Cyber security plays an important role in the field of Information Communication and Technology. Securing information have become the major challenges in the present day. As the dependence on ICT is deepening across the globe, cyber threats appear likely to penetrate every nook and corner of national economies and infrastructure indeed, the growing dependence on computers and Internet based networking has been accompanied by increased cyber attack incidents around the world, targeting individuals, businesses, and governments. Meanwhile, ICT is increasingly being seen by some governments as both a strategic asset to be exploited for the purposes of national security and as a battlefield where strategic conflicts can be fought. This paper examines the primacy of cyber security in the contemporary security debate, deepening the analysis by looking at the domain of cyber security from the perspective of India. Dr. S. Krishnan | Yogesh Kalla "Cyber Security Challenges and Emerging Trends" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47939.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/47939/cyber-security-challenges-and-emerging-trends/dr-s-krishnan
INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.
Protection of critical information infrastructureNeha Agarwal
Information Infrastructure is the term usually used to describe the totality of inter-connected computers and networks, and information flowing through them. Certain parts of this Information Infrastructure, could be dedicated for management / control etc of infrastructure providers’ e.g. Power generation, Gas/oil pipelines, or support our economy or national
fabric e.g. Banking / Telecom etc. The contribution of the services supported
by these infrastructures, and more importantly, the impact of any sudden
failure or outage on our National well being or National Security marks them as being Critical.
By extension, information infrastructure supporting the operations of Critical Infrastructure (CI) marks this as Critical Information infrastructure (CII). These Networks operate/monitor and control important Governmental and Societal functions and services including, but not limited to, Power (Generation/transmission/ distribution etc), Telecommunication (mobile/landline/internet etc), Transportation (Air/land/rail/sea etc), Defence etc. These CII are becoming increasingly dependent on their information infrastructure for information management, communication and control functions.
INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.
Protection of critical information infrastructureNeha Agarwal
Information Infrastructure is the term usually used to describe the totality of inter-connected computers and networks, and information flowing through them. Certain parts of this Information Infrastructure, could be dedicated for management / control etc of infrastructure providers’ e.g. Power generation, Gas/oil pipelines, or support our economy or national
fabric e.g. Banking / Telecom etc. The contribution of the services supported
by these infrastructures, and more importantly, the impact of any sudden
failure or outage on our National well being or National Security marks them as being Critical.
By extension, information infrastructure supporting the operations of Critical Infrastructure (CI) marks this as Critical Information infrastructure (CII). These Networks operate/monitor and control important Governmental and Societal functions and services including, but not limited to, Power (Generation/transmission/ distribution etc), Telecommunication (mobile/landline/internet etc), Transportation (Air/land/rail/sea etc), Defence etc. These CII are becoming increasingly dependent on their information infrastructure for information management, communication and control functions.
Il 9 maggio 2023 Vincenzo Calabrò ha tenuto una lezione per lo Sviluppo delle competenze digitali dal titolo: La cybersecurity e la protezione dei dati presso la Scuola Nazionale dell'Amministrazione.
https://www.vincenzocalabro.it
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
What is Information Security?
Information security means that the confidentiality, integrity and availability of information assets is maintained.
Confidentiality: This means that information is only used by people who are authorized to access it.
Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.
Availability: This means that the information is accessible when authorized users need it.
Information Security Threats:
Most common types of information security threats are:
Theft of confidential information by hacking
System sabotage by hackers
Phishing and other social engineering attacks
Virus, spyware and malware
Social Media-the fraud threat
Theft of Confidential Information:
One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP).
Theft of Employee Information
Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.
Piracy/copyright infringement.
Corporate business strategies including marketing strategies, product introduction strategies.
System Sabotage:
What is system sabotage?
Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system.
Who would perpetrate it?
System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.
The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
Phishing:
To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as:
Opening bank accounts in victim’s name
Applying for loans in victim’s name
Applying for credit cards in victim’s name
Obtaining medical services in victims name (e-death)
Other kind of more sophisticated social engineering attacks include spear-phishing.
Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
Other threats include:
Smishing: Phishing via SMS (texting)
Vishing: Phishing via voice (phone)
Mobile hackin
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
The case studies in this presentation are real life examples of ransomware attacks on health care organizations, and are intended to help physicians respond appropriately for when this type of cyber crime occurs.
Know about the 2019 latest Top 10 types of Cyber Security threats against enterprises. Malware phishing schemes attacks on industrial systems. Every IT person should know the top 10 cyber threat.
Presentation made by Dr Tabrez Ahmad in Biju Pattanaik State Police Academy Bhubaneswar. To train DSP,s on Cyber Crime Investigation and Cyber Forensics.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
This presentation is designed to give an insight into cyber risk.
The importance of protecting your data has never been more significant. Every week the media features stories of companies suffering data breeches leading to financial difficulties and unhappy customers.
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide. M. Swetha | L. Prabha | S. Rajadharani "Cyber Security Intelligence" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29261.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29261/cyber-security-intelligence/m-swetha
Il 9 maggio 2023 Vincenzo Calabrò ha tenuto una lezione per lo Sviluppo delle competenze digitali dal titolo: La cybersecurity e la protezione dei dati presso la Scuola Nazionale dell'Amministrazione.
https://www.vincenzocalabro.it
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
What is Information Security?
Information security means that the confidentiality, integrity and availability of information assets is maintained.
Confidentiality: This means that information is only used by people who are authorized to access it.
Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.
Availability: This means that the information is accessible when authorized users need it.
Information Security Threats:
Most common types of information security threats are:
Theft of confidential information by hacking
System sabotage by hackers
Phishing and other social engineering attacks
Virus, spyware and malware
Social Media-the fraud threat
Theft of Confidential Information:
One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP).
Theft of Employee Information
Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.
Piracy/copyright infringement.
Corporate business strategies including marketing strategies, product introduction strategies.
System Sabotage:
What is system sabotage?
Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system.
Who would perpetrate it?
System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.
The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
Phishing:
To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as:
Opening bank accounts in victim’s name
Applying for loans in victim’s name
Applying for credit cards in victim’s name
Obtaining medical services in victims name (e-death)
Other kind of more sophisticated social engineering attacks include spear-phishing.
Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
Other threats include:
Smishing: Phishing via SMS (texting)
Vishing: Phishing via voice (phone)
Mobile hackin
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
The case studies in this presentation are real life examples of ransomware attacks on health care organizations, and are intended to help physicians respond appropriately for when this type of cyber crime occurs.
Know about the 2019 latest Top 10 types of Cyber Security threats against enterprises. Malware phishing schemes attacks on industrial systems. Every IT person should know the top 10 cyber threat.
Presentation made by Dr Tabrez Ahmad in Biju Pattanaik State Police Academy Bhubaneswar. To train DSP,s on Cyber Crime Investigation and Cyber Forensics.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
This presentation is designed to give an insight into cyber risk.
The importance of protecting your data has never been more significant. Every week the media features stories of companies suffering data breeches leading to financial difficulties and unhappy customers.
Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide. M. Swetha | L. Prabha | S. Rajadharani "Cyber Security Intelligence" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29261.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29261/cyber-security-intelligence/m-swetha
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cyber security is a potential activity by which information and other communication systems are protected from and or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. Gajendra Kumar Malviya "Cyber Crime and Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49888.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49888/cyber-crime-and-cyber-security/gajendra-kumar-malviya
Information Risk Insurance Concept and Basic Aspectsijtsrd
The article discusses the essence and history of the emergence of information insurance, identifies the stages, features and problems of the development of insurance of information risks at the present time. The article touches upon such an urgent topic for modern reality as insurance of information risks. Analyzed the characteristic features and the need for this type of insurance. The author considers insurance as the main financial method of information risk management. Particular attention is paid to information risks and their insurance. The work describes in detail the objects of insurance, types of insurance risks. The insurance contract is considered, the main stages of its life cycle are reflected. Holboev A. Yu. "Information Risk Insurance: Concept and Basic Aspects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47910.pdf Paper URL: https://www.ijtsrd.com/management/other/47910/information-risk-insurance-concept-and-basic-aspects/holboev-a-yu
Safeguarding the Digital Realm: The Importance of Cybersecurity
Introduction:
In our increasingly interconnected world, cybersecurity has emerged as a critical concern for individuals, organizations, and governments alike. The pervasive nature of technology and the rapid digitization of various sectors have brought about numerous benefits, but they have also introduced unprecedented risks and vulnerabilities. As cyber threats continue to evolve in sophistication and scale, it is crucial to understand the significance of cybersecurity and adopt effective measures to protect our digital infrastructure.
The Ever-Present Cyber Threat Landscape:
Cyberattacks come in various forms, including data breaches, malware infections, ransomware attacks, phishing scams, and more. The motives behind these attacks range from financial gain to espionage, activism, and even geopolitical warfare. The digital landscape is teeming with hackers, criminal syndicates, and state-sponsored actors who constantly seek to exploit vulnerabilities in computer systems and networks. The impact of successful cyberattacks can be devastating, causing financial losses, reputational damage, and compromising personal privacy.
Protecting Sensitive Data:
One of the primary objectives of cybersecurity is to safeguard sensitive information. This includes personal data, financial records, intellectual property, and classified government documents. Robust encryption algorithms, secure authentication protocols, and effective access controls are essential components of protecting data from unauthorized access. Additionally, data backup and disaster recovery strategies play a crucial role in ensuring that information remains intact and accessible even in the event of a breach.
Securing Critical Infrastructure:
Cybersecurity is not limited to protecting personal information or corporate data; it also extends to safeguarding critical infrastructure. Industries such as energy, transportation, healthcare, and finance heavily rely on interconnected networks to function effectively. A breach in these sectors could result in catastrophic consequences, ranging from power outages and disruptions in transportation systems to compromised patient records and financial instability. Consequently, robust cybersecurity measures must be implemented to protect these vital systems from malicious actors.
Building a Cyber-Resilient Culture:
While technological solutions play a significant role in cybersecurity, an equally important aspect is fostering a cyber-resilient culture. This involves educating individuals and organizations about the risks, promoting good cyber hygiene practices, and cultivating a mindset of vigilance. Regularly updating software, using strong and unique passwords, enabling multi-factor authentication, and being cautious of suspicious emails or links are some of the fundamental steps to bolster cybersecurity defenses. Organizations should prioritize employee training programs and e
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
ARTICLE IN PRESS
Contents lists available at ScienceDirect
Telecommunications Policy
Telecommunications Policy 33 (2009) 706–719
0308-59
doi:10.1
� Cor
E-m
URL: www.elsevierbusinessandmanagement.com/locate/telpol
Cybersecurity: Stakeholder incentives, externalities,
and policy options
Johannes M. Bauer a,�, Michel J.G. van Eeten b
a Department of Telecommunication, Information Studies, and Media; Quello Center for Telecommunication Management and Law,
Michigan State University, East Lansing, Michigan, USA
b Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands
a r t i c l e i n f o
Keywords:
Cybersecurity
Cybercrime
Security incentives
Externalities
Information security policy
Regulation.
61/$ - see front matter & 2009 Elsevier Ltd. A
016/j.telpol.2009.09.001
responding author. Tel.: þ1 517 432 8003; fax:
ail addresses: [email protected] (J.M. Bauer), m
a b s t r a c t
Information security breaches are increasingly motivated by fraudulent and criminal
motives. Reducing their considerable costs has become a pressing issue. Although
cybersecurity has strong public good characteristics, most information security
decisions are made by individual stakeholders. Due to the interconnectedness of
cyberspace, these decentralized decisions are afflicted with externalities that can
result in sub-optimal security levels. Devising effective solutions to this problem is
complicated by the global nature of cyberspace, the interdependence of stakeholders, as
well as the diversity and heterogeneity of players. The paper develops a framework for
studying the co-evolution of the markets for cybercrime and cybersecurity. It examines
the incentives of stakeholders to provide for security and their implications for the ICT
ecosystem. The findings show that market and non-market relations in the information
infrastructure generate many security-enhancing incentives. However, pervasive
externalities remain that can only be corrected by voluntary or government-led
collective measures.
& 2009 Elsevier Ltd. All rights reserved.
1. Introduction
Malicious software (‘‘malware’’) has become a serious security threat for users of the Internet. Estimates of the total cost
to society of information security breaches vary but data published by private security firms, non-profit organizations, and
government, all indicate that their cost is non-negligible and increasing. From a societal point of view, not only the direct
cost (e.g., repair cost, losses due to fraud) but also indirect costs (e.g., costs of preventative measures) and implicit costs
(e.g., slower productivity increases due to reduced trust in electronic transactions) have to be attributed to information
security breaches. Bauer, Van Eeten, Chattopadhyay, and Wu (2008) in a meta-study of a broad range of research conclude
that a conservative estimate of these costs may fall between 0.2% and 0.4% of global GDP. A catastrophic security fail ...
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on the latest about cyber security techniques, ethics and the trends changing the face of cyber security. This paper mainly focuses on cyber Security and its fundamental elements on latest technologies. Aye Mya Sandar | Ya Min | Khin Myat Nwe Win "Fundamental Areas of Cyber Security on Latest Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26550.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26550/fundamental-areas-of-cyber-security-on-latest-technology/aye-mya-sandar
Cyberspace is rapidly transforming our lives – how we live, interact, govern and create value. With the JAM (Jan Dhan, Aadhaar and Mobile) trinity, India is at the forefront of global digital transformation. “Digital India” is being hailed as the world's largest technology led programme of its kind.
While internet, smartphones and modern information and
communication devices have been great force multipliers, endless connectivity and proliferation of IoT devices is giving rise to vulnerabilities, risks and concerns. Cyber security is today ranked among top threats by governments and corporates. Heightened concerns about data security and privacy have resulted in a spate of regulations in India and across the world. India is in the process of discussing and enacting its own comprehensive data security and privacy regulation, as well as vertical specific ones. Cyber security is an ecosystem where laws, organisations, skills, cooperation and
technical implementation would need to be in harmony to be
effective.
Overall, a robust regulatory framework based on global and
country-specific regulations, development of a holistic cyber
security eco-system (academia and industry as well as
entrepreneurial) and a coordinated global approach through
proactive cyber diplomacy would help to secure cyber space and promote confidence and trust of key stakeholders including
citizens, businesses, political and security leaders.
CII has been actively working in the cyber security space. The CII Task Force on Public Private Partnership for Security of the Cyber Space has been set up to bring about improvements in the legal framework to strengthen and maintain a safe cyberspace ecosystem by capacity building through education and training programmes. We would facilitate collaboration and cooperation between Government and Industry in the area of cyber security in general and protection of critical information infrastructure in particular, covering cyber threats, vulnerabilities, breaches, potential protective measures, and adoption of best practices.
The Cyberspace and Intensification of Privacy Invasioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 843
cyberterrorism, cyberthreats, privacy issues,
cybercrime, and cyberwarfare.
Securing networks, files, services, and other
information from unsupervised or unapproved users,
alteration, or destruction is the most basic concept of
cyber security. Because of recent cyber-attacks all
over the world, cyber security is becoming
increasingly important. Many businesses create data
security tools. It alludes to the protections set up to
hold information back from being taken, hacked, or
focused on.
Various layers of safeguard through PCs, machines,
organizations, and projects make up a decent network
protection system. Then again, a powerful network
safety system doesn’t depend entirely on cyber
defense technology; it likewise comes down to
individuals settling on wise digital safeguard choices.
The essential objective of the innovation created by
organizations is to defend the information in their
frameworks. Cyber security not only ensures safe data
but also prevents virus attacks. After the United
States and China, India has the third-largest number
of internet users.
In the second decade of the twenty-first century,
cyberthreats are evolving and increasing at a fast
pace. They are still initiated by criminal actors but
also come from new sources, such as foreign states
and political groups, and may have motivations other
than money making. These latter may include some
types of “hacktivism” in the name of a political cause,
political destabilisation (e.g., Estonia in 2007),
cyberespionage, sabotage (e.g., Stuxnet), and even
military operations (OECD 2012, 12). The
sophistication of cybercriminals, the emergence of
cyberespionage, as well as the well-publicised
activities of hacker collectives have combined to
create the impression that cyberattacks are becoming
more organised and that the degree of sophistication
has increased significantly, showing clear signs of
professionalisation.
Given this backdrop, states have increasingly
recognized cybersecurity as a top security issue, one
that will only grow in importance as time goes on
(Cavelty 2012). At the same time, cybersecurity has
emerged as a national policy priority to be
approached in a holistic manner, encompassing
economic, social, educational, legal, law-
enforcement, technical, diplomatic, military, and
intelligence-related aspects. “Sovereignty
considerations” have become increasingly important
Types of cyber security
It's essential to analyze forms of cyber security in
order to be properly secured-
Critical infrastructure security- The need to defend
a country's fundamental framework, like food and
farming or transportation, is known as critical
infrastructure protection (CIP). Each administration in
each nation is liable for shielding these crucial
framework resources from catastrophic events, fear-
monger assaults, and, increasing cyber dangers.
Critical infrastructure organizations should have a
strong framework set up that can foresee and forestall
disaster through their whole basic framework setting.
Network security- In its most fundamental structure,
it is an assortment of decides and conventions that
utilization both programming and equipment
innovation to ensure the security, privacy, and
availability of PC organizations and information. Any
business, paying little mind to its scale, area, or
framework, needs network safety efforts to defend
itself from the ever-increasing spectrum of cyber
threats that exist today. Network security can deal
with network traffic all the more successfully,
improve network solidness, and guarantee safe
information trade among representatives and
information sources as well as ensuring resources and
the respectability of information from outside abuses.
Application security- Application security is the way
of forming, integrating, and evaluating security
features into applications to shield them from threats
like illegal disclosure and alteration. Application
security alludes to security steps taken at the
application level to stay away from the robbery or
seizing of information or code inside the product. It
includes securitysuggestions made during application
examination and execution, as well as frameworks
and methods for protecting apps after they've been
released.
Information security- Information security, or
infosec, is centered on forestalling unapproved
admittance to frameworks. It is a part of information
hazards the executives that involve halting or decline
the chance of unapproved entry, usage, leakage,
interruption, elimination, abuse, alteration, inspection,
or recording. Information security specialists are
dynamic in handling the reasons for a security
incident if one occurs. Remember that information
might be electronic, physical, or immaterial.
Cloud security- Cloud security, also referred to as
cloud computing security, is a collection of plans,
regulations, protocols, and innovations which
function together just to safeguard cloud-based
applications, data, and networks. One of the benefits
of utilizing cloud storage and encryption is that it
eliminates the need for dedicated equipment. Not
exclusively will this get a good deal on capital, but it
also saves money on operating costs. While
3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 844
previously, IT groups needed to manage security
issues as they emerged, cloud security gives proactive
security capacities that give protection 24/7.
Data loss prevention- The word “data leakage
protection” applies to protecting organizations against
security breaches and leaks. A ransom ware attack,
for example, is an illustration of information
misfortune. The aim of data loss prevention is to
safeguard information from being transferred outside
of the organization. Establishing a DLP technique
will uncover how information is utilized by partners.
To get secret data, organizations should initially
comprehend what it is, the place where it is kept, who
utilizes it, and why. Organization used it for protect
Intellectual Property critical for the organization.
End-user education- Perceives that digital insurance
programs are similarly pretty much as great as
individuals who use them. End-user education entails
instructing clients on prescribed procedures, for
example, not tapping on obscure connections or
opening dubious attachments in emails, all of which
may empower malware and other noxious
programming to penetrate the framework. Once
installed, it awards admittance to the end client’s PC,
which is utilized as a dispatch point for get-together
organization information and growing organization
control. On account of the genuine outcomes, it’s
significant that end clients comprehend the most
mainstream techniques that cyber criminals
compromise them.
Scale of cyber security threats
Viruses used during cyber-attacks include malware,
spyware, ransomware, fraud, phishing, and others.
When a computer user has clicked on compromised
web pages, links, malicious websites, or unwittingly
downloads harmful software, attackers can easily
grant access to that person's computer networks.
Cyber security is critical in avoiding some of the most
difficult and egregious crimes, such as blackmail,
fraudulent purchases from another account, and
confidential data leakage.
It's vital to comprehend the three types of network
safety dangers: cyber-crime, cyber-attacks, and cyber-
terrorism in order to better secure yourself.
One or more people perpetrate cybercrime against
your framework to make interruption or
accomplish monetary benefit.
Cyber attacks are frequently done for political
purposes and they might be proposed to catch and
spread private information.
Cyber terrorism is a type of psychological
warfare that includes breaking into electronic
organizations to cause frenzy and dread among its
objectives.
Cyber Security Techniques:
Cyber-attacks on cyberspace can grow by capitalizing
on new techniques. Cybercriminals will most
frequently change the current malware signatures to
take advantage of new technical faults. In other
instances, they actually search for special features of
emerging technology to detect weaknesses in
malware injection. Cyber criminals are taking
advantage of emerging Internet technology and
millions and billions of active users to access a huge
amount of people easily and effectively using these
new technologies.
Access Control and Password Security: Security
provided by the means of username and password is a
simple way of providing security for the private
information to preserve privacy. This means of
providing security is one of the most critical cyber
security initiatives.
Authentication of Data: Until the transmitted
information need to be attested that it has come from
a reputable supply that was not changed. These
documents are often authenticated using a gift from
the opposing virus software package inside
computers. An honestly opposed virus software
package is more essential to protect devices from
viruses.
Malware Scanners: A software system which
sometimes scans all files and documents for
malicious code or harmful viruses inside the system.
The samples of malicious software systems in this
field are generally sorting and noted as malware by
viruses, worms, and the Trojan horses.
Firewall: Firewall is a software or hardware package
which helps separate hackers, viruses and worms
trying to access your PC through the web .The
firewall checks all messages that come in and blocks
those that fail to meet the security requirements
compatible with all messages .Firewalls plays a very
vital role in malware detection.
Role of Social Media in Cyber Security: In recent
modern world, there is a need of interactive
businesses which needs to find new ways to secure
personal information in more entangled environment.
Social media has important role to play in cyber
security and in personal cyber-attacks. Adoption of
social media among employees is growing and threat
of attack is therefore increasing since most of them
nearly use social media or social networking sites
everyday it is now a massive forum for cyber
criminals to hack private information and steal valued
information. In recent days, it’s very easy to share
4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 845
personal information easily and businesses must make
sure that recognise, react in real time and prevent
breaches of any kind as quickly as possible. These
social media has easily make people to share their
private information and hackers can use these
information. Therefore, people have to take
reasonable steps to avoid misuse and loss of their
information through these social media.
Cybersecurity in India: Background
In the Indian context, the issue of cybersecurity has
received relatively little attention from policymakers,
to the extent that the government has been unable to
tackle the country’s growing needs for a robust
cybersecurity apparatus. In short, India lacks effective
offensive and defensive cybersecurity capabilities,
exacerbated by the lack of access to mechanisms vital
to confronting sophisticated malware like Stuxnet,
Flame, and Black shades (Kaushik 2014). Moreover,
cybersecurity projects and initiatives in India are far
fewer in number as compared to other developed
nations. Many of the relevant projects proposed by
the Indian government have remained on paper only.
In addition, approved projects like the National
Critical Information Infrastructure Protection Centre
(NCIPC) and National Cyber Coordination Centre
(NCCC) of India have failed so far to materialize.
Worse, the 2013 National Cyber Security Policy of
India has failed to bear fruitful results, as its
implementation seems to be weak in numerous
aspects, including privacy violation in general and
intrusion into civil liberties in particular.
At the same time, India faces a vital need to protect
critical infrastructures such as banks, satellites,
automated power grids, and thermal power plants
from cyberattacks (Kaushik 2014). Indeed, the Indian
government has admitted that there has been a large
spike in cyberattacks against establishments such as
the banking and financial services sector. Malicious
activity on the Internet in India has ranged from
viruses, hacking, identity theft, spamming, email-
bombing, web defacement, cyber defamation, to the
denial of service.
For example, even though the country ranks eighty-
fifth in net connectivity compared to other countries
globally, it holds the seventh spot in terms of
cyberattacks (Express News Service 2014).
Strikingly, the number of cyberattacks rose from 23
in 2004 to 62,000 by mid2014 (The Economic Times
2014a). The year 2013 alone saw a 136 percent
increase in cyberthreats and attacks against
government organizations as well as a 126 percent
increase in attempts against Indian financial services
organizations (Athavale 2014). Approximately 69
percent of attacks have targeted large enterprises
(IANS 2014). Finally, according to a report by
security software-maker Symantec, four out of ten
attacks in 2014 were carried out on nontraditional
services industries like business, hospitality, and
personal services (Indo-Asian News Service 2014). A
clear need, therefore, exists for India to develop an
effective cybercrisis management plan, in order to
address these and similar challenges.
Cyber Security in India:
In-Depth The IT sector in India has emerged as one of
the most significant catalysts for the country’s
economic growth, and as an integral part of the
country’s business and governance. The sector is
positively influencing the lives of Indian citizens
through direct or indirect contribution to the
improvement of several socio-economic parameters,
such as the standard of living, employment, and
diversity. In addition, IT has played a key role in
transforming India into a global player in providing
business services as well as world-class technology
solutions (DEITY 2011).
At the same time, the growth of the IT sphere has
been accompanied by a tremendous and increasing
need to secure the computing environment, as well as
the necessity to build adequate confidence and trust in
this sector (DEITY 2012). For example, most
financial institutions as well as the banking industry
have incorporated IT in their operations, opening up
countless opportunities for growth while at the same
time making these institutions vulnerable to
cyberattacks in their daily activities and making the
evident absence of strategies to deal with these types
of threats particularly worrisome (Jain 2014).
For its part, the governmental sector has facilitated
the increased adoption of IT-enabled services and
programs, such as the Unique Identification
Development Authority of India (UIDAI) and
National e-Governance Programs (NeGP), creating a
large-scale IT infrastructure and promoting corporate
participation. Critical areas such as defence, finance,
energy, telecommunication, transport, and other
public services currently heavily depend on computer
networks to relay data for commercial transactions as
well as a source of information and for
communication purposes. To date, the government
has ambitious plans to further raise ecommerce
services, cyber connectivity, and to generally enhance
the use of IT in communications. Indian Prime
Minister Narendra Modi’s statement that “the cabinet
has approved the ambitious ‘Digital India’
programme that aims to connect all gram panchayats
by broadband internet, promote e-governance and
transform India into a connected knowledge
economy” is typical in this regard (The Economic
5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 846
Times 2014b). All of this governmental investment in
the new technologies militates for the adoption of
strong policies to provide robust security to these
sectors (Verma and Sharma 2014).
Particularly worthy of note, an increased reliance on
IT has made the systems supporting India’s critical
defence and intelligence community vulnerable to
cyberattacks. Indeed, attacks on government
machinery carry the increased threat of theft of
military secrets and state secrets (Aiyengar 2010).
Unsurprisingly, then, several organisations within the
ambit of the Indian Ministry of Defence have taken
on the responsibility of dealing with cybersecurity.
For instance, in 2005 the Indian Army formed the
Cyber Security Establishment to protect the army’s
networks at the division level as well as to conduct
safe cybersecurity audits (Pandit 2005). Also, in 2010
the army established a cybersecurity laboratory at the
Military College of Telecommunications Engineering
in Madhya Pradesh, with a view to provide officers
with specialised training in security protocols for its
signal as well as data transmission networks
(Governance Now 2010).
Energy and Cybersecurity
Securing the energy sector has emerged as a critical
non-traditional security issue for India. The country
ranks fourth in the world in terms of primary energy
consumption; at the same time, the average level of
consumption per capita is very low (TERI 2013). Due
to insufficient regulation of information sharing and
incomplete institutions to facilitate it, information on
cyberattacks and equipment vulnerabilities in the
Indian energy sector is nearly non-existent. But we
can suppose from trends in international cybersecurity
that the sector is increasingly targeted by the
sophisticated attacks, particularly as India has
embarked on linking it with modern technologies in
order to meet growing energy needs (Walstrom
2016).
Indeed, with the advent of new technologies in this
sector, several challenges began to appear on the
scene. For instance, after India’s nuclear test in May
1998, a group of hackers posted anti-India and anti-
nuclear messages on the website of Bhabha Atomic
Research Center (BARC) (Patil and Bhosale 2013). In
addition, an online hacker called Phr OzenMyst
hacked the official website of BARC and leaked some
of its sensitive information; the attack was meant as a
protest against ongoing government operations in the
occupied part of Kashmir (The Pioneer 2013).
Furthermore, the critical infrastructure supporting
every economic activity in India is fully dependent on
the power sector; the dependence of this sector on
ICT has highlighted several cybersecurity challenges.
It is estimated that the period from 1994 to 2004
witnessed around 60 percent of all cyberattacks on the
automatic power grids in India (Kumar et al. 2013).
More recently, on July 30 and 31 2012, northern India
witnessed a severe blackout that affected nearly 670
million people’s normal life and work (Shuran et al.
2013), damaging all services in the region, including
road traffic and railways. Chaos broke out on the
roads as traffic lights and systems that supported them
stopped working, with the police unable to cope with
the situation. Simultaneously, there were reports of
devastating fires and explosions in major refineries,
with extensive damage and loss of life, all while
pipelines were ruptured and oil flow was disrupted
(IDSA 2012).
Defence and Cybersecurity
India has an extensive defence industrial base and
maintains the third-largest armed forces in the world
(KPMG 2010). At the same time, it has linked its
defence sector with the new technologies, in the
process opening the country up to a set of ever-
evolving threats due to a dependence on these
technologies and the reliance on integrating networks.
For instance, in 2012 a cyberattack was launched by
hackers against the Indian Navy’s eastern command
computer systems which oversee the testing of India’s
ballistic missile submarines and maritime activities in
the South China Sea. The naval computers were
infected by a virus that secretly collected confidential
documents and files and transmitted them to Chinese
IP addresses.
While Indian officials have yet to disclose the type of
information that was targeted in this attack (Pubby
2012), the Navy is not the only Indian defence
institution to have faced such adverse events — the
National Security Agency (NSA) and the Air Force
have proved to be vulnerable as well. In 2010 the
hackers targeted the NSA’s office as well as several
computers of the Indian Air Force, opening up
numerous small windows through which classified
files and documents were stolen (Unnithan 2012). In
the same year, the country witnessed the biggest
cyberattack yet, in which more than 10,000 email
addresses of the top government officials were
hacked, particularly military officials, the Prime
Minister’s Office (PMO), defence, home ministries,
external affairs, and intelligence agencies (Singh
2012).
Finance and Cybersecurity
India is one of the fastest growing economies in the
world, with the adoption of IT acting as a catalyst
behind this significant growth. But this reliance on IT
has come at the cost of new vulnerabilities. It has
generally been argued that the root cause of most
6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 847
cyberattacks is monetary or financial gain (KPMG
2014). Indeed, the complexityof modern banking and
financial services makes them vulnerable to
cyberattacks from both state as well as non-state
actors (Singh 2013). The interconnective nature of
modern technologies has exacerbated the problem,
creating widespread opportunities for fraud, theft, and
other forms of exploitation (Bamrara et al. 2013).
Recognizing this, former Indian Telecom Minister,
Kapil Sibal has said that “cybersecurity is critical for
economic security, and any failure to ensure
cybersecurity will lead to economic destabilisation”
(Singh 2013)
Over the past few years the financial sector in India
has seen a rise in network security breaches, data
losses, identity thefts, data thefts, and other white-
collar crimes, causing the banking industry to incur
huge losses, in amounts far exceeding conventional
methods of bank robbery. For instance, in 2013
cyberattacks in India resulted in huge financial loses
for Indian companies in the amount of nearly four
billion dollars. A year later, financial losses from such
attacks had increased by 30 percent. It is also
estimated that India is among the world’s top five
countries in terms of incidence of cybercrime such as
identity theft (11percent), ransomware (11 percent),
and phishing (9 percent) (The Hindu 2013). In
addition, the Reserve bank of India (RBI) has
released data on commercial banks being targeted for
the purpose of fraud, for example through Internet
banking and ATM (debit/credit) cards. The number of
such cases rose from approximately 4,049 lakhs in
2010 to 5267 lakhs in 2012 (Madaan 2013). In these
circumstances, the need for India to develop a
comprehensive cybersecurity strategy to fully
guarantee protection for the financial sector becomes
self-evident
What would you do to better defend yourself from
cyber-attacks?
Never open connections or associations in
messages from obscure senders. Messages
distinguished as sent by somebody you trust are
perhaps the most mainstream ways for
organizations and users to be exposed to malware
and viruses.
Just make sure your gadgets are up to date.
Fundamental security fixes are remembered for
programming refreshes. Digital hoodlums can
likewise target old PCs that aren't running the
most modern security programming.
Back up your documents consistently for added
security on account of a digital protection
penetrate. On the off chance that you need to
clean your PC off due to a cyber attack, having
your records in a safe, separate area would help.
Conclusion
Cyber security is continually changing, making it
hard to stay current. Remaining educated and
practicing alert while utilizing the web is two of the
best approaches to ensure yourself, your
organizations and gadgets, and your business.
Cyberattacks targeting critical information
infrastructures in India, such as energy, financial
services, defence, and telecommunications, have the
potential of adversely impacting upon the nation’s
economy and public safety. From the perspective of
national security, the securing of the critical
information infrastructure has become a top priority,
in line with policies already adopted by other digital
nations (DSCI 2013). Indeed, the ever-growing
interdependence of the digital sphere, across borders,
has provoked the emergence of cybersecurity as a
major component of national security strategies in
states across the globe (Kumar and Mukherjee 2013);
India should not delay in following their example.
References
[1] Aiyengar, S. R. R. (2010). National Strategy for
Cyberspace Security. New Delhi: KW
Publisher.
[2] Athavale, D. (2014). “Cyberattacks on the Rise
in India.” The Times of India, Pune, March 10.
[3] Bamrara, A., G. Singh and M. Bhatt (2013).
“Cyber Attacks and Defence Strategies in
India: An Empirical Assessment of the Banking
Sector.” International Journal of Cyber
Criminology, 7 (1): 49–61.
[4] Buzan, B. (1991). People, States, and Fear: An
Agenda for International Security Studies in the
Post Cold War Era. London: Harvester
Wheatsheaf.
[5] Cavelty, M. D. (2012). “The Militarisation of
Cyber Security as a Source of Global Tension.”
In Mockli, Daniel, Wenger, and Andreas, eds.
Strategic Trends Analysis. Zurich: Center for
Security Studies.
[6] Dilipraj, E. (2013). “India’s Cyber Security
2013: A Review.” Centre for Air Power
Studies, 97 (14): 1–4.
[7] DSCI. (2013). Analysis of National Cyber
Security Policy (NCSP–2013). New Delhi:
Data Security Council of India.
[8] Gercke. (2009). Understanding Cybercrime: A
Guide for Developing Countries, Geneva: ITU
publication. Governance Now. (2010). Army
7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 848
Sets Up Cyber Security Lab.
http://www.governancenow.com/news/regular-
story/army-sets-cyber-security-lab.
Government of India. (2011). Discussion Draft
on National Cyber Security Policy. New Delhi:
DIETY.
[9] Government of India. (2012). “National
Telecom Policy (NTP) – 2012.” Ministry of
Communication and Information Technology
(NTP). New Delhi, June 13.
[10] Government of India. (2012). National Cyber
Security Strategy, India: DEITY. IANS. (2014).
“69 Percent of Cyberattacks Targeted at Large
Companies in India: Report.” Business
Standard, New Delhi, April 24.
[11] IDSA. (2012). India's Cyber Security
Challenges. New Delhi: Institute of Defence
Studies and Analyses.
[12] Indo-Asian News Services. (2014). “Large
Firms Hit by 69 Percent of Targeted
Cyberattacks in India: Symantec.” April 26.
http://gadgets/ndtv.com/internet/news/large-
firms-hit-by-69-percent-oftargeted-cyber-
attacks-in-india-symantec-513975.
[13] ITU. (2009). Series-X: Data Networks Open
System Communication and Security,
Overview of Cybersecurity ITU-T X.1205,
Geneva: ITU.
[14] Jain, S. (2014). Cyber Security: A Sine Qua
Non.
http://www.indiandefencereview.com/news/cyb
er-security-a-sine-qua-non/.
[15] Joseph, J. (2012). “India to Add Muscle to Its
Cyber Arsenal.” Times of India, New Delhi,
June 11.
[16] Kaushik, R. K. (2014). “Cyber Security Needs
Urgent Attention of Indian Government.”
http://cybersecurityforindia.blogspot.in/2014/09
/cyber-security-needs-urgent-attention.html.
[17] KPMG. (2010). Indian Defence Sector: The
Improving Landscape for US Business and
Indo-US Commercial, KPMG International,
Swiss.
[18] KPMG. (2014). Forensic TechnologyServices:
Cyber Crime Survey Report – 2014. KPMG
International, Swiss.
[19] Kumar, A. V.; K. K. Pandey, and D. K. Punia
(2013). Facing the Reality of Cyber-Threats in
the Power Sector. Bangalore: Wipro
Technologies.
[20] Kumar, R. & N. Mukherjee. (2013). Cyber
Security in India: A Skill-Development
Perspective. New Delhi: Communication
Multimedia and Infrastructure.
[21] Madaan, N. (2013). “More in City Fall in Net
Trap.” Times of India, Pune, September 8.
[22] Manoharan, N. (2013). “India’s Internal
Security Situation: Threats and Responses.”
India Quarterly: A Journal of International
Affairs 69 (4): 367–381.
[23] OECD. (2012). “Cybersecurity Policy Making
at a Turning Point.”
http://www.oecd.org/sti/ieconomy/cybersecurit
y%20policy%20making.pdf.
[24] Pandit, R. (2005). “Army Gearing Up for
Cyberwarfare.” Times of India, New Delhi,
July 7.
[25] Patil, P. R. and Bhosale, D. V. (2013). “Need to
Understand Cyber Crime‟s Impact over
National Security in India: A Case Study.”
Online International Interdisciplinary Research
Journal 3 (4): 167–171.
[26] Pillai, P. (2012). “History of Internet Security.”
http://www.buzzle.com/articles/history-of-
internet-security.html.
[27] Pubby, M. (2012). “China Hackers Enter Navy
Computers, Plant Bug to Extract Sensitive
Data.” The Indian Express, New Delhi, July 1.
[28] Rather, M. A. & K. Jose (2014). “Human
Security: Evolution and Conceptualization.”
European Academic Research, 2 (5): 6766–
6797.
[29] Reddy, K. S. (2012). “Anonymous Takes Down
MTNL Website.” The Hindu, New Delhi, June
6.
[30] Reich, P. C., ed. (2012). Law, Policy, and
Technology: Cyberterrorism, Information
Warfare, and Internet Immobilization:
Cyberterrorism, Information Warfare, and
Internet Immobilization. IGI Global.
[31] Ruggiero, P. & J. Foote (2011). Cyber Threats
to Mobile Phones. United State: US
Department of Homeland Security.
https://www.us-cert.gov/security-
publications/cyber-threats-mobile-phones.
[32] Shuran, L., D. Hui, and G. Su. (2013).
“Analyses and Discussions of the Blackout in
Indian Power Grid.” Energy Science and
Technology 6 (1): 61–66.
8. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47939 | Volume – 6 | Issue – 1 | Nov-Dec 2021 Page 849
[33] Singh, A. (2012). “Over 10,000 Email IDs Hit
in ‘Worst’ Cyberattack.” The Indian Express.
New Delhi, December 18.
[34] Singh, H. and J. T. Philip (2010). “Spy Game:
India Readies Cyber Army to Hack into Hostile
Nations Computer Systems.” Economic Times,
New Delhi, August 6.
[35] Singh, S. (2013). “Cyber Security Plan to
Cover Strategic, Military, Government and
Business Assets.” The Hindu, New Delhi, July
2.
[36] TERI. (2013). TERI Energy Data Directory &
Yearbook (TEDDY) 2012/13. New Delhi:
TERI Press.
[37] The Economic Times. (2012). “Indian OS
Developed by DRDO Likely to Be Ready in
Three Years.” Hyderabad, December 20.
[38] The Economic Times. (2014). “Government
Mulls Digital India Programme to Connect All
Villages.” New Delhi, August 21.
[39] The Economic Times. (2014). “Most
Cyberattacks on India Show Chinese IP
Address: NTRO.” New Delhi, November 13.
[40] The Hindu (2013). “Cyber Frauds Cost India $4
Billion in 2013: Symantec.” New Delhi,
October 22.
[41] The Indian Express (2014). “Modi to Visit
Australia after G-20 Summit.” New Delhi,
September 6.
[42] The Pioneer. (2013). “ECIL Website Hacked,
Sensitive Data Leaked.” New Delhi, August 27.
[43] UNIDIR. (2013). The Cyber Index:
International Security Trends and Realities.
New York and Geneva: United Nations
Institute for Disarmament Research.
[44] Unnithan, S. (2012). “Enter the Cyber Dragon:
India to Walk an Extra Mile to Match China's
Achievement in Cyberspace.” India Today,
October 26.
[45] UNODA. (2011). Developments in the Field of
Information and Telecommunications in the
Context of International Security. New York:
United Nations Office for Disarmament
Affairs.
[46] Verma, A. K. and A. K. Sharma. (2014).
“Cyber Security Issues and Recommendations.”
International Journal of Advanced Research in
Computer Science and Software Engineering 4
(4): 629–634.
[47] Walstrom, M. (2016). “India’s Electrical Smart
Grid: Institutional and Regulatory
Cybersecurity Challenges.” Seattle: Henry M.
Jackson School of International Studies.