Skip to playerSkip to main contentSkip to footer
  • today
गोरखपुर में NIELIT की ओर से आयोजित सेमिनार में साइबर खतरे को लेकर किया गया आगाह, चुनौतियों-बचाव पर चर्चा

Category

🗞
News
Transcript
00:00How does the act adapt to India to its users' data?
00:07If we disclose the other countries, we will talk about the laws.
00:11In the case of the laws, the government has changed the IPC CRP.
00:17The IT Act has already been changed.
00:19There is a new law called DPDP Act.
00:22There are users who will focus on data privacy.
00:27On the international level, the European Union has a general protection data rule.
00:36The European Union's users' data is protected.
00:40With that, we also have a DPDP Act.
00:43For example, as many Indian users in social media,
00:48we have data.
00:50In our Indian territory, it is a California-based server.
00:55The government will be the case of the museum.
00:58For example, the government will also take the information to the US.
01:00The government will also take the information to the US.
01:01If there is an investigation to the US,
01:05if a government wants information to the US,
01:08or a federal government,
01:10we should get the information to the US.
01:11If we have a government,
01:13we will be request to the US.
01:16So if we have a Twitter, Instagram, YouTube, or Google user data,
01:23then we have a request from California.
01:26It's a Gravance Reduction System.
01:29We have a portal for access to it.
01:33We have to request a letter every time.
01:36Then we have the data.
01:37And we have a full discussion of it.
01:39If we want to make it, we can make it.
01:41We have a QDP actor, Indian users, or who you are working on the internet,
01:49and have a service to use it.
01:52So when we want to make it, we can access it.
01:55It's either a QDP actor or a QDP actor?
01:58Yes.
01:59All the issues you have in front of cyber security and hacking.
02:04Some of the issues we have in the world are getting worse.
02:09I will say that now it's already started.
02:12In the situation, the government's government's website was hacked.
02:19A few months ago, Aims Delhi's website was hacked.
02:25So for 7 days, their whole service was running out.
02:28So that kind of attacks have started.
02:30You can also see that in the news,
02:35the UK's website,
02:36all the people who have been in the UK,
02:37all of the companies,
02:38all of the companies,
02:39all of them have been leaked out.
02:40It's been a lot of ransomware attacks in India.
02:42But if we talk about the specific Gaurakpur,
02:44then the Gaurakpur attacks are the same.
02:47They are not currently in Gaurakpur,
02:48the only large professional cyber crime.
02:51They are currently in Gaurakpur.
02:53It's not actually in Gaurakpur.
02:54The reason is that there is not many multinational companies.
02:58If we have a multi MNCs, if we have a multi MNCs, then we have a ransomware attack.
03:06How do we develop AI driven security solutions?
03:12We need to integrate AI programming with cyber security.
03:20We need to implement AI programming with cyber security, so that the generation will be able to do it in the domain of cyber security.
03:35We will focus on quantum computing.
03:40Now we are living in binary computing.
03:50We are living in binary computing.
03:52Quantum computing will be massive data store.
03:56Massive computing will be enough power.
04:00From our computers, thousands of dollars will be powerful.
04:04After coming to quantum computing, these technologies, security protocols, security systems will break.
04:13Quantum computing will be a different program, different algorithm, different system.
04:19We need to understand cyber security.
04:23Whether electronic devices, security, semiconductor chips, IoT devices, security.
04:37And not so.
04:39The OT systems, such as power systems, or industrial systems,
04:47we need to communicate with Falcons.
04:53We need to understand what security are,
04:54and if we are trying to understand what security issues we want to.
04:57We need to understand how that is.
05:00We need to understand what of the digital ecosystem.
05:01Whether that is EPI, our digital economy, siber law, or DPDP Act.
05:07In the meantime, we will talk about what new managers are.
05:11And also, this will be a kind of self-fulfillment or how it will be used to be used to be used to be used to be used to be used to.

Recommended