Monthly Archives: December 2012

Cyber Demonstration

The incidents in Delhi over the past one week have indicated how the power of the voice of the people can make even the most adamant Government to sit up and take notice. Initially the Government tried to ignore the … Continue reading

Posted in Cyber Law | Tagged , | Leave a comment

e-authentication framework for Government projects

The Department of Electronics and Information Technology, GOI (DeitY) has released a document called “e-Pramaan: Framework for e-Authentication”. This is intended to serve as the guiding document for all Central and State Ministries, departments and government agencies for implementing an … Continue reading

Posted in Cyber Crime, Cyber Law, Information Assurance, Privacy | 2 Comments

Government is on a holiday

The Lieutenant Governor of Delhi who was enjoying a holiday in US while the city was burning has now come back to India. Many hope that there will be some accountability for what happens in Delhi now. People have criticized … Continue reading

Posted in Cyber Crime, Cyber Law | Tagged , | Leave a comment

Stealing Credit Card information from POS

Stealing of Credit card information when used on the Internet is a known vulnerability. It had also been observed that certain criminals had bought credit card information by bribing the employees of merchant establishments or by stealing the POS swiping … Continue reading

Posted in Cyber Crime | Leave a comment

Vulnerabilities in human space

According to NIST (National Institute of Standards and Technology), a “Vulnerability” in Risk Analysis context is defined as a”flaw or weakness in system security procedures, design,implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result … Continue reading

Posted in Cyber Crime, Cyber Law, Information Assurance | Tagged , , , | Leave a comment

Starting an Information Assurance Program

Information Assurance (IA) is a management initiative to ensure Confidentiality, Integrity, Availability, Authentication and Non Repudiation of information in an organization. Taking the practical difficulties involved in achieving a satisfactory level of IA, Naavi has suggested a “Total Information Assurance”(TIA) … Continue reading

Posted in Information Assurance | Leave a comment