Skip to playerSkip to main content
  • 9 months ago
गोरखपुर में NIELIT की ओर से आयोजित सेमिनार में साइबर खतरे को लेकर किया गया आगाह, चुनौतियों-बचाव पर चर्चा

Category

🗞
News
Transcript
00:00How does the act adapt to India to its users' data?
00:07If we disclose the other countries, we will talk about the laws.
00:11In the case of the laws, the government has changed the IPC CRP.
00:17The IT Act has already been changed.
00:19There is a new law called DPDP Act.
00:22There are users who will focus on data privacy.
00:27On the international level, the European Union has a general protection data rule.
00:36The European Union's users' data is protected.
00:40With that, we also have a DPDP Act.
00:43For example, as many Indian users in social media,
00:48we have data.
00:50In our Indian territory, it is a California-based server.
00:55The government will be the case of the museum.
00:58For example, the government will also take the information to the US.
01:00The government will also take the information to the US.
01:01If there is an investigation to the US,
01:05if a government wants information to the US,
01:08or a federal government,
01:10we should get the information to the US.
01:11If we have a government,
01:13we will be request to the US.
01:16So if we have a Twitter, Instagram, YouTube, or Google user data,
01:23then we have a request from California.
01:26It's a Gravance Reduction System.
01:29We have a portal for access to it.
01:33We have to request a letter every time.
01:36Then we have the data.
01:37And we have a full discussion of it.
01:39If we want to make it, we can make it.
01:41We have a QDP actor, Indian users, or who you are working on the internet,
01:49and have a service to use it.
01:52So when we want to make it, we can access it.
01:55It's either a QDP actor or a QDP actor?
01:58Yes.
01:59All the issues you have in front of cyber security and hacking.
02:04Some of the issues we have in the world are getting worse.
02:09I will say that now it's already started.
02:12In the situation, the government's government's website was hacked.
02:19A few months ago, Aims Delhi's website was hacked.
02:25So for 7 days, their whole service was running out.
02:28So that kind of attacks have started.
02:30You can also see that in the news,
02:35the UK's website,
02:36all the people who have been in the UK,
02:37all of the companies,
02:38all of the companies,
02:39all of them have been leaked out.
02:40It's been a lot of ransomware attacks in India.
02:42But if we talk about the specific Gaurakpur,
02:44then the Gaurakpur attacks are the same.
02:47They are not currently in Gaurakpur,
02:48the only large professional cyber crime.
02:51They are currently in Gaurakpur.
02:53It's not actually in Gaurakpur.
02:54The reason is that there is not many multinational companies.
02:58If we have a multi MNCs, if we have a multi MNCs, then we have a ransomware attack.
03:06How do we develop AI driven security solutions?
03:12We need to integrate AI programming with cyber security.
03:20We need to implement AI programming with cyber security, so that the generation will be able to do it in the domain of cyber security.
03:35We will focus on quantum computing.
03:40Now we are living in binary computing.
03:50We are living in binary computing.
03:52Quantum computing will be massive data store.
03:56Massive computing will be enough power.
04:00From our computers, thousands of dollars will be powerful.
04:04After coming to quantum computing, these technologies, security protocols, security systems will break.
04:13Quantum computing will be a different program, different algorithm, different system.
04:19We need to understand cyber security.
04:23Whether electronic devices, security, semiconductor chips, IoT devices, security.
04:37And not so.
04:39The OT systems, such as power systems, or industrial systems,
04:47we need to communicate with Falcons.
04:53We need to understand what security are,
04:54and if we are trying to understand what security issues we want to.
04:57We need to understand how that is.
05:00We need to understand what of the digital ecosystem.
05:01Whether that is EPI, our digital economy, siber law, or DPDP Act.
05:07In the meantime, we will talk about what new managers are.
05:11And also, this will be a kind of self-fulfillment or how it will be used to be used to be used to be used to be used to be used to.
Be the first to comment
Add your comment

Recommended