Professional Documents
Culture Documents
Digital Empowerment File
Digital Empowerment File
1) Digital India has led to less paper usage and wastage which results
in a decline in deforestation.
2) In metropolitan areas the number of people using internet as a
primary means of service has rose to 64%.
3) Digital India has made majority of the government services
available online which leads to task getting done quickly and
efficiently.
4) It also aimed at improving public accountability through mandated
delivery of government’s electronic unique IDs and ePramaan
based on authentic, integrated government application.
PRACTICAL 5
1. Broadband Highways: The first pillar focuses on establishing robust
broadband connectivity across the country, especially in rural and
remote areas. The cornerstone initiatives include the National
Optical Fiber Network (NOFN) and BharatNet, aimed at providing
high-speed internet access to over 250,000 Gram Panchayats and
connecting all remaining Gram Panchayats with broadband services.
2. Universal Access to Mobile Connectivity: This pillar emphasizes
expanding mobile network coverage to ensure comprehensive
accessibility to mobile services throughout the nation. The
government is actively working on improving mobile network
infrastructure and reducing call drops to enhance the quality and
reach of mobile connectivity.
3. Public Internet Access: Efforts under this pillar focus on facilitating
public access to the internet, particularly in rural areas, through
initiatives like establishing Common Service Centers (CSCs) and
promoting the Digital Locker, providing citizens with secure digital
document storage.
4. E-Governance – Reforming Government through Technology:
EGovernance forms a pivotal pillar in Digital India, aiming to deliver
government services online, enhancing efficiency, transparency, and
accessibility. Key initiatives include the MyGov Portal for citizen
engagement and e-Sign for secure digital authentication.
5. e-Kranti - Electronic Delivery of Services: This pillar centers on the
electronic delivery of government services, fostering efficiency and
transparency. The National e-Governance Plan (NeGP) and the
Digital India Internship Scheme are prominent initiatives under this
pillar.
6. Information for All: Digital India ensures the accessibility of
government information to all citizens digitally, promoting
transparency and awareness. Initiatives such as the Open Data
Platform and National Scholarships Portal facilitate access to
government data and scholarship schemes.
7. Electronics Manufacturing – Targeting Net Zero Imports: To reduce
dependence on electronic imports, this pillar focuses on promoting
electronics manufacturing within the country. Initiatives like Make in
India for Electronics and M-SIPS incentivize domestic electronics
production.
8. IT for Jobs: Creating employment opportunities in the IT sector is
the aim of this pillar. It emphasizes skill development through
various programs and initiatives while fostering a conducive
environment for startups through schemes like Startup India.
9. Early Harvest Programmes: The final pillar emphasizes the
implementation of priority projects to showcase quick results in
egovernance and digital transformation. Notable initiatives include
Jeevan Pramaan, a digital life certificate for pensioners, and
UMANG, a unified mobile application for accessing various
government services
PRACTICAL 6
PRACTICAL 5
The first day of college was a mix of emotions – excitement,
nervousness, anticipation, and a sprinkle of anxiety. Stepping
onto the campus grounds, the air humming with enthusiasm,
I felt a surge of mixed feelings. It was a day painted with
myriad expectations and uncertainties, a new chapter waiting
to unfold.
Navigating through the buildings, I was struck by the vibrancy
in the air, the mix of diverse cultures and energy pulsating
around me. The unfamiliar faces seemed both Scaring and
exhiting as I ventured to find my place in this new world. The
class buzzed with voices, echoing a symphony of chatter and
laughter
Among the crowd of new faces, I found comfort in meeting
like-minded individuals who shared my passion for learning.
Engaging in ice-breaking activities and orientation sessions, I
discovered a sense of belonging in this community of budding
scholars.
The professors' words echoed wisdom and knowledge,
igniting sparks of curiosity and fear within me. Their
enthusiasm and dedication were contagious, setting the tone
for an academic journey filled with exploration and
enlightenment. As the day concluded, I walked away with a
emotions. The nervous jitters had dissipated, replaced by a
budding sense of belonging and a hunger to delve deeper
into the vast sea of knowledge awaiting exploration
PRACTICAL 15
WHAT IS DATA BREACH:
A Data breach is an incident where information is stolen or taken
from a system without the knowledge or authorization of the
system’s owner. A small company or large organization may suffer a
data breach. Stolen data may involve sensitive, proprietary, or
confidential information such as credit card numbers, customer data,
trade secrets, or matters of national security.
TYPES OF DATA BREACH
● Ransomware - in a ransomware attack, you suddenly get a
message stating that all data on your phone or computer is now
encrypted, denying you access to your own data. With
ransomware, the perpetrator will tell you that they will turn the
data back over to you and not release it to the public if you pay a
fee
● Phishing - In Phishing hacker lures its target to open a virus
attached mail by sending them lucrative offers of winning a lottery
or cash prize
● Malware - Malware or viruses are sent to people with the goal
of wiping their computer of all data. This can be harmful to any
company, especially those who rely on their data
METHODS OF DATA BREACH:
● Payment card fraud: Payment card data is stolen using physical
skimming devices.
● Loss or theft: Portable drives, laptops, office computers, files,
and other physical properties are lost or stolen.
● Unintended disclosure: Through mistakes or negligence,
sensitive data is expose
HOW DATA BREACH TAKES PLACE
STEP 1: Research
In this step the attacker who has already picked a target conducts a research about the target. The
main aim of this research is to find out the weakness in the target’s system , which attacker can use
to steal the data
STEP 2: Attack
In this step , once the attacker has found the weakness in target's system he/she launches a attack to
gain and exploit targets data . The attacker firstly makes initial contact through messages or email in
order to capture target’s attention.
STEP 3 : Exfiltrate
Once inside the system , the attacker is free to extract data from the company’s network. This data
may be used for either blackmail or cyber propaganda.
Lack of Experience and Maturity: One of the primary reasons young people may not fully
understand the consequences of their online activity is their limited life experience and cognitive
maturity..
Digital Literacy Gap: While the younger generation is highly proficient in using technology,
there exists a gap in digital literacy when it comes to understanding the intricacies of online privacy,
security, and permanence of digital footprints.
Influence of Social Norms and Peer Pressure: The influence of social norms and peer
pressure significantly impacts young people's online behavior. Seeking validation and acceptance
among peers often leads individuals to partake in risky
Educational Deficiency: The current education system often lacks comprehensive digital
citizenship and online safety curricula. Many young people are not adequately taught about
responsible online behavior, privacy settings, or the potential legal implications of their actions.