per cent of Indian firms reported being a ransomware victim in 2023, what are the main causes of ransomware?

Exploiting vulnerabilities in the systems is a primary cause of ransomware attacks, followed by compromised credentials.

There are so many fake apps floating around in the cyber world, what precautions should a common man take to mitigate the risk of cybercrime?

Everything from our web browsing to mobile devices and the Internet of Things (IoT ) products installed in our homes has the potential to erode our privacy and personal security, and we cannot depend on vendors or everchanging surveillance rules to keep them intact. We must all do whatever we can to safeguard our data and ourselves in the digital ecosystem such as clearing out cookies caches and browser histories to prevent ad networks from collecting information about you; when you visit a website address, check for Hypertext Transfer Protocol Secure (HTTPS) while doing online purchases, it is crucial for protecting your payment details from eavesdropping and theft, Facebook Container application is a worthwhile plugin to download if you are worried about the social media network tracking your visits to other websites You should also monitor your extensions and plugin lists Check them often to make sure there is nothing installed you were previously unaware of -- any suspicious software could be a sign of a malware infection.

Banking sector is most vulnerable to cyber scams, what steps should banks take to ensure they have a robust security infrastructure?

Banking and financial institutions need to analyse if the existing cyber risk policy

satisfies the identity, protect, detect, respond, and recover functions They need to assess the bank’s cyber infrastructure and security measures, establish an enterprise-wide, implement logging and monitoring systems, create a disaster recovery plan and incident response plan, and implement a multifactor authentication technique and zero trust architecture for their employees, customers and vendors

Can you educate our readers on the 14C scheme?

Indian Cybercrime Coordination Centre (I4C) was established by MHA , in New Delhi to provide a framework and ecosystem for Law Enforcement Agencies (LEAs) for dealing with Cybercrime in a coordinated and comprehensive manner I4C is envisaged to act as the nodal point to curb Cybercrime in the country

Dr. Sshruti Mantri

Sshruti is currently serving as an Associate Director, ISB Institute of Data Science, Indian School of Business She has to her credit 22+ years of experience in the field of academics, research and industry

She has done her PhD in Computer Science from the University of Mumbai and Post Graduate Certification in Cyber Security from Cranfield University, United Kingdom Her areas of expertise are Cyber Security and Cryptography, Business Analytics, and Artificial Intelligence She has been awarded the prestigious Chevening Cyber Security Fellowship 2017 by the Foreign and Commonwealth Office, United Kingdom She has been recognized as an ‘Outstanding Women in Cyber Security 2023’ by the Computer Society of India and Mumbai Chapter

NSH INTERVIEW 18 August 2023

PRIVACY CONCERNS SURROUNDING INSTAGRAM THREADS & (TWITTER)

The recent launch of Meta's social media app, Instagram Threads, has sparked privacy concerns, especially in the European Union (EU ) where the app is currently unavailable. Despite the restrictions, several EU residents have found workarounds to obtain a Threads account However, the future availability of Threads in the EU remains uncertain due to the region's stringent privacy regulations. This article compares the privacy issues associated with Threads and X , shedding light on the concerns raised by users and regulatory bodies

Sensitive Personal Information Collection

Threads collect highly sensitive personal information, including sexual orientation, race, ethnicity, biometric data, trade union membership, pregnancy status, politics and religious beliefs. There are concerns that this data may be shared with third-party advertising and marketing firms, raising questions about user privacy and the potential for unauthorized use.

Employment-Related Data Collection

Threads also collect employment-related information, such as users' company, role on the team, job history and performance evaluations Sharing such data with third parties raises concerns about the confidentiality of employment-related information and the potential misuse of this data.

Body-Related Data Collection

Users' health, fitness and exercise habits are collected by Threads, which may also be shared with third parties. Such data

collection raises privacy concerns as health-related information is highly sensitive and requires special protection

Web Activity Data Collection

Threads may collect users' browsing history, web page interactions (including ads) and the referring web page or source through which they accessed Threads links. This information may be shared with third parties, compromising user privacy and enabling targeted advertising based on browsing behaviour

Location Data Collection

Threads may collect users' location data, including photos, videos or other recordings of their environment and IPaddress-based location information This data, when shared with third parties, raises concerns about tracking, surveillance and potential unauthorized access to location information.

Inability to Delete Threads without Deleting Instagram

One significant issue with Threads is that users cannot delete the app without also deleting their Instagram account This lack of independent control over Threads raises concerns about user autonomy and the difficulty of disengaging from the platform while maintaining access to other services.

Why is EU Paying Attention: Threads' data collection practices, particularly regarding sensitive information, may violate the General Data Protection Regulation (GDPR) and other data protection regulations in the EU. Meta's reliance on behavioural advertising and profiling users without explicit consent raises concerns about privacy compliance The European Court of Justice's ruling against Facebook's targeted ad model further adds to the

scrutiny of Meta's practices

Potential Penalties and Legal Uncertainty

Meta has faced fines of €1 2 billion and restrictions on transferring user data from the EU to the US, which presents significant obstacles to Threads' launch in the EU. The incoming Digital Markets Act (DMA) regulations and potential penalties pose financial risks to Meta's data-driven business model Moreover, the regulatory landscape in the UK, which differs from the EU due to Brexit, may have implications for privacy protections in the future.

X's Privacy Concerns

X’s, a well-established social media platform, also faces privacy concerns. Similar to Threads, X collects a significant amount of user data, including personal information, posts, interactions, and browsing behaviour Concerns arise regarding X's data-sharing practices with third-party companies and the retention and handling of deleted tweets Lack of transparency in data practices and algorithmic decision-making also raises user privacy concerns. Both Instagram Threads and X face significant privacy issues, albeit with some variations. The collection and usage of sensitive personal information, employment-related data, body-related data, web activity data, and location data are concerns shared by both platforms. The inability to delete Threads without deleting Instagram adds to the unique challenges posed by the app As privacy regulations continue to evolve, platforms like Threads and X must prioritize user privacy and transparency to build trust among their users and regulatory bodies.

NSH INFORMATION HUB August 2023 19

AI Integration: Social Engineering Horror ?

Generative Artificial Intelligence (AI) models are poised to become integral components of our daily productivity tools. From word processors to email clients, artistic software to presentation tools, and even search engines, these AI features will revolutionize how we interact with technology As we look ahead, it's not farfetched to imagine that generative models will be embedded within operating systems, accessible through simple Application Programming Interface (API) calls, giving rise to a new generation of applications we haven't even conceived of yet However, this integration of generative AI into our everyday tools brings with it both positive and negative implications Simply detecting whether the content was created by an AI will no longer suffice in determining its malicious intent, as adversaries will leverage these technologies to create socially engineered content

The Rise of Malicious Content

As generative AI becomes more accessible, adversaries will exploit its capabilities just as we do, resulting in increased productivity for both parties The potential misuse of generative AI lies in its ability to create benign-looking content that can be used for nefarious purposes. For example, AI-generated emails could be crafted to request urgent feedback on a presentation, inform someone of a minor accident, or even persuade individuals to re-upload confidential documents to a new repository Such content is designed to appear harmless, blending seamlessly into regular business and interpersonal communication.

The Role of Generative AI in Social Engineering

Social engineering, which often relies on benign-seeming content, can benefit greatly from generative AI Previously, adversaries had to manually write phishing or spear phishing emails, resorting to copy-pasting to reach multiple targets. However, generative AI enables the creation of numerous slightly different

NSH TECHNOLOGY 20 August 2023
AI assistance in analyzing social media and mimicking writing styles holds promise, it is our collective resilience and commitment to safety that will ultimately defend us against evolving threats.

pieces of content from a single prompt, allowing adversaries to send out a variety of spam emails Additionally, the impeccable English generated by AI models eliminates the telltale signs of phishing, such as spelling mistakes and grammatical errors, making it harder for recipients to identify malicious intent Moreover, generative AI can generate content in various languages, bypassing language barriers and reducing reliance on translation tools.

Style Transfer and Impersonation

Generative AI's style transfer capabilities further empower adversaries in social engineering Attackers can convincingly impersonate others by presenting a model with a specific writing style. This technique increases the likelihood of successful spear phishing attacks. Moreover, style transfer can be utilized to inject fake documents into leaked data, making it difficult for document owners to refute their authenticity. Adversaries can leverage these capabilities to manipulate information and deceive victims effectively.

Automating Trust Building and Scaling Attacks

Some sophisticated spear phishing

tactics involve building trust with targets over time through multiple messages By utilizing large language models as chatbots, adversaries can automate this trust-building process, enabling them to scale their operations This automated interaction blurs the line between humans and AI, making it challenging to discern genuine connections from socially engineered ones As a result, there are currently no foolproof technological solutions to definitively identify whether we are being socially engineered

Mitigating Social Engineering Attacks

Given the absence of a silver bullet solution, vigilance, awareness and training become crucial in combating social engineering attacks Media literacy and phishing awareness training can play a significant role, but teaching employees about the psychology employed in social engineering attacks is often overlooked. Concepts like confirmation bias, authority bias, scarcity and social proof can be incorporated into training programs to enhance employees' ability to recognize and respond to threats Encouraging a culture of reporting and

sharing experiences can create an environment where employees assist each other in identifying threats, without inadvertently circulating potentially malicious content

Recognizing and rewarding employees who adhere to safety protocols and report threats can further reinforce a security-conscious culture

Future Possibilities: AI Assistance in Analyzing Social Media and Mimicking Writing Styles

Exploring new directions, one approach is to use language models to offer social engineering strategies One might instruct the model to give insights about probable strategies by entering a person's social media postings or carefully selected details collected from web sources. Additionally, a task-based architecture might be created to replicate the writing style of a victim's contact in order to acquire the information required to successfully impersonate them

As generative AI becomes deeply integrated into our daily tools, the risk of malicious content creation through social engineering rises. Adversaries will leverage these technologies to craft sophisticated and convincing messages, exploiting our cognitive biases and trust. Technological solutions alone cannot guarantee protection against social engineering attacks Vigilance, awareness and ongoing training programs that delve into the psychology behind these attacks will be vital in fostering a security-conscious culture While AI assistance in analyzing social media and mimicking writing styles holds promise, it is our collective resilience and commitment to safety that will ultimately defend us against evolving threats.

NSH TECHNOLOGY August 2023 21
- NSH

Nationwide Upsurge in CONJUNCTIVITIS CASES A Concern During Monsoon Season

Since the beginning of July 2023, L V Prasad Eye Institute (LVPEI) has reported close to 1000 cases of conjunctivitis diagnosed and treated across its network centres in Telangana, Andhra Pradesh, and Odisha.

ith the monsoon season comes an array of viral and bacterial infections, taking advantage of the increased humidity and dampness. This year is no different as we witness a nationwide upsurge in cases of 'Conjunctivitis,' commonly known as 'Pink Eye.' Conjunctivitis, characterized by the inflammation of the conjunctiva a thin mucous membrane covering the white part of the eye and the inner eyelids can be triggered by various factors such as viral or bacterial infections, allergies, parasitic infestation, or exposure to certain chemicals. Among the types of conjunctivitis, 'Follicular Conjunctivitis,' caused by specific viruses like adenovirus,

Wis particularly prevalent during this season

Since the beginning of July 2023, L V Prasad Eye Institute (LVPEI) has reported close to 1000 cases of conjunctivitis diagnosed and treated across its network centres in Telangana, Andhra Pradesh and Odisha.

"While follicular conjunctivitis can be uncomfortable, it is not typically visionthreatening and most cases resolve without lasting effects. However, timely treatment and proper care are crucial to prevent complications. It can affect individuals of all ages, but young children, the elderly and those with weakened immune systems may be more vulnerable to this condition," advises Dr. Muralidhar Ramappa, Cornea Consultant at LV Prasad Eye Institute.

D octor's Advice: If you experience any symptoms of conjunctivitis, seek prompt medical care to prevent complications. Taking proper precautions and diligently adhering to prescribed treatments, while practising good hygiene, can help protect your eyes and prevent the spread of infection to others It is important to avoid the indiscriminate use of antibiotics and steroids, using them only under the guidance of a healthcare professional when deemed necessary

Conjunctivitis, being highly contagious, demands attention to prevent further transmission. With symptoms like redness, itching, excessive eye discharge, and sensitivity to light, individuals should remain vigilant and take necessary precautions to avoid contact with others, especially during the monsoon season

NSH 22 August 2023 HEALTH

when such infections are more prevalent

As conjunctivitis cases rise across the nation, awareness and timely action are key to tackling the situation By following medical advice, practising good hygiene, and taking precautions to limit the spread, we can collectively mitigate the impact of conjunctivitis during this monsoon season. As always, consulting with healthcare professionals ensures the best care and management of the condition, ensuring a speedy recovery and reducing the risk of complications.

Types of Follicular Conjunctivitis

u Sore throat with conjunctivitis known as ‘Pharyngo-conjunctival-fever (PCF)’: It is often mild and commonly seen in children and young adults who recently had a cold or respiratory infection. Most of the cases we are

seeing currently are of PCF

u Advanced conjunctivitis known as Epidemic keratoconjunctivitis: It is less common and can be severe, affecting the front of the eye (cornea) and may cause long-lasting vision difficulties.

Precautions that can be taken to curb its spread:

u Conjunctivitis is contagious, so the infected person should isolate themselves from other family members and the community.

u Additional precautions to prevent its spread include frequent handwashing, avoiding touching the eyes, and refraining from sharing personal items

Symptoms

u Redness

u Itching

u Excessive eye discharge

u Sensitivity to light

u In some cases, it can result in fever and mild throat pain

Treatment

Treatment options vary based on the type and cause of the condition. They may include supportive therapy, warm compresses, lubricating eye drops and analgesics to relieve discomfort or inflammation.

Additionally, avoiding wearing contact lenses and gently cleaning eye discharge with a soft, damp cloth is recommended during treatment.

The indiscriminate use of antibiotics and steroids should be avoided and used only under the guidance of a healthcare professional when necessary

Android 14 is set to enable users to send SMS messages via satellite

Exciting developments are on the horizon for mobile communication technology as Android 14 is rumoured to usher in a groundbreaking feature SMS via satellite support. According to reports from Phone Arena, the Pixel #TeamPixel Twitter account hinted at this significant advancement, indicating that Android 14 users will soon be able to leverage satellite technology for sending and receiving SMS messages, even in areas with limited or no cellular coverage.

The Pixel #TeamPixel Twitter account tweeted, “Satellite SMS, Android 14,” suggesting that the update would enable users to use their devices for SMS communication through satellite connectivity.

This feature holds great potential for individuals in remote regions or areas with inadequate cellular coverage, as they can rely on satellite support to

maintain essential communication channels. Notably, Pixel and Galaxy phones are expected to be among the first Android models to boast the necessary hardware for supporting SMS via satellite.

While Android 14’s full scope of satellite support remains uncertain, the final and stable version of the operating system is expected to launch in the near future, with an estimated timeline of two to three weeks

In a notable comparison, Apple already offers the Emergency SOS via satellite feature in iPhone 14 and iPhone 14 Pro models. This feature has been proven to be life-saving in critical situations, such as the recent incident on the Angeles Forest Highway in California’s Angeles National Forest

During the accident, a vehicle careened over the edge of a mountain and plunged around 300 feet into a remote canyon, leaving the passengers in a

perilous situation with no cellular signal. However, an iPhone 14 in the car detected the crash and promptly sent crucial information to rescuers using the Emergency SOS via Satellite feature, successfully rescuing the stranded individuals

As the world of mobile technology continues to advance, innovations like satellite SMS support hold immense promise for enhancing communication capabilities and ensuring safety, particularly in challenging environments or during emergencies As the launch of Android 14 draws nearer, users eagerly await this transformative feature that could redefine mobile communication and offer a lifeline to those in need, regardless of their location or cellular network access.

NSH August 2023 23 HEALTH
- NSH

CHANDRAYAAN-3

A New Chapter in India’s Space Odyssey

NSH SPACE 24 August 2023

In a momentous event that carries the hopes of an entire nation, India’s Chandrayaan-3 lifted off from the Satish Dhawan Space Centre in Sriharikota. This ambitious mission, if successful, will establish India as the fourth country to achieve a controlled landing on the moon, following in the footsteps of Russia, the United States, and China

Perched atop the mighty Mark 3 heavy-lift launch vehicle, fondly referred to as the Bahubali rocket, is the moon lander named Vikram Prime Minister Narendra Modi hailed this launch as a “new chapter” in India’s space odyssey, acknowledging the profound impact it would have on the dreams and ambitions

of every Indian.

Chandrayaan-3’s journey from Earth to the moon is estimated to take approximately a month, with the anticipated landing scheduled for August 23. Once it touches down, Vikram will operate for one lunar day, which is equivalent to approximately 29 Earth days.

Comprising of three crucial components: a lander, a rover and a propulsion model Chandrayaan-3 will leverage the existing Orbiter from its predecessor, Chandrayaan-2, which still remains in the lunar atmosphere

In a pioneering move, India’s Vikram lander will make its descent towards the

South Pole of the moon, a region where the presence of water molecules was first detected during India’s inaugural moon mission in 2008, causing ripples of astonishment across the globe. Vikram is designed to execute a secure, soft landing, after which it will release its companion, the rover Pragyan This rover will traverse the moon’s surface during a lunar day, conducting a series of scientific experiments.

This latest iteration of Chandrayaan comes four years after the setback of the previous attempt, where ground control lost contact with the spacecraft moments before landing Reflecting on the lessons learned, the Indian Space Research Organisation (ISRO) has incorporated a multitude of changes to mitigate the chances of failure this time

ISRO Chief S Somnath acknowledged that the main issue during the Chandrayaan-2 mission was the occurrence of off-nominal conditions within the system, which the spacecraft was unable to handle for a safe landing. Determined to rectify these shortcomings, ISRO has meticulously addressed the concerns and made necessary modifications for Chandrayaan-3

As India embarks on this ambitious endeavor, the nation holds its breath in anticipation of a successful mission that will not only place it among the elite spacefaring nations but also push the boundaries of scientific knowledge

Chandrayaan-3, with its pioneering landing site and improved capabilities, promises to script a new chapter in India’s remarkable space odyssey, raising the aspirations of a proud and visionary nation

NSH SPACE August 2023 25
Chandrayaan-3’s journey from Earth to the moon is estimated to take approximately a month, with the anticipated landing scheduled for August 23. Once it touches down, Vikram will operate for one lunar day, which is equivalent to approximately 29 Earth days.

BEGINNER’S GUIDE TO UNDERSTANDING NIR SPECTROSCOPY

NIR is an abbreviation for Near Infrared Spectroscopy, and it refers to the analytical technique of analysing materials for compositional or distinctive traits using near-infrared light.

Electromagnetic energy is used when you tune your radio, watch TV, send a text message or make popcorn in a microwave oven. Every hour of every day, you rely on this energy. The world you know would not exist without it. The electromagnetic (EM) spectrum encompasses all forms of electromagnetic radiation. The other types of EM radiation that make up the electromagnetic spectrum are microwaves, infrared light, ultraviolet light, X-rays and gamma-rays.

The human eye can only detect only a small portion of this spectrum called visible light. Today we will try to understand the basics of near-infrared spectroscopy and its industrial application.

Introduction to NIR Spectroscopy

NIR is an abbreviation for Near Infrared Spectroscopy, and it refers to the analytical technique of analysing materials for compositional or distinctive traits using nearinfrared light.

When you reach your palm out to a burning fire, you "feel" the heat it emits, but what is

NSH PHARMA 26 August 2023

going on? The fire emits light and infrared (IR) radiation, the majority of which is near-infrared (NIR) radiation.

William Herschel, a musician and a successful amateur astronomer (he found Uranus), discovered this radiation in the year 1800 because he wanted to know if any specific colour was connected with heat from sunlight He found that the heat maximum was beyond the red end of the spectrum.

Near-IR spectroscopy belongs to the group of vibrational spectroscopy techniques, along with mid-infrared spectroscopy (primarily FT-IR) and Raman spectroscopy The first near-IR spectrometers were developed in the 1980s, initially designed for industrial applications and chemical analysis.

Near-infrared (NIR) spectroscopy is an adaptable form of analysis that may be used in a variety of research and industrial process applications. Long used in remote sensing, NIR spectroscopy has gained popularity in the industrial sector as a low-cost method for assessing materials in order to optimise operations and manage expenses. NIR radiation is present in

optical fibre, TV remotes and of course, near-infrared spectroscopy.

How does it work?

The main principle behind the different methods of spectrophotometry, including NIR spectroscopy, is the Beer-Lambert Law. According to this law, the concentration of a certain chemical compound in a solution determines how much light, whether visible or infrared, this solution will absorb

NIR spectroscopy (NIRS) is an absorption spectroscopy method that helps detect the chemical composition of a substance or solution by measuring how much near-infrared light the compound or solution absorbs. Nearinfrared radiation waves are slightly longer than those of visible light and make use of the near-infrared region of the electromagnetic spectrum (from about 700 to 2500 nanometres). By measuring light scattered off, of and through a sample, NIR reflectance spectra can be used to quickly determine a material’s properties without altering the sample

Absorptions in the NIR region are generated from fundamental vibrations by two processes; overtones and combinations Overtones can be thought of as harmonics. So every fundamental will produce a series of absorptions at (approximately integer) multiples of the frequency (frequency is the reciprocal of wavelength). Combinations are rather more complex. Combinations arise from the sharing of NIR energy between two or more fundamental absorptions NIR absorptions are at a higher state of excitement so they require more energy than a fundamental absorption. We can think of chemical bonds as weak springs holding together two or more atoms, these springs will vibrate naturally and when energy is added to the system then they will vibrate more energetically When exposed to nearinfrared radiation, a molecule absorbs the electromagnetic photons and starts the process known as the vibrational transition: stretching, shrinking, bending, rocking back and forth and so on Because of this mechanism, NIR spectroscopy is commonly referred to as vibrational absorption spectroscopy. Because each different material is a unique combination of atoms, no two compounds produce the exact same near-infrared spectrum. Therefore, near-infrared spectroscopy can result in a positive identification (qualitative analysis) of each different material In addition, the size of the peaks in the spectrum is a direct indication of the amount of material present. With modern software algorithms and statistical treatments, NIR spectroscopy is an excellent tool for quantitative analysis, offering a practical alternative to time-consuming

NSH PHARMA July 2023 27

wet chemical methods and liquid chromatographic techniques

Molecular vibration helps determine the chemical composition of matter through NIR spectroscopy Let’s consider a molecule of water as an example. A molecule of water consists of two partially positively charged atoms of hydrogen connected to a partially negatively charged atom of oxygen When exposed to specific frequencies of infrared radiation, the water molecule is excited to one of the following higher-energy vibrational modes:

Asymmetric Stretch: During which one of the hydrogen bonds shrinks while the other extends.

Symmetric Stretch: During which both hydrogen bonds shrink or stretch.

Scissoring Bend: During which both hydrogen atoms rock back and forth towards each other as if they were impaled by a pair of scissors.

NIR requires little or no sample preparation. It can also be used to analyze multiple constituents in a single scan NIR spectroscopy is commonly used to quantify organic functional groups, particularly O-H, NH, and C=O.

Instrumentation

To record the intensity at different wavelengths, a source, a detector, and a dispersive device (such as a prism or, more typically, a diffraction grating) are used. Fourier transform NIR equipment with an interferometer are very popular, particularly at wavelengths above 1000 nm. FT-NIR hardware is generally more complex but advances in electronics, methods, and manufacturing have significantly improved the detector sensitivities, resolution, and immunity from vibrational effects. Though, according to the literature, FT-NIR and NIR instruments were comparable in predictive performance and there seemed to be no advantage of either method over the other for some of the

constituents measured The spectrum can be measured in either reflection or transmission depending on the sample.

Tungsten halogen light bulbs or quartz halogen light bulbs or light-emitting diodes (LEDs) are most often used as broadband sources of near-infrared radiation for analytical applications. The type of detector employed is mostly determined by the wavelength range to be monitored. Silicon-based CCDs are appropriate for the shorter end of the NIR range but are insufficiently sensitive for the majority of the range (over 1000 nm) For wavelengths over 1100 nm, InGaAs and PbS devices are more suited and have better quantum efficiency.

Benefits of NIR Testing

analysis

w High accuracy and sensitivityGratings on a NIR spectrophotometer aid in the accurate selection of certain wavelengths throughout the testing procedure

w Reliable results - for most analyses, NIR instruments have a prediction accuracy within 1.5 times of the reference method error with much better precision.

w Cost-effective - one analyst can typically analyse several hundred samples in a day with no consumable costs.

Some of the Applications

w Vegetables & fruit: Water content, carbs, calories.

w Dairy products: Calories, fat, proteins, water

w Food/Meat: Protein, carbohydrate, moisture, fat, food oils and different polymers.

w Grain & fruit: Best time for harvesting

w Pharmaceutical: Active pharmaceutical ingredients (APIs) solid, liquid and pharmaceutical forms, process monitoring or in QC laboratories

w Agriculture: Detection of plant diseases

Conclusion

w Simple to use - standard operation is loading a sample cell and turning on the device

w Little sample preparation - most samples may be analysed as-is (non -destructive) or with minor grinding or particle size reduction.

w No hazardous chemical waste - no chemicals are used at all

w Fast analysis - typical analysis times are 10 seconds - 2 minutes.

w Simultaneous results for multiple parameters - multiple constituents are predicted with one sample

NIR can often penetrate a sample far deeper than FTIR and, unlike Raman, is unaffected by fluorescence As a result, while NIR spectroscopy is not as chemically specific as Raman or FTIR , it may be quite effective in investigating bulk material with little or no sample preparation.

NIR is a very reliable technique for the positive identification and quantitation of any sample, thus making it an invaluable tool for quality control and quality assurance applications

NSH PHARMA 28 August 2023
NIR requires little or no sample preparation. It can also be used to analyze multiple constituents in a single scan.

PIG BUTCHERING SCAM: All that you need to know

on a dating app The fraud might also begin with an SMS from a wrong number or a direct message on social media. The fraudster may even pretend to be the victim's longlost contact

How does a pig butchering scam work?

The term "pig butchering" refers to the process of winning the victim's confidence before taking money. A pig butchering scam made news in 2022 when a man lost $1 million after communicating with a fraudster posing as a former colleague on WhatsApp

What exactly is a pig butchering scam?

The pig butchering scam also known as the romance scam, is a long-term fraud that mixes investment schemes, romance scams and cryptocurrency fraud. This swindle began in Southeast Asia, and the term comes from the Chinese phrase "Shāz Hū Pán," which translates to "pig butchering " A gang of Bitcoin fraudsters looks for victims on dating and social media platforms

The fraudster usually establishes a phoney account and contacts potential victims using services like Tinder or WhatsApp The idea is to become this victim's "lover" or "friend" through friendly conversations

The comparison arises from winning the victim's confidence (fattening the pig) and subsequently stealing cryptocurrencies or money (butchering) This fraud is similar to a romance scam

The fraudster contacts the possible victim via social media, dating apps or text messaging. After locating their next victim, the fraudster maintains constant communication to create confidence, which might take weeks or months depending on the victim

The fraudster then convinces the victim to engage in Bitcoin trading after earning confidence The fraudster promises the victim that they will gain money, either through an insider tip or through some investor expertise The fraudster then instructs the victim to download an app or visit a website to conduct Bitcoin exchanges. Sometimes, they will occasionally offer to trade alongside the victim. However, this platform is controlled by fraudsters Scammers may imitate a transaction to make it look like the victim is making money, or they may even instruct the victim to withdraw part of the "profits" to win more confidence. The victim is then persuaded to deposit further funds into the account However, if the victim wishes to withdraw funds, the account states that fees or taxes must be paid to do so. When the victim realises the platform is a fraud, the transactions on the blockchain vanish, never to be seen again.

How to Recognise a Pig Butchering Scam?

Look for claims of enormous and rapid

profits, as with any other fraud Avoid any deals that need a Bitcoin payment upfront Also, avoid combining online dating with investment advice from someone you've never met in person There are more red flags and indicators of pig butchering scams to be aware of. Pig butchering scams involve scammers posting messages on social media, dating apps, WhatsApp or SMS to contact someone else. These encounters are not accidental and may be prolonged, even if the victim insists they have the wrong person. Be cautious about Bitcoin discussions and avoid high-profit investments Share no personally identifying information with internet acquaintances If the scammer comes on too strong with grandiose promises, block them. Scammers may ask the victim to download a Bitcoin investing app, which may have tiers with minimum investment requirements. They may trade with the victim to demonstrate the platform and increase their gains Don't participate in any sites or platforms recommended by an internet contact Scammers may also ask for significant fees or taxes to withdraw funds or suspend accounts if no fees are paid.

How to stay away from pig butchering scams?

Check the official website URL to determine whether it matches the suggested site before investing any money, even Bitcoin Keep an eye out for misspelt URLs that differ slightly from the primary banking institution, such as “icici.com” vs icci.com. Always research investments and be wary of get-richquick schemes.

Before installing an app, always verify its validity

There have been instances of pig butchering scam apps appearing in the Apple and Google app stores. For the most recent frauds, visit sites like the Better Business Bureau or Reddit.

INFORMATION HUB NSH August 2023 29

Why Is Big Pharma Putting Money into BLOCKCHAIN?

Counterfeit drugs (fake pharmaceuticals) are manufactured outside of the official pharmaceutical production system and are thus fraudulent Because counterfeit medications mimic original pharmaceuticals, detecting them can be difficult. Most of the time, they are manufactured to look exactly like the real product and may not trigger a noticeable or harmful reaction However, they frequently fail to effectively treat the sickness or disease for which they were developed, or they may include harmful and occasionally toxic chemicals.

Counterfeit pharmaceuticals harm real drug producers' reputations and income, but preventing counterfeits from

accessing the market is also critical to patient safety The pharmaceutical business has been plagued for decades by the reality of counterfeit pharmaceuticals infiltrating its complicated supply networks. The companies are looking for novel solutions to the rising threat to patient lives and brand reputations According to the World Health Organisation, one out of every ten medical items, including medications, vaccinations and diagnostic kits, is substandard or fraudulent in lowand middle-income countries.

Counterfeiting has become one of the world's largest and fastest-growing unlawful industries, according to the World Health Organisation ( WHO), and is estimated to be worth around 600 billion USD by the International AntiCounterfeiting Coalition.

The typical pharmaceutical supply chain is beleaguered by a number of issues, including a lack of transparency, difficulty monitoring medicines, a lack of confidence, and the distribution of expired products.

Blockchain Technology

To combat pharmaceutical counterfeiting, cutting-edge digital technologies such as blockchain technology are required

Blockchain is a distributed ledger maintained by parties in a peer-to-peer network that comprises of a linked series of blocks (a transaction storage unit) containing time stamped transactions protected by public-key cryptography

Once an item is added to the blockchain, it cannot be changed, transforming the blockchain into a timeless record of past

NSH PHARMA 30 August 2023

events Based on these technological qualities it has been employed in numerous application sectors, including the Internet of Things (IoT ) and Supply Chain Management. The architecture of a blockchain enables users to share validated and updated ledgers for every transaction. Nodes receive and validate copies of each transaction, and this information is synchronised across the network As a result, the necessity for a central validating authority is no longer required The word "blockchain" refers to the linking of transactions in separate blocks.

Given the qualities of blockchain technology, notably the way it facilitates decentralisation, transparency, trust, anonymity and stability, its usage in the pharmaceutical business has been highlighted as a feasible solution to combat counterfeit medicine distribution. Blockchains may be used to track the origin of medications, drug transit and raw material acquisition

Additionally, blockchain technology minimises the number of intermediaries engaged in the pharmaceutical process, lowering costs and boosting safety. The significant roadblock to the implementation of such technology is the participation of multiple stakeholders which include pharmaceutical companies, distributors, retailers, patients and government authorities, making it a challenging task Regulatory bodies have a key role in creating a framework which would help in the adoption of blockchain technology in the pharmaceutical supply chain.

With more detailed information, stakeholders might better pinpoint supply chain bottlenecks, discover and remove expired, damaged or fraudulent items, detect where supplies are running low and effectively transfer inventory to where it is most required

When blockchains are included in quality control and the detection of counterfeit drugs, it enhances traceability, safety and saves lives

Pharmaceutical products are serialized and assigned security features that consumers can verify and differentiate from counterfeits. The blockchain technology also improves security by allowing for transparent, chain codebased transactions When blockchains are used in quality control and the

identification of counterfeit medications, safety is improved and lives are saved Blockchains can also accommodate more complex notions like smart contracts. A smart contract on the blockchain is a contract between two or more parties that is saved and digitally executed on the blockchain According to experts, a smart contract is a programmable

contract that may be viewed as an automatically executed clause contract; the contract will be automatically performed when the blockchain reaches a preset condition. Smart contracts are thus “computerized transaction agreements that enforce contract terms”.

BENEFITS OF BLOCKCHAIN

Blockchain simplifies supply chain traceability by linking operations, enhancing supplier information, procurement and item delivery.

Blockchain fosters trust, transparency and traceability in supply chains through open access to data points.

Smart contracts encapsulate code in blockchain blocks, updating activities automatically when predetermined requirements are met, replacing manual operations.

Blockchain, a distributed ledger, eliminates tampering in transactions by requiring simultaneous changes, making it reliable and resistant to fraud in supply chains.

Blockchain ensures process consensus in supply chains by ensuring all parties agree on activities, ensuring automated and legitimate transactions.

Ref: Sidvim Insights: https://www.financialexpress.com/business/blockchain-role-ofblockchain-in-pharmaceutical-supply-chain-3160835/

- Dr. Subramanian S Iyer

NSH PHARMA August 2023 31
Transparency Speed Durability Consensus
Traceability

IIT-HYDERABAD Director Prof. BS. Murty

Praises Institute's Implementation of NEP-2020

Speaking to the media on the picturesque campus of the Indian Institute of Technology-Hyderabad (IITH), the esteemed director, Prof. BS. Murty, expressed his satisfaction with the institute's steadfast progress in implementing the recommendations of the National Education Policy-2020 (NEP). The institute has taken significant strides towards modernizing its educational offerings and fostering international collaborations with various reputed institutions worldwide

Prof. Murty proudly highlighted IIT-H's pioneering efforts in providing a plethora of courses in digital mode, thus facilitating easy access to education for learners from diverse backgrounds To further enhance its global appeal, the institute is actively encouraging foreign students to pursue their PhD studies at IIT-H by offering an attractive scholarship of Rs.60,000 per month.

Furthermore, in an endeavour to promote multidisciplinary learning among engineering students, IIT-H has thoughtfully restricted engineering subjects to only 60 per cent of credits. This policy empowers students to explore a broad range of electives for the remaining 40 per cent, including liberal arts, Sanskrit, social sciences and other diverse subjects Notably, IIT-H has incorporated mandatory industry exposure into its course curricula, recognizing the invaluable insights and experiences gained through practical work in real-world settings For students actively engaged in research projects, the institute goes the extra mile by granting semester-long academic breaks, fostering an environment that nurtures academic excellence.

In addition to its efforts in course diversification and global outreach, IIT-H has also embraced the digital revolution, offering 15 M-Tech courses through digital platforms to cater to the needs of professionals seeking higher education without compromising their work commitments.

Prof Murty's unwavering enthusiasm and

dedication to align IIT-H with the progressive vision outlined in NEP-2020 have undoubtedly positioned the institution as a leading player in the realm of higher education. As the institute continues to march forward, it promises to create a transformative and inclusive learning environment for aspiring minds

IIT Jodhpur Takes Strides Towards Implementing NEP 2020 with Workshop and Faculty Development Program

JODHPUR : Indian Institute of Technology Jodhpur (IIT Jodhpur) recently conducted a workshop on the 'Implementation of NEP 2020,' showcasing the institute's proactive approach in aligning its curriculum with the recommendations of the National Education Policy-2020. The workshop saw participation from around 25 key officials representing various educational institutions, including higher education institutions like MBM University, JIET, JNVU, LMCST and school education institutions like KVs, Bodhi International School, Mayoor Chopasini School, Rajmata School & among others.

The event focused on promoting an integrated approach to learning and teaching, emphasizing the core vision of NEP 2020. Distinguished heads and representatives from different institutions engaged in a panel discussion, deliberating on the steps required to implement the policy effectively

During the inaugural session, Prof. Santanu Chaudhury, the Director of IIT Jodhpur, highlighted the institute's recent initiatives aimed at revamping the academic curriculum These efforts aim to introduce greater flexibility, enabling students to choose courses according to their preferences and interests Additionally, IIT Jodhpur has established new interdisciplinary and cross-disciplinary academic entities, such as Schools, Centres and Interdisciplinary Research Platforms, to foster the true spirit of NEP in both academics and research

Prof. Sampat Raj Vadera, the Deputy

Director of IIT Jodhpur, emphasized the role of technology in disrupting the education sector. He shed light on the efforts of the "Center for Education and Technology for Education" (CETE) in enhancing the quality of education through pedagogical and technological innovations The CETE has been actively working on transforming conventional instructional materials into interactive learning tools, aiming to enhance the learning experience for students.

In line with its commitment to advancing pedagogy and technology-enabled learning, IIT Jodhpur recently organized a Five-Day Faculty Development Programme (FDP) on "Pedagogy and Technology-enabled Learning." The FDP, conducted by the CETE from the 19th to 23rd of July, brought together experts from academia and industry, both from India and abroad The program offered valuable insights into learning sciences, pedagogical strategies, interactive learning environments, technology integration in classrooms, augmented and virtual reality applications in education, effective assessment strategies, instructional design and educational data analytics The interactive sessions engaged participants with concepts, applications and related activities, proving particularly beneficial for new faculty members and doctoral students aspiring to pursue careers in academia.

IIT Jodhpur's dedication to moulding students with essential skill sets to lead various industries, pursue higher studies, or venture into entrepreneurial endeavours, addressing contemporary challenges of the country, remains unwavering.

The workshop concluded with heartfelt thanks extended to all the participants from diverse educational institutions who contributed to the enriching discussions and the success of the event.

IISER Bhopal Takes Bold Initiatives to Fulfill Goals of NEP 2020

Bhopal: The Indian Institute of Science Education and Research Bhopal (IISER Bhopal) is leaving no stone unturned in its

32 August 2023
NSH STUDENT CORNER

commitment to achieving the objectives outlined in the National Education Policy (NEP) 2020. The institute has embraced several innovative initiatives to align its educational programs and facilities with the policy's core principles of inclusivity, flexibility and interdisciplinary learning

As part of its dedication to the successful implementation of NEP 2020, IISER Bhopal is focusing on crucial aspects, including curriculum revamping, student well-being and performance, faculty support in research and teaching and fostering entrepreneurship. Prof. Siva Umapathy, the Director of IISER Bhopal, emphasized the importance of stakeholders' active participation in realizing the policy's goals He highlighted the significance of transparent methodologies, feedback mechanisms and periodic revisions in ensuring successful implementation

Speaking about the institute's readiness to implement NEP 2020, Prof Siva Umapathy praised the faculty's enthusiasm and acceptance of new paradigms He lauded their efforts in designing courses that promote interdisciplinary studies and encourage students to explore diverse fields of knowledge.

IISER Bhopal has introduced several academic courses with an interdisciplinary approach, fostering a well-rounded education experience for its students. The institute offers Bachelor of Science (BS) programs with specializations in Chemical Engineering, Data Science and Engineering, Economic Sciences, Electrical Engineering and Computer Science

Additionally, a five-year dual degree program (BS-MS) is available in Biological Sciences, Chemistry, Earth and Environment Sciences, Mathematics and Physics, providing students with the option to pursue advanced studies or research in their chosen disciplines. Notably, IISER Bhopal takes pride in being among the first Institutes of National Importance in India to offer undergraduate programs in Data Science and Engineering. This unique blend of engineering and natural science equips students with the necessary skills to tackle real-world challenges and become sought-after professionals in the industry and academia

Besides academic pursuits, the institute places considerable emphasis on physical fitness and mental health Students are encouraged to adopt a healthy lifestyle through physical fitness courses and have access to excellent sports facilities and

gym resources. Moreover, IISER Bhopal ensures students' mental well-being with dedicated peer counsellors and various mental health awareness programs

To nurture research capabilities among undergraduate students, IISER Bhopal has established the 'Undergraduate Clubs for Research Enthusiasts in Science and Technology' ( UG-CREST ) This initiative fosters scientific attitudes and active engagement in research beyond regular course work

The institute's commitment to enhancing students' skills is evident through its Institute Career Development and Placement Council, which conducts workshops on soft skills, effective communication, teamwork and more Additionally, IISER Bhopal offers students opportunities for research and industry internships to gain practical knowledge and real-world exposure.

Recognizing the importance of multidisciplinary research, IISER Bhopal has set up several Centers of Excellence, including the Medical Science and Engineering Research Centre (MEDSER) and the Centre for Science and Society (CS2) These centers promote collaborative research and outreach programs to benefit society at large

The Department of Humanities and Social Sciences at IISER Bhopal plays a vital role in nurturing well-rounded graduates who are socially relevant in their work culture by imparting critical thinking, creativity and social understanding

Encouraging entrepreneurship among its faculty and students, IISER Bhopal has established the Innovation and Incubation Center (IICE) to support innovative ideas and startups The institute's efforts in filing patents for research work further contribute to valuable innovations and advancements.

To complement classroom learning with real-world experiences, IISER Bhopal invites entrepreneurs from diverse fields to share insights and experiences with aspiring students, fostering a vibrant entrepreneurial ecosystem.

With a steadfast commitment to aligning with NEP 2020 and embracing progressive initiatives, IISER Bhopal is poised to play a transformative role in shaping the future of education and research in India.

IIT Kharagpur's Bold Initiatives in Line with NEP 2020

IIT Kharagpur held a press conference to

celebrate the 3rd Anniversary of the National Education Policy (NEP) 2020. The event showcased the institute's strategic implementation of NEP 2020 and its vision for the future

The prestigious institute has revamped its curricula for both undergraduate and postgraduate programs, incorporating NEP 2020's principles of multidisciplinary and flexibility The introduction of interdisciplinary dual degree programs and expanded elective choices allow students to explore diverse subjects across the institute.

In a groundbreaking move, IIT Kharagpur is venturing into the medical field, introducing the MBBS program at the B C Roy Institute of Medical Science and Technology

The focus on internships has also been strengthened, with students now having the option to extend their summer internships to eight months for research or industry experience The duration of Bachelor's programs in Science has been aligned with technology programs, both now four years long.

To foster a global outlook, the institute has established an International Student Office and aims to increase admissions of international students.

IIT Kharagpur has set up the Center of Indian Knowledge System to promote Indian languages, art, culture and quality research, integrating them with engineering, science, humanities and social sciences.

The institute is working on establishing an Academic Bank of Credit, digitally storing academic credits earned from various recognized higher education institutions, ensuring seamless transferability.

NEP 2020's emphasis on the use of technology in education is being advanced through the creation of the National Educational Technology Forum (NETF). This platform will facilitate the exchange of ideas on integrating technology for enhanced learning, planning and administration

With these visionary initiatives, IIT Kharagpur aims to create a dynamic and inclusive learning environment, empowering students for success in the ever-changing world NEP 2020 has laid the foundation for transformational changes in India's education landscape, and IIT Kharagpur is at the forefront of this revolution

- NSH

NSH STUDENT CORNER August 2023 33

in the Brain advance Body Glucose Regulation

Glucose-sensing Neurons 1

There are many glucose-sensing neurons in the brain that are thought to actively participate in detecting small changes of glucose levels in the body and then trigger responses accordingly to return the level to a healthy range, said Dr. Yong Xu, professor of paediatrics-nutrition. "But there have been several questions about this for a long time " The accepted concept is that blood glucose levels are tightly controlled by hormones secreted in the pancreas, such as insulin and glucagon So, some scientists have wondered, do glucosesensing neurons in the brain really play a role in the regulation of whole-body glucose levels? In this study published in the Journal of Clinical Investigation, Xu and his colleagues examined the role of a particular group of glucose-sensing neurons in maintaining blood glucose balance in animal models "Glucosesensing neurons can be divided into two groups according to how they respond to glucose fluctuations," Xu explained. "One group is called glucose-excited (GE) neurons and the other is the glucoseinhibited (GI) neurons " GE neurons are activated or excited when the glucose level around them is higher This is expected because glucose is a fuel for most cells, including neurons. "Having more fuel available would support increased cell activity." O n the other hand, GI neurons are inhibited when glucose levels are higher and paradoxically, they are activated when glucose levels are lower

World IVF Day 2023

AI finds

its way into people's hear ts

3Valvular coronary illness, one reason for the cardiovascular breakdown, is in many cases analyzed utilizing echocardiography. Despite the fact that the heart is additionally apparent in chest radiographs, lit tle was some significant awareness of the capacity of chest radiographs to identify cardiovascular capability or sickness As needs be, the exploration group driven by Dr. Daiju Ueda, from the D ivision of D emonstrative and Interventional Radiology, figured that if heart capability and sickness were not entirely settled from chest radiographs, this test could act as an enhancement to echocardiography D r Ueda's group effectively fostered a model that uses manmade intelligence to characterize cardiovascular capabilities and valvular heart sicknesses from chest radiographs precisely. Since simulated intelligence prepared on a solitary dataset faces likely inclination, prompting low exactness and the group held back nothing information Likewise, a sum of 22,551 chest radiographs related to 22,551 echocardiograms was gathered from 16,946 patients at four facilities between 2013 and 2021 With the chest radiographs set as input data and the echocardiograms set as output data, the man-made intelligence model was prepared to learn highlights interfacing both datasets The computer-based intelligence model had the option to classify unequivocally six chosen kinds of valvular coronary illness, with the Area Under the Curve, or AUC, going from 0.83-0.92. The AUC was 0.92 at a 40% cut-off for identifying left ventricular discharge, a significant measure for checking heart function.

4

BACTERIA & VIRUSES detection

using Fluorescent Nanotubes

IVF stands for In Vitro Fertilization World IVF Day also known as World Embryologist Day is celebrated on the 25th of July every year This day marks the birth date of the first baby that was conceived and successfully birthed through IVF We recognise this day to celebrate the success and importance of IVF as an effective method of conceiving Louise Joy Brown born on the 25th of July 1978 was the first baby born through the IVF procedure. From this day onwards, IVF was recognised as being a reliable reproductive technology to conceive babies. The three pioneers of IVF were embryologists Patrick Steptoe, Bob Edwards and Adam Burnley. They led the procedures for the first successful IVF treatment. Since then, they are recognised for their achievements in this field. IVF is one of the most common procedures to conceive artificially

The group utilized cylindrical nano sensors that were made of carbon and had a diameter short of one nanometre Sebastian Kruss and Justus Metternich from Ruhr College Bochum detailed their discoveries in the Diary of the American Synthetic Culture In prior examinations, Sebastian Kruss group had proactively demonstrated the way that the fluorescence of nanotubes can be controlled to identify essential biomolecules. The way to progress was DNA structures with supposed guanine quantum defects This included connecting DNA bases to the nanotube to make a deformity in the gem design of the nanotube. Accordingly, the fluorescence of the nanotubes changed at the quantum level Through the connection of the discovery unit to the DNA secures, the gathering of such a sensor looks like a process for building blocks with the exception that the singular parts are multiple times less than a human hair The gathering displayed the new sensor idea involving the SARS CoV-2 spike protein for instance. To this end, the analysts utilized aptamers, which tie to the SARS CoV-2 spike protein Aptamers are collapsed DNA or RNA strands. Because of their construction, they can specifically tie to proteins, explains Justus Metternich. "In the following stage, one could move the idea to antibodies or other discovery units " The fluorescent sensors demonstrated the presence of the SARS CoV-2 protein with a serious level of unwavering quality. The selectivity of sensors with guanine quantum surrenders was higher than the selectivity of sensors without such deformities.

NSH SNIPPETS 36 August 2023
2

STRATEGIES TO REMOVE 5

Co2 from the Ocean

With fossil fuel byproducts proceeding to climb, numerous researchers, environmentalists and polic y-makers have pushed to make a move to eliminate carbon from the environment straightforwardly. They argue that these geoengineering approaches are important to keep away from disastrous changes to our land, air and ocean Analysts at UC St Nick Barbara are assessing the impacts of one such recommendation that includes expanding the ocean's alkalinity to help carbon sequestration. The point is to accelerate the geologic c ycles that eliminate carbon from the environment, which are exceptionally strong, but very slow The team investigated how this would affect two of the ocean's most numerous and important plankton groups at the bottom of the food chain It suggests that the plankton would fare well under the treatment, a positive result that encourages more research into this promising proposal.

Specialised Immune Cells

The discoveries of this study, which was reported in the Proceedings of the National Academy of Sciences journal, totally modify how we might interpret the resistant cell scene in a sound natural eye's cornea "By consolidating our recently evolved imaging method with other high-level logical methodologies, we had the option to find that a critical number of cells at the outer layer of the solid cornea are really Immune system microorganisms," said Professor Mueller. “Recently, these cells were erroneously named dendritic cells in light of static

Citrus Limon:

The major health advantages of lemon water are anecdotal. Although lemons have nutrients like vitamin C and antioxidants, the amount of lemon juice in a glass of water determines how many calories it has Lemons are a source of plant molecules called flavonoids, which have antioxidant and anti-inflammatory properties, as well as vitamin C, a potent antioxidant. Antioxidants accomplish this by scavenging free radicals, which are dangerous, disease-causing substances produced by oxidative stress in the body. D rinking lemon water first thing in the

8 7

imaging. This totally changes the ongoing creed in the field that main dendritic cells are available in the sound cornea." D ownie said that having the option to progressively catch the cell's typical way of behaving, and in light of irritation, gives novel comprehension of the safe reaction in the eye. We additionally caught different cell elements because of contact focal point wear and in unfavourably susceptible eye illness, and measured how these behaviours are modulated by drug treatments, said Associate Professor Downie.

morning stimulates the production of gastric juices, promoting better digestion. Lemon water is a great way to start the day with hydration. It's vital to make sure you consume enough water each day The pectin fibre in lemons can help curb cravings and promote weight loss. Lemon water has natural antibacterial properties, which can help to freshen the breath and prevent bad breath caused by bacteria Lemon water contains electrolytes like potassium, calcium and magnesium, which are essential for proper bodily functions, including heart health and muscle function.

in Glioblastoma Therapy

Glioblastoma, or GBM, is an aggressive type of brain tumour As per Colman, this is the most widely recognized sort of cancerous brain tumour in adults "Typically, when patients have a repeat of GBM, and you put them on another medication, the cancer just stays in line for one to two months." We are continually searching for bet ter medicines and doing clinical preliminaries to at tempt to recognize better approaches to assist our patients with GBM Currently, in phase 2, this clinical trial tested the utilization of two experimental agents for glioblastoma a novel viral treatment and a medication that enacts the immune system. This particular immunotherapy called a designated spot inhibitor, blocks proteins made by cancer cells that help them hide from a patient's own immune system

NSH SNIPPETS August 2023 37
A Breakthrough
6

snakes rarely become aggresive

Over the past few thousand years, snakes have had a poor rap. Snakes have long been mistrusted, if not outright feared, due to that one snake who tricked that sweet woman into eating an apple back in the day, dooming the entire human species to mortality. And while it is reasonable that people would be afraid of an animal that is capable of killing them, we believe that people should learn more about these interesting diverse animals, which can be anywhere from a few inches to 30 feet long and range from friendly and docile to aggressive and lethal.

Significance

The purpose of World Snake Day (16 July) is to raise public awareness of the various snake species that exist around the world. Snakes typically connote something bad We can certainly see why a lot of people are afraid of snakes, of course! Nobody enjoys the idea of being devoured by a snake, do they? Additionally, it's common to refer to people as snakes when they have two faces or act badly However, snakes are wonderful animals and play a crucial role in the environment we live in Did you know that there are over 3500 distinct species of snakes on the planet? Because of this, even if you are interested in snakes and have a pet snake of your own, it won't be difficult for you to locate a snake that intrigues and interests you that you may not have heard of before! Consequently, this is

one of the good reasons to study more about snakes nowadays. After all, there is a tonne of information available to you!

There are just about 600 poisonous snake species out of the 3,500 total species It's less than 25% of all snakes! There are just 200 snake species and many of them are dangerous to humans Therefore, despite what we would imagine, snakes are not nearly as dangerous or frightening. Naturally, this does not imply that you should approach and pet each snake you encounter! But it is certainly something to consider Maybe we treat these creatures worse than they deserve.

History

One of the earliest legendary creatures, the snake has long been honoured by cultures all across the world There are about 3,458 species of snakes known so far, ranging from the semi-frozen tundra of northern Canada to the steamy jungles of the equator and most of the world’s oceans. Since they are such

powerful predators, snakes are essential to preserving the harmony of nature in each of these domains Many people are unaware that current reptiles are actually the living, breathing cousins of dinosaurs. Snakes are remarkable in that they have an ancient pedigree, offering us a peek back to a prehistoric period when reptiles controlled the world

The species that appear to captivate individuals the most are the King Cobra, the biggest venomous snake on the planet the vast majority have been found in motion pictures being coaxed out of a bin by a snake charmer; the Rattlesnake, which has necessitated numerous victims to ingest its poison before it was too late. Furthermore, the Reticulated Python, the world's longest snake kills its prey by choking it.

Why we celebrate

Have you at any point contemplated having a pet snake? Snakes may not be the right pet for everybody, but rather on the off chance that you have it in you to

NSH WILD LIFE 38 August 2023

take on the test, it is to claim and really focus on a pet snake World Snake Day might be an ideal opportunity to go with that choice. If not, nonetheless, you can exploit this day to get familiar with a few additional about these mind-blowing creatures

Where do they live, what they will eat, how they will behave and defend themselves

Except for Antarctica, snakes can be found in the ocean, forests, deserts, prairies and even in your backyard or garage. Snakes consume a wide range of creatures including bugs little rodents and frogs. Snakes eat their prey entirely on the grounds that their lower jaw can isolate from the upper jaw. Exceptionally enormous snakes could in fact eat little deer,

pigs, monkeys and even primates Snakes depend on the climate to control their internal heat level They spend as much time as necessary in the warm sun to become warm and when they get too hot, they seek shade to cool off. Unless they are hunting or feel the need to defend themselves, they rarely become aggressive. They shed their skin three to six times each year Snakes utilize various procedures shielding themselves, including disguise, gnawing and envenoming those they feel are compromising them In some cases, they just twist up in a tight ball to ideally try not to be seen

Some snakes endangered

Fortunately, snakes aren't hunted a lot, but their numbers are still falling as a result of deforestation and climate change, which is changing their habitats and making it harder for them to find food

As referenced before, there is a wide range of different types of snakes, thus you can invest some energy in finding out about them and their different characteristics and highlights. For instance, the Barbados string snake is the smallest snake on the planet. This snake is really more modest than a nightcrawler, coming in at just roughly four inches. As far as the heaviest snake is concerned, this honour goes to the green anaconda. The reticulated python is the world's longest snake. We are confident that the outcomes will captivate you if you spend some time reading.

NSH WILD LIFE August 2023 39
- Raja Aditya
600 poisonous snake species out of the 3,500 total species. It's less than 25% of all snakes! There are just 200 snake species and many of them are dangerous to humans.

LUMINARIES

Scientists are an interesting breed of people, they are creative, adventurers, critical and pragmatic. This may not be the initial subset of people you would look to for inspiration.

If you put a key under the mat for the cops, a burglar can find it too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.

Cybercrime is the greatest threat to every company in the world

Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders.

Let’s face it: the future is now. We are already living in a cyber society, so we need to stop ignoring it or pretending that is not affecting us

In the very near future, cybersecurity exercises are going to be absolutely expected of all companies by regulators

Anything that says ‘smart’ in front of its name, is a potential magnet for trojans. The same goes for anything that is endorsed as ‘open source.

The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience

Do remember: "Cybersecurity is much more than an IT topic.

In the digital era, privacy must be a priority Is it just me, or is secret blanket surveillance obscenely outrageous?

NSH 40 August 2023
Tim Cook Ginni Rommety Ronald Reagan Marco Ciapelli Michael Vatis Abhijit Naskar Stephane Nappo Al Gore

SRINIVASA RAMANUJAN (1887-1920)

Srinivasa Ramanujan was an Indian mathematician who made significant contributions to the field of mathematics, particularly in number theory, infinite series and mathematical analysis He was born on December 22, 1887, in Erode, a small town in the state of Tamil Nadu, India Ramanujan's early life was marked by both brilliance and struggle.

Early Life and Education

Ramanujan's aptitude for mathematics became evident at a very young age He excelled in his studies, especially in mathematics, but faced financial difficulties that often hampered his education.

Due to financial constraints, he had to leave college before completing his degree Despite not having a formal education in mathematics, he independently studied advanced mathematical texts and continued to develop his mathematical skills

Struggles and Challenges

One of the major challenges Ramanujan faced was the lack of formal training and access to academic resources. He had to rely on library books and his own insights to explore mathematical concepts.

He faced rejections and skepticism from traditional mathematicians in India who were hesitant to accept his unconventional methods and results.

Ramanujan's personal life also presented challenges He married Janaki Ammal in 1909, and their early years were marked by poverty and health issues

Achievements

Ramanujan's breakthrough came when he began to correspond with British mathematician G H Hardy in 1913. Recognizing Ramanujan's talent,

Hardy invited him to Cambridge University in England in 1914

In England, Ramanujan's work received widespread attention and acclaim. His collaboration with Hardy led to groundbreaking results in number theory, partitions and modular forms

Ramanujan's most significant contributions include the Ramanujan-Hardy asymptotic formula for the partition function Ramanujan's sum, mock theta functions, and his work on modular forms and continued fractions.

In 1918, he was elected as a Fellow of the Royal Society, becoming the youngest person to achieve that honor at that time. Despite battling health issues, Ramanujan continued to produce remarkable mathematical results until his premature death on April 26, 1920, at the age of 32.

Legacy

Ramanujan's work has had a profound and lasting impact on mathematics, inspiring generations of mathematicians to explore the areas he investigated

The "Ramanujan Journal" and "Ramanujan Mathematical Society," as well as the annual "Ramanujan Prize" awarded by the International Centre for Theoretical Physics, are some examples of tributes to his legacy

His life and achievements has been the subject of numerous books, documentaries and even a biographical film titled "The Man Who Knew Infinity."

Srinivasa Ramanujan's life and contributions remain a testament to the power of human intellect, determination and creativity in the face of adversity. His work continues to shape the field of mathematics and serves as an inspiration to aspiring mathematicians worldwide.

NSH TRUE GENIUS August 2023 41

Science Quiz

1. Who is the father of cyber security?

2. W hat is a network of compute rs that are infected with malicious software and controlled by an attacker?

3. What is the unauthorized access to computer systems or networks called?

4. What is the fear of snakes called?

5. W hat is the instrume nt used to detect earthquakes?

6. W hat is the te rm for the area whe re freshwater and saltwater mix?

7. Which planet is known as the "Evening Star"?

8. W hich Indian crickete r is kno wn as "The Wall"?

9. W hich bone is commonly kno wn as the kneecap?

10. What is a software program that searches for and removes malware from a computer? (1)

Do you know ?

w Honeypots are decoy systems or networks designed to at tract hacke rs. The y can be used to study at tacke r behavior, gathe r intelligence and divert them away from real systems. When multiple hone ypots are connected, the y form a "Honeynet."

w Tardigrades, also known as water bears, are incredibly resilie nt creatures. The y can survive extre me conditions such as extreme temperatures, radiation and even the vacuum of space.

w The Indian mathe matician Shakuntala D e vi, also kno wn as the "Human Compute r," had exce ptional me ntal calculation abilities and holds a Guinness World Record for multiplying two 13-digit numbers within seconds.

w The distinct smell that ofte n accompanies rainfall is called "petrichor." It is caused b y the release of oils and che mical compounds from plants, rocks, and soil whe n the y come into contact with water.

w In chaos theory, the but te rfly effect states that a small change in one part of a system can have farreaching and unpredictable consequences in the future. This concept is often used to illustrate the sensitivity of complex systems to initial conditions.

NSH SCIENCE FACTS 42 August 2023
(2)
(3)
(4)
(5) Seismograph (6)
(7)
(8) Rahul Dravid (9)
(10)
Bob Thomas
Botnet
Hacking
Ophidiophobia
Estuary
Venus
Patella
Antivirus
Published On: 10th Of Every Month Place: Hyderabad

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.