Management in border areas by various security forces/agencies

To deal with security, India has different forces that are specialized to deal with different security threat. Conventionally, forces were meant to be only Defence forces but with rising internal challenges  and other threats related to border management, Disaster Management etc, various forces have come to the for. These forces and agencies in India at … Read more

IT Act (2000)

  The Government of India enacted the Information Technology (I.T.) Act with some major objectives to deliver and facilitate lawful electronic, digital, and online transactions, and mitigate cyber-crimes. The original Act contained 94 sections, divided in 13 chapters and 4 schedules. The laws apply to the whole of India. Persons of other nationalities can also be … Read more

Role of biometric devices in security

  Biometric devices measure biological Elements (like human features) in order to perform functions, such as logging Health/fitness data and authenticating users. There are many different uses for the technology and a variety of methods for its implementation. Types of biometric data include visual, audio, spatial and behavioral. According to these characteristics, the sub-divided groups … Read more

Basics of cyber security

Cyber security is a process, technique or procedure to ensure information security goals. Aim of Information Security is to provide CIA i.e. Confidentiality of information Integrity of information Availability of information   These 3 parameters (CIA) are called security goals/security Services. The other security objectives also include such other parameters as authenticity, authorisation, accounting and … Read more

Index