Cybersecurity in Digital India

نویسندگان

چکیده

In the age of information, communication, and technology, cybersecurity has evolved into a complex rapidly evolving security concern (ICT). Cyber threats seem likely to infiltrate every nook cranny national economies infrastructure as ICT dependence spreads across globe; in fact, increased use computers Internet-based networking been accompanied by an increase cyberattack incidents worldwide that target people, companies, governments. is also increasingly being viewed certain countries battlefield where strategic wars can be fought well asset used for reasons security. The importance current discussion examined this study, which deepens analysis considering field from standpoint India.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Studying the Tension Between Digital Innovation and Cybersecurity

With increasing economic pressures and exponential growth in technological innovations, companies are increasingly relying on digital technologies for innovation and value creation. But, with increasing levels of cybersecurity breaches, the trustworthiness of many established and new technologies is of concern. Consequently, companies are aggressively increasing cybersecurity of their existing ...

متن کامل

Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism

To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...

متن کامل

Cybersecurity in health care.

395 ware-laden e-mail, the hospital took the precautionary step of temporarily shutting down its entire e-mail system. The shutdown gave IT staff time to quarantine malicious e-mail and to notify staff of the absolute importance of not clicking links or opening attachments without being certain that they were safe. And although having no e-mail was a minor inconvenience for most employees (and ...

متن کامل

Social Cybersecurity

............................................................................................................................................... 2 ACKNOWLEDGEMENTS ........................................................................................................................ 3 CHAPTER 1: INTRODUCTION AND MOTIVATION ...........................................................................

متن کامل

Keyloggers in Cybersecurity Education

Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, often for malicious purposes. Keyloggers thus pose a major threat to business and personal activities such as Internet transactions, online banking, email, or chat. To deal with such threats, not only must users be made aware abo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal For Multidisciplinary Research

سال: 2022

ISSN: ['2582-2160']

DOI: https://doi.org/10.36948/ijfmr.2022.v04i06.1175