enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. National Critical Information Infrastructure Protection Centre

    en.wikipedia.org/wiki/National_Critical...

    Undertaking research and development and allied activities, providing funding (including grants-in-aid) for creating, collaborating and development of innovative future technology for developing and enabling the growth of skills, working closely with wider public sector industries, academia et al. and with international partners for protection ...

  3. Cyber-security regulation - Wikipedia

    en.wikipedia.org/wiki/Cyber-security_regulation

    A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...

  4. Information Technology Act, 2000 - Wikipedia

    en.wikipedia.org/wiki/Information_Technology_Act...

    In 2022, it was reported [51] that there has been a proposal to replace the Information Technology Act with a more comprehensive and updated Digital India Act, which would cover a wider range of information technology issues and concerns. This law could ostensibly have focal areas around privacy, social media regulation, regulation of over-the ...

  5. Tech firms say India cyber rules risk creating 'environment ...

    www.aol.com/news/tech-firms-india-cyber-rules...

    Indian cybersecurity rules due to come into force later this month will create an "environment of fear rather than trust", a body representing top tech companies has warned the government, calling ...

  6. National Cyber Security Policy 2013 - Wikipedia

    en.wikipedia.org/wiki/National_Cyber_Security...

    National Cyber Security Policy is a policy framework by Department of Electronics and Information Technology (DeitY) [1] It aims at protecting the public and private infrastructure from cyber attacks. [2] The policy also intends to safeguard "information, such as personal information (of web users), financial and banking information and ...

  7. National Technical Research Organisation - Wikipedia

    en.wikipedia.org/wiki/National_Technical...

    The National Technical Research Organisation (NTRO) is a technical intelligence agency of India. [ 1 ] [ 2 ] It was set up in 2004. [ 3 ] The agency reports to the National Security Advisor and to the Prime Minister's Office . [ 4 ]

  8. Information security standards - Wikipedia

    en.wikipedia.org/wiki/Information_security_standards

    Information security standards (also cyber security standards [1]) are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. [2] This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services ...

  9. Information technology law - Wikipedia

    en.wikipedia.org/wiki/Information_technology_law

    Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of ...

  1. Related searches cybersecurity regulations in india definition of technology research process

    cyber security regulationscyber security regulations wikipedia