Cybersecurity in Digital India
نویسندگان
چکیده
In the age of information, communication, and technology, cybersecurity has evolved into a complex rapidly evolving security concern (ICT). Cyber threats seem likely to infiltrate every nook cranny national economies infrastructure as ICT dependence spreads across globe; in fact, increased use computers Internet-based networking been accompanied by an increase cyberattack incidents worldwide that target people, companies, governments. is also increasingly being viewed certain countries battlefield where strategic wars can be fought well asset used for reasons security. The importance current discussion examined this study, which deepens analysis considering field from standpoint India.
منابع مشابه
Studying the Tension Between Digital Innovation and Cybersecurity
With increasing economic pressures and exponential growth in technological innovations, companies are increasingly relying on digital technologies for innovation and value creation. But, with increasing levels of cybersecurity breaches, the trustworthiness of many established and new technologies is of concern. Consequently, companies are aggressively increasing cybersecurity of their existing ...
متن کاملLinking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...
متن کاملCybersecurity in health care.
395 ware-laden e-mail, the hospital took the precautionary step of temporarily shutting down its entire e-mail system. The shutdown gave IT staff time to quarantine malicious e-mail and to notify staff of the absolute importance of not clicking links or opening attachments without being certain that they were safe. And although having no e-mail was a minor inconvenience for most employees (and ...
متن کاملSocial Cybersecurity
............................................................................................................................................... 2 ACKNOWLEDGEMENTS ........................................................................................................................ 3 CHAPTER 1: INTRODUCTION AND MOTIVATION ...........................................................................
متن کاملKeyloggers in Cybersecurity Education
Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, often for malicious purposes. Keyloggers thus pose a major threat to business and personal activities such as Internet transactions, online banking, email, or chat. To deal with such threats, not only must users be made aware abo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal For Multidisciplinary Research
سال: 2022
ISSN: ['2582-2160']
DOI: https://doi.org/10.36948/ijfmr.2022.v04i06.1175