Search

Advanced Search

Digitization

Showing 161 to 165 of total 227 records

Dark Net - The Hidden Side Of Web

Mukesh Kumar Ralli
  |   July 2016

Dark Net is a specific part of the hidden Web where one can operate in total anonymity. It isn't illegal to browse the dark web in most countries, but using some of the dark web services can be illegal. Access of dark web is a little like stepping back in time to the early days of the internet...

Centralized Antivirus Management

Ravi Vijayvargiya, D. H. Khan, K.B. Hariharan, Rajesh Kumar Tripathi
  |   July 2016

In order to have a centrally managed antivirus solution for NICNET, National Informatics Centre has deployed three-tier architecture for Antivirus management. One Antivirus Distribution/ Relay Server is deployed at each Bhawan/State and a Central Antivirus Server is installed at NIC (HQ).

Assam Secretariat e-Pass Application

Bidyut Ranjan Gohain, Sabina Momtaz Sheikh
  |   April 2016

e-Pass, a G2C and G2G service is clever initiative of Secretariat Administrative Department which has been successfully implemented, with the support of SeMT. The application enables efficient and convenient way of issuing various passes to visitors of Assam Secretariat. Citizens can apply for online...

Effective Vulnerability Management For Government Web Hosting

Ratnaboli Ghorai Dinda, Kasi Viswanath Kethineni
  |   April 2016

The web applications, especially of government organizations are prone to malicious attacks intending defamation, service disruption and data corruption. Protection and management of its external facing infrastructure is thus critically important for securing applications and government data.

Himachal Pradesh, the Abode of Gods Adopting ICT In A Grand Way

Ajay Singh Chahal, Sandeep Sood
  |   April 2016

Himachal Pradesh pioneers ahead by providing good governance to citizens by implementing important eGovernance initiatives. Besides the success of LokMitra Kendras at Panchayat level, many citizen centric services are being provided to the citizens at their doorstep. The NIC State Centre has played a...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...