Search

Advanced Search

Cyber Governance

Showing 226 to 230 of total 333 records

DC*Suite - Goa's Online Land Conversion Cases System

G H Subhash, K V Rijisha
  |   July 2016

With the implementation of DC*Suite at South Goa Collectorate and related offices, physical movement of documents between stakeholders has been eliminated. The system has reduced time lags to a large extend and increased the efficiency at individual, organizational and interorganizational levels.

ICT Shines in the Sun City

Hanuman Singh Gehlot, Ravi Mathur
  |   July 2016

Jodhpur Development Authority (JDA) was established with the objective of providing basic infrastructure in Jodhpur district to meet the ever- growing demand of public and carry out continuous improvement in the city. NIC Jodhpur Centre is providing remarkable ICT support and services to the Authority...

District Sirmaur - Committed Towards Digital India

Vijay Kumar, Mohan Rakesh Aggarwal
  |   July 2016

Winning the top award during the Digital India Week celebration 2015 underlines NIC Sirmaur's true commitment towards making the dream of Hon'ble Prime Minister to transform India into a digitally empowered society and knowledge economy.

Dark Net - The Hidden Side Of Web

Mukesh Kumar Ralli
  |   July 2016

Dark Net is a specific part of the hidden Web where one can operate in total anonymity. It isn't illegal to browse the dark web in most countries, but using some of the dark web services can be illegal. Access of dark web is a little like stepping back in time to the early days of the internet...

Centralized Antivirus Management

Ravi Vijayvargiya, D. H. Khan, K.B. Hariharan, Rajesh Kumar Tripathi
  |   July 2016

In order to have a centrally managed antivirus solution for NICNET, National Informatics Centre has deployed three-tier architecture for Antivirus management. One Antivirus Distribution/ Relay Server is deployed at each Bhawan/State and a Central Antivirus Server is installed at NIC (HQ).

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...