Search

Advanced Search

IVFRT-MMP launching cum sensitization program at FRO-Rourkela, Odisha

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Dec 1, 2014
Participants of the Workshop
Participants of the Workshop

Mr Pioter from Poland receiving ORC from SP, Rourkela
Mr Pioter from Poland receiving ORC from SP, Rourkela

With the target of state-wide implementation of IVFRT project in Odisha, a workshop was organized at the conference hall of SP-office, Rourkela on 15th November, 2014.

SP Rourkela, SP Sundergarh and SP Keonjhar were present at the occasion along with DSP, DIB Rourkela, DIB staff and hoteliers, institute representatives and District Informatics officers from the corresponding districts.

Shri Rakesh Sharma, IG, Rourkela, extended a warm welcome to all the participants and, in his brief statement, explained the importance of IVFRT in maintaining national security. He stated the need for the online system and its effectiveness in tracking foreigners. He urged all the participants to migrate to the online system as soon as possible.

Following the welcome note, the state IVFRT team comprising of state-coordinator Mrs. Sasmeeta Sabat and Mr. Avinash Mishra took over the session. They presented the overview of the IVFRT project and its various modules. The stake-holders were made aware of their duties and responsibilities. Detailed demonstration was given on different modules like C-FRO, C-Form and S-Form.

Few Hoteliers were registered on spot and a computer generated certificate through c-fro was handed over to a foreign guest by FRO Rourkela, Shri Anirudh Singh.    

Later, a detailed presentation and demonstration of the CFRO module was given to all DIB staff present.  Few cases were registered on the test server as part of the training program. The closing note was given by DSP, DIB-Rourkela Shri P K Mohapatra who delivered vote of thanks and assured the successful implementation of the project at FRO-Rourkela.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...