Humanities/Arts Exam  >  Humanities/Arts Notes  >  Political Science Class 12  >  Worksheet: Security in the Contemporary World

Worksheet: Security in the Contemporary World | Political Science Class 12 - Humanities/Arts PDF Download

Fill in the Blanks

Q1: Security is freedom from __________.

Q2: According to the traditional view, most threats to a country's security come from __________ its borders.

Q3: Disarmament requires states to give up certain kinds of __________.

Q4: Human security focuses on the protection of __________ more than states.

Q5: Terrorism refers to political violence that targets __________ deliberately and indiscriminately.

Q6: Cooperative security may involve international cooperation at __________ levels.

Q7: India's first security strategy component involves strengthening its __________ capabilities.

Q8: The second component of India's security strategy aims to strengthen __________ norms and institutions.

Assertion and Reason Based

Q1: Assertion: Traditional notions of security focus primarily on external threats.
Reason: 
Military threats are considered the most significant danger to a nation's security.
(a) Both Assertion and Reason are true, and Reason is the correct explanation of the Assertion.
(b) Both Assertion and Reason are true, but Reason is not the correct explanation of the Assertion.
(c) Assertion is true, but Reason is false.
(d) Assertion is false, but Reason is true.

Q2: Assertion: Human security emphasizes protecting individuals over states.
Reason: 
Proponents of broad human security consider hunger, disease, and natural disasters as threats.
(a) Both Assertion and Reason are true, and Reason is the correct explanation of the Assertion.
(b) Both Assertion and Reason are true, but Reason is not the correct explanation of the Assertion.
(c) Assertion is true, but Reason is false.
(d) Assertion is false, but Reason is true.

Q3: Assertion: Cooperative security involves international cooperation at various levels.
Reason:
The use of force is the primary strategy in cooperative security.
(a) Both Assertion and Reason are true, and Reason is the correct explanation of the Assertion.
(b) Both Assertion and Reason are true, but Reason is not the correct explanation of the Assertion.
(c) Assertion is true, but Reason is false.
(d) Assertion is false, but Reason is true.

Very Short Answer Type Questions

Q1: Define security in the given context.

Q2: Name the three types of human rights mentioned in the text.

Q3: What does disarmament require states to do?

Q4: Explain the concept of cooperative security.

Q5: What is the focus of human security?

Q6: Name two health epidemics mentioned in the text.

Q7: What are the four components of India's security strategy?

Q8: What does terrorism target, according to the text?

Q9: What is the main concern for external security during the Cold War era?

Q10: What does internal security focus on, according to the text?

Short Answer Type Questions

Q1: Explain the traditional notions of external security mentioned in the text.

Q2: Describe the non-traditional notions of security mentioned in the text.

Q3: Explain the concept of cooperative security and its importance.

Q4: Describe India's security strategy components.

Q5: Explain the concept of human security according to the text.

Q6: Describe the new sources of threats mentioned in the text.

Q7: Discuss the role of disarmament and arms control in traditional security.

Q8: Explain the concept of confidence building in international relations.

Long Answer Type Questions

Q1: Discuss the evolution from traditional notions of security to non-traditional notions.

Q2: Explain the concept of cooperative security, its advantages, and challenges.

Q3: Describe the impact of new sources of threats on global security.

Q4: Examine India's security strategy components and their relevance in the contemporary world.

The document Worksheet: Security in the Contemporary World | Political Science Class 12 - Humanities/Arts is a part of the Humanities/Arts Course Political Science Class 12.
All you need of Humanities/Arts at this link: Humanities/Arts
34 videos|243 docs|52 tests

Top Courses for Humanities/Arts

FAQs on Worksheet: Security in the Contemporary World - Political Science Class 12 - Humanities/Arts

1. What is the role of cybersecurity in the contemporary world?
Ans. Cybersecurity plays a crucial role in the contemporary world as it focuses on protecting computer systems, networks, and data from unauthorized access, theft, or damage. With the increasing reliance on technology and the internet, cybersecurity ensures the confidentiality, integrity, and availability of information, thereby safeguarding individuals, organizations, and governments from cyber threats and attacks.
2. How can individuals protect themselves from online threats?
Ans. Individuals can protect themselves from online threats by following some preventive measures. They should regularly update their devices and software to ensure they have the latest security patches. Using strong and unique passwords, enabling two-factor authentication, and being cautious while clicking on suspicious links or downloading attachments can also enhance online security. Additionally, using a reliable antivirus software, being mindful of sharing personal information online, and practicing safe browsing habits are essential steps to protect oneself from online threats.
3. What are the common types of cyber attacks?
Ans. There are several common types of cyber attacks that individuals and organizations need to be aware of. Some examples include: 1. Phishing: This is a type of attack where attackers impersonate trustworthy entities to trick individuals into sharing sensitive information such as login credentials or financial details. 2. Malware: Malware refers to malicious software designed to harm or gain unauthorized access to a computer system. It includes viruses, worms, ransomware, and spyware. 3. Denial-of-Service (DoS) Attacks: DoS attacks aim to overwhelm a network or system, making it inaccessible to legitimate users by flooding it with excessive traffic or requests. 4. Man-in-the-Middle (MitM) Attacks: In MitM attacks, attackers intercept and tamper with communications between two parties without their knowledge. This allows them to eavesdrop, modify, or steal sensitive information. 5. Social Engineering: Social engineering involves manipulating individuals into revealing confidential information or granting unauthorized access by exploiting their trust, emotions, or lack of awareness. Understanding these common types of cyber attacks can help individuals and organizations better protect themselves from potential threats.
4. What are the potential consequences of a cybersecurity breach?
Ans. A cybersecurity breach can have severe consequences for individuals, organizations, and society as a whole. Some potential consequences include: 1. Data Theft: Cyber attackers can steal sensitive personal or financial information, leading to identity theft, financial loss, or unauthorized access to confidential data. 2. Financial Loss: Cyber attacks can result in financial loss for individuals and organizations due to theft of funds, disruption of business operations, or costs associated with recovering from the attack. 3. Reputation Damage: A cybersecurity breach can tarnish the reputation of individuals or organizations, leading to a loss of trust from customers, partners, or stakeholders. 4. Legal and Regulatory Consequences: Depending on the nature of the breach and the jurisdiction, there may be legal and regulatory consequences, including fines, penalties, or legal action. 5. Disruption of Services: A successful cyber attack can disrupt critical services, such as healthcare, transportation, or communication systems, affecting individuals' and society's well-being. It is crucial to prioritize cybersecurity measures to mitigate the potential consequences of a breach.
5. How can organizations enhance their cybersecurity posture?
Ans. Organizations can enhance their cybersecurity posture by implementing a comprehensive set of measures. Some important steps include: 1. Risk Assessment: Conducting regular risk assessments to identify potential vulnerabilities and threats specific to the organization's environment and operations. 2. Employee Training: Providing cybersecurity awareness training to employees to educate them about best practices, such as recognizing phishing emails, using strong passwords, and reporting suspicious activities. 3. Security Policies and Procedures: Establishing robust security policies and procedures that outline guidelines for data protection, access control, incident response, and employee responsibilities. 4. Regular Updates and Patching: Ensuring all software, applications, and systems are regularly updated with the latest security patches to address known vulnerabilities. 5. Network Security: Implementing firewalls, intrusion detection systems, and encryption technologies to protect the organization's network and data from unauthorized access. 6. Incident Response Plan: Developing an incident response plan that defines the steps to be taken in the event of a cybersecurity incident, including communication protocols, containment measures, and recovery strategies. By adopting a proactive and multi-layered approach to cybersecurity, organizations can significantly reduce the risk of cyber threats and protect their valuable assets and sensitive information.
34 videos|243 docs|52 tests
Download as PDF
Explore Courses for Humanities/Arts exam

Top Courses for Humanities/Arts

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Worksheet: Security in the Contemporary World | Political Science Class 12 - Humanities/Arts

,

Sample Paper

,

practice quizzes

,

Exam

,

Important questions

,

ppt

,

Worksheet: Security in the Contemporary World | Political Science Class 12 - Humanities/Arts

,

video lectures

,

Summary

,

shortcuts and tricks

,

Worksheet: Security in the Contemporary World | Political Science Class 12 - Humanities/Arts

,

past year papers

,

Extra Questions

,

study material

,

pdf

,

Viva Questions

,

Semester Notes

,

mock tests for examination

,

MCQs

,

Objective type Questions

,

Previous Year Questions with Solutions

,

Free

;