Guideline are applicable to all Responsible Entities as well as System Integrators, Equipment Manufacturers, Suppliers/Vendors, Service Providers, IT Hardware and Software OEMs engaged in the Indian Power Supply System for protection of Control Systems for System Operation and Operation Management, Communication System and Secondary Automation and Tele control technologies.
r. The Government has launched the National Cyber Crime Reporting Portal (www.cybercrime.gov.in), to enable public to report incidents pertaining to all types of cyber crimes, with a special focus on cyber crimes against women and children.
This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.
It has come to the notice of the Department of Telecommunications (DoT), Ministry of Communications that several misleading messages are being circulated on various social media platforms claiming that the second wave of coronavirus has been caused by the testing of the 5G mobile towers. As per a press statement issued by DoT these messages are false and absolutely not correct. The press statement informs that the general public is hereby informed that there is no link between 5G technology and spread of COVID-19 and they are urged not to be misguided by the false information and rumours spread in this matter.
At the FBI, we’ve been fighting the cyber threat for many years now. We began our early high-tech crime effort in the mid-1990s, and created our Cyber Division almost 20 years ago, in 2002. We’ve become known for our efforts to call out destabilizing and damaging cyber activity by nation-state actors, like the indictment last summer of two hackers working on behalf of the Chinese Ministry of State Security, stealing intellectual property from companies in the U.S. and around the world while also targeting dissidents who spoke out against the Communist Party.
The second part explores illegal trafficking of people, drugs, and other illicit goods as a global phenomenon, aided by the ease of international travel, funds transfer, and communication. Finally, international approaches to crime detection prevention are presented. The work provides case studies and fieldwork that will be relevant across a variety of disciplines and a rich resource for future research.
Power to issue directions for blocking for public access of any information through any computer resource.
Government of India invoking it’s power under section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009 and in view of the emergent nature of threats has decided to block 118 mobile apps (see Appendix) since in view of information available they are engaged in activities which is prejudicial to sovereignty and integrity of India, defence of India, security of state and public order.
This Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data.
India’s power grids are “highly” susceptible to cyber attacks from China, as the Sunday Guardian reported on Sunday. It stated that urgent action was required to be taken to isolate the critical part of the control rooms so that they were kept out of the reach of the hackers. The Indian power system, for planning and operational purposes, is divided into five regional grids, namely, Northern, Eastern, Western, North Eastern and Southern grids.
ডিজিটাল নিরাপত্তা নিশ্চিতকরণ এবং ডিজিটাল মাধ্যমে সংঘটিত অপরাধ শনাক্তকরণ, প্রতিরোধ, দমন, বিচার ও আনুষঙ্গিক বিষয়াদি সম্পর্কে বিধান প্রণয়নকল্পে প্রণীত আইন
Tips to put into practice when making purchases: In case of need to buy a product, it is advisable to take a look at the product that is being promoted in the previous days and thus confirm that the discounts…