The IT Rules 2021 seek to address cyber security concerns of the citizens without infringing on their privacy and personal liberties, while maintaining digital sovereignty at the same time.
This monograph examines the key technologies behind 5G, the requirements of infrastructure and spectrum, and the emerging landscape with the rise of Chinese telecommunication equipment manufactures. It delves into China’s rise as a key technology provider in the telecommunications sector, and a prime contributor to standards development.
Arul R. replies: Encryption standards are used to secure data and communication. With advancement in computational processing power, encryption standards too evolved, replacing the old with more effective new ones. The Data Encryption Standard (DES) was an excellent encryption standard for nearly two decades, from 1970s to 1990s.
Arul R. replies: Encryption is a way of scrambling the data or message thereby securing the data from unintended recipients. Decryption is the way of retrieving the data that is encrypted.
Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing.
The Information Technology (IT) Rules, 2021
The IT Rules 2021 seek to address cyber security concerns of the citizens without infringing on their privacy and personal liberties, while maintaining digital sovereignty at the same time.