Title |
International Cyber Attackers Eyeing Eastern India: Odisha - A Case Study |
ID_Doc |
79195 |
Authors |
Sahoo, B; Behera, RN; Mohanty, S |
Title |
International Cyber Attackers Eyeing Eastern India: Odisha - A Case Study |
Year |
2019 |
Published |
|
DOI |
10.1007/978-3-030-01177-2_97 |
Abstract |
India is a developing country, with various challenges like illiteracy, poverty, tribal and economical backward population and above all present day digital literacy. Indian Government in broad and its States and Union Territories are trying harder for Smart Governance with Digital India movement taking IT/ICT as a tool. At one hand when Government is trying for delivering various e-Governance services to its citizen through portals and Web-based Applications Cyber Security has become the biggest challenge. The word security was coined to ensure protection to some object, the term gradually evolved to secure our information and data from providing security to objects and individuals. Security is very much essential in our daily life. A new term along with security is coined known as insurance. Individuals believe in securing there objects. But nowadays every individual is more conscious about security to protect their data and information in the cyber world. The use of internet revolves around many fields like education, e-commerce, hospitals, companies, military purposes and many more. Therefore, it is very important to keep our data safe and avoid use by unauthentic users. India is digitally divided into four regions east, west, north and south. Though India is progressing rapidly in digital world in International scenario, in reality the eastern part of India is less digitally active. In this paper we have given a case study how International Hackers are trying to target eastern part of India with Odisha State as a case. We have also taken how the State and Central Government have taken initiation to prevent data hacking, cyber attacks and recovery of data. Finally, the paper is concluded by citing the efficiency of some of the methods for retrieval of data from the theft. |
Author Keywords |
Confidentiality; Cyber security; Cyber attack; Data security; Data manipulation; Data deduplication; Data mirroring; Encryption; Integrity |
Index Keywords |
Index Keywords |
Document Type |
Other |
Open Access |
Open Access |
Source |
Conference Proceedings Citation Index - Science (CPCI-S) |
EID |
WOS:000591560300097 |
WoS Category |
Computer Science, Artificial Intelligence; Computer Science, Interdisciplinary Applications |
Research Area |
Computer Science |
PDF |
|