Global Cyber Challenge - Peace-a-thon

Protection of Navigation Technology Infrastructure

Global positioning system (GPS) or more generically called Global global navigation satellite system (GNSS) is extensively used for navigation of aeroplanes, surface vehicles (road as well as water) by providing ephemeris data. They are also bec .....

Mitigating Public Sector Cyber Cascades

Stuxnet and recent cyber-attacks on Ukrainian power grid has explored vulnerability of critical infrastructures like power network, water network, oil & gas network. With such borderless-wars becoming more lucrative and nation-states getting inv .....

Security of Internet of Things

Internet of Things (IoT) is considered to be the next industrial revolution and often referred to as Industry 4.0. Many applications are getting developed in IoT by interconnecting smart sensors, smart actuators with cloud computing platform for .....

Security of CII and Digital Payments

India is leading towards digital economy and critical Infrastructures are more dependent onInternet mostly dominated by devices, standards and implementations developed and manufactured by other countries.We need to work on varied areas of impor .....

Customer Empowerment for Digital Banking Security

Lack of awareness and redressal mechanism for digital payments. In spite of rigorous campaign on cyber security awareness though print media/ digital & social media, trainings / workshops being undertaken by banks and financial institu .....

Technology as a Resolve to Cyber Risks to Child

Children need to acquire digital intelligence to use technology appropriately and responsibly. Digital intelligence is generally understood as having the necessary knowledge, skills and ability to adapt one’s emotions and behaviour to deal wit .....

Driving Innovation to Monitor Online Sexual Abuse Against Children

“Across the world the production and distribution of images and video depicting the sexual abuse of children has reached a level that is exceeding the capabilities of law enforcement to investigate and prosecute. The projected growth in mobile .....

Honeypots

The internet houses millions of bots and humans waiting attack open systems and it is important to enable proactive protection controls to safeguard our systems, networks and data assets. A honeypot can help to identify and observe attack techni .....

Fake News

Fake news also referred to hoax news occupies large sphere of cyber space today world-wide.Cyber technology’s wide reach and fast spread contributes to its menace. Publicity through such fake news on cyber spacetoday has been adopted by States .....

Security of Women Online

One of the biggest issues women face online is trolling. Can a system be developed where this can be controlled as well as there is a data intelligence to collect information about trollers and report them accordingly. The problem isto identi .....

Integrated Recourse for Digital Fraud Victims

Technology has played an important role in transforming the lives by providing digital authentication, facilitating digital payments and extending the service to citizens through Digital means. Banking, communication, government services, ecomme .....

Mobile Security

Context: As per the GSMA Mobile economy, there were 4.8 billion unique mobile subscribers, 1.9 billion smart phones and 7.9 billion SIM connections globally in December 2016. The mobile traffic data is expected to grow globally by a CAGR of 47% .....

Digital Awareness

The last couple of years have seen most of the critical infrastructures such as banking, energy, telecommunication, defence etc. has seen implementation of information and ICT tools for its effective and efficient use across the globe. But these .....