SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
E-Governance and Security
MINI SEMINAR
30TH JUNE2013
AVCC,NOIDA
India has taken significant steps in the area of e-
governance, with almost all states across the country
launching e-services in some form or the other.
* Source: india.gov.in/e-governance‎
We all know about the bright
future
The other
of the
side
story
Any ICT
infrastructure
must be
Secure
because
Citizen &
Business
transactions
contain
Significant
Confidential
Information
But who decides the Security QR’s…….
Sadly….till date the approach has been mostly
reactive since we have been traditional in
configuring SECURITY!!!!!!!
While anti-virus and firewalls are seen more as a
Reactive security mechanism,IDP solutions are more
Proactive and get activated as soon as any abnormal
behavior is detected.
With the information Technology(IT)
Act 2000 coming into effect from
October 18,2000,transactions on the
internet have got legal validity in India
And ever since……..
INDUSTRY APPLICATION AVERAGE COST PER
HOUR OF DOWN
TIME(US$)
Financial Brokerage Operations $15,840,000/-
Financial Credit Card Sales $7,000,000/-
Retail Home Shopping TV $750,000/-
Transportation Air Line reservations $350,000/-
Entertainment Tele-ticket sales $300,000/-
Shipping Package Shipping $250,000/-
Financial ATM $200,000/-
Lets try to
get familiar
with the
threat
vectors!!!
Domains of
security
Impersonati
on
Failure
False
Identity
Revoked Rights
Unauth
Disclosure
Theft of Access
Tokens
DoS
Breach of
Anonymity
Unknown
Outsider Attack
User Fraud
Insider Attack
Access
Threats
Probe is a class
of attacks where
an attacker scans
a network to
gather information
or find known
vulnerabilities
MALWARE : Malicious software
Microsoft b70
Internet Infrastructure attacks
These rare but serious attacks involve key components of the
Internet infrastructure rather than specific systems on the Internet.
Denial of Service Attacks
Remote to local attack
User to Root Attack
So
What
Should we not support E-Governance?
Apex Body
on Standards
in DIT
State Wide
Area Network
(S.W.A.N.)
National
E- Government
Intranet
And all this
along with
these two
Current
Giants make
a great
Attack
Surface
Stringent
Security
Policies
Monitoring
tools
Analysis
tools
Firewalls/UT
Ms
Cryptography
E-governance-and-Security
E-governance-and-Security

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentation
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
Government Digitalization.ppt
Government Digitalization.pptGovernment Digitalization.ppt
Government Digitalization.ppt
 
EDI
EDIEDI
EDI
 
e governance
e governancee governance
e governance
 
Evolution of study of e governance
Evolution of study of e governanceEvolution of study of e governance
Evolution of study of e governance
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
India's potential in e governance
India's potential in e governanceIndia's potential in e governance
India's potential in e governance
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
E governance
E governanceE governance
E governance
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
E-Government
E-GovernmentE-Government
E-Government
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Ict ppt on e governance
Ict ppt on e governanceIct ppt on e governance
Ict ppt on e governance
 
Internet security
Internet securityInternet security
Internet security
 
E governance
E   governanceE   governance
E governance
 

Destaque

E-government Security Models
E-government Security ModelsE-government Security Models
E-government Security ModelsEditor IJCATR
 
Erp implementation ethics for successful projects
Erp implementation ethics for successful projectsErp implementation ethics for successful projects
Erp implementation ethics for successful projectsBaha'a Al Thibyan
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce TechnologyDivante
 
e-Government introduction
e-Government introductione-Government introduction
e-Government introductionMuhammad Farooq
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGoutama Bachtiar
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introductionaqel aqel
 
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide Ramco Systems
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERPTom Matys
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesSaif Ullah
 

Destaque (16)

ERP & BI
ERP & BIERP & BI
ERP & BI
 
E-government Security Models
E-government Security ModelsE-government Security Models
E-government Security Models
 
Erp implementation ethics for successful projects
Erp implementation ethics for successful projectsErp implementation ethics for successful projects
Erp implementation ethics for successful projects
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
 
e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce Technology
 
E governance presentation
E governance presentationE governance presentation
E governance presentation
 
E governance
E governanceE governance
E governance
 
e-Government introduction
e-Government introductione-Government introduction
e-Government introduction
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introduction
 
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
 
Data mining
Data miningData mining
Data mining
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERP
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 

Semelhante a E-governance-and-Security

PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSpattok
 
Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital Indiajournal ijrtem
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaSam Ghosh
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Cyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfCyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfAfrianto Budi
 
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTTCYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTTKhushiAgarwal819938
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...ijtsrd
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studiesKirtesh Dudawat
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome themsaipriyadonthula
 
Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)Christopher Mohritz
 
Kgabo Ralebepa- Vice President of ISACA SA Chapter
Kgabo Ralebepa- Vice President of ISACA SA ChapterKgabo Ralebepa- Vice President of ISACA SA Chapter
Kgabo Ralebepa- Vice President of ISACA SA Chapteritnewsafrica
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
 
Contribution of IoT & its Prospect in Bangladesh
Contribution of IoT & its Prospect in BangladeshContribution of IoT & its Prospect in Bangladesh
Contribution of IoT & its Prospect in BangladeshIRJET Journal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 

Semelhante a E-governance-and-Security (20)

PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital India
 
Fintechs in india
Fintechs in indiaFintechs in india
Fintechs in india
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfCyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdf
 
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTTCYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
 
Cyber law
Cyber lawCyber law
Cyber law
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)
 
Kgabo Ralebepa- Vice President of ISACA SA Chapter
Kgabo Ralebepa- Vice President of ISACA SA ChapterKgabo Ralebepa- Vice President of ISACA SA Chapter
Kgabo Ralebepa- Vice President of ISACA SA Chapter
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
Contribution of IoT & its Prospect in Bangladesh
Contribution of IoT & its Prospect in BangladeshContribution of IoT & its Prospect in Bangladesh
Contribution of IoT & its Prospect in Bangladesh
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 

Mais de anupriti

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itanupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generalsanupriti
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEanupriti
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies anupriti
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conferenceanupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with exampleanupriti
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEanupriti
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKanupriti
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensicsanupriti
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overviewanupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Scoreanupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Nowanupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?anupriti
 
Wirelurker
WirelurkerWirelurker
Wirelurkeranupriti
 

Mais de anupriti (20)

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 
Regin
ReginRegin
Regin
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 

Último

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

E-governance-and-Security