Our Technology

Salient Features

Digital signature has been replaced with electronic signature to make it a more technology neutral act. It elaborates on offenses, penalties, and breaches. It outlines the Justice Dispensation Systems for cyber-crimes. It defines in a new section that cyber café is any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public. It provides for the constitution of the Cyber Regulations Advisory Committee.

Application of the I.T

Negotiable Instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881; A power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882; A trust as defined in section 3 of the Indian Trusts Act, 1882; A will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition; Any contract for the sale or conveyance of immovable property or any interest in such property;


It toughens the collaborative actions, improves awareness, and accelerates the learning procedure. There are three types of interoperability − Semantic (i.e., shared lexicon based on common understanding) Technical Policy − Important in assimilating different contributors into an inclusive cyber-defense structure.


It improves the identification and verification technologies that work in order to provide − Security Affordability Ease of use and administration Scalability Interoperability

What We Do

Social Tactics

Using social tactics such as deception and manipulation to acquire access to data, systems or controls. It includes − pre-texting (forged surveys) inciting phishing retrieving of information through conversation


An attempt to intentionally exploit weaknesses to get unethical access, usually conducted remotely. It may include − data-leakage attacks injection attacks and abuse of functionality spoofing time-state attacks buffer and data structure attacks resource manipulation stolen credentials usage backdoors dictionary attacks on passwords exploitation of authentication


Methods used to damage networks and systems. It includes the following − distributed denial of service attacks impair or deny access to a service or application resource depletion attacks