Knowledge Agora



Scientific Article details

Title International Cyber Attackers Eyeing Eastern India: Odisha - A Case Study
ID_Doc 79195
Authors Sahoo, B; Behera, RN; Mohanty, S
Title International Cyber Attackers Eyeing Eastern India: Odisha - A Case Study
Year 2019
Published
DOI 10.1007/978-3-030-01177-2_97
Abstract India is a developing country, with various challenges like illiteracy, poverty, tribal and economical backward population and above all present day digital literacy. Indian Government in broad and its States and Union Territories are trying harder for Smart Governance with Digital India movement taking IT/ICT as a tool. At one hand when Government is trying for delivering various e-Governance services to its citizen through portals and Web-based Applications Cyber Security has become the biggest challenge. The word security was coined to ensure protection to some object, the term gradually evolved to secure our information and data from providing security to objects and individuals. Security is very much essential in our daily life. A new term along with security is coined known as insurance. Individuals believe in securing there objects. But nowadays every individual is more conscious about security to protect their data and information in the cyber world. The use of internet revolves around many fields like education, e-commerce, hospitals, companies, military purposes and many more. Therefore, it is very important to keep our data safe and avoid use by unauthentic users. India is digitally divided into four regions east, west, north and south. Though India is progressing rapidly in digital world in International scenario, in reality the eastern part of India is less digitally active. In this paper we have given a case study how International Hackers are trying to target eastern part of India with Odisha State as a case. We have also taken how the State and Central Government have taken initiation to prevent data hacking, cyber attacks and recovery of data. Finally, the paper is concluded by citing the efficiency of some of the methods for retrieval of data from the theft.
Author Keywords Confidentiality; Cyber security; Cyber attack; Data security; Data manipulation; Data deduplication; Data mirroring; Encryption; Integrity
Index Keywords Index Keywords
Document Type Other
Open Access Open Access
Source Conference Proceedings Citation Index - Science (CPCI-S)
EID WOS:000591560300097
WoS Category Computer Science, Artificial Intelligence; Computer Science, Interdisciplinary Applications
Research Area Computer Science
PDF
Similar atricles
Scroll