AIDA - Sub Topic Wise Index
AIDA - Sub Topic Wise Index
Page
No. Topic Sub Topic No.
52 Cyber Security 10 Steps to ensure Cyber Security 40
520 Computer H&S 3D Printing 265
529 Computer H&S 5G 266
344 E-Governance Aadhar Enabled Payment System 188
733 DBM Access and Manipulation of Database Files 334
821 Data Analytics Acquisition - file system forensics process 364
603 Network Security Active Attack 290
56 Cyber Security Additional Challenges and Limitations: Recent Trends 44
136 Cyber Threats Advanced Persistent Threats 89
437 Data Analytics Advantage of Legal Data Analytics 222
851 Info. Sys. Advantages & Disadvantages of Executive Information System 382
960 Internet Advantages and Disadvantages - Digital Currencies 446
20 Cyberspace Advantages of AI in cyberspace 15
690 DBM Advantages of Database 328
721 DBM Advantages of DBMS 332
656 Software Advantages of IAAS 313
881 MIS Advantages of Management Information System 399
570 Computer H&S Advantages of Online Systems 275
660 Software Advantages of PAAS 315
572 Computer H&S Advantages of Real-Time Systems 275
666 Software Advantages of SAAS 318
295 Security Audit Advantages of Security Audit 164
Chatbots and Virtual
13 Assistance Advantages of Using ChatBots and Virtual Assistance 11
25 Cyber Security AI and Cyber Security 20
34 AI AI and Intellectual Property Rights 25
9 AI AI Announcements in Union Budget 2023 7
207 AI AI Methods 113
30 AI AI Versus Ethics & Morality 23
31 AI AI Versus Law and Compliance 24
978 Internet AI, chatbots and shopping assistants 452
205 AI AI: Brief Description 112
2 AI AI: Characteristics 4
32 AI AI’s in the Legal Industry 24
917 ERP AI-Powered Insights and Improvements 424
Amway India Enterprises Pvt Ltd vs. 1Mg Technologies Pvt Ltd &
Another (2019) - non-compliance of the due diligence requirements as
per the Intermediary Guidelines and failure to adhere to their own
179 Case Law policies would make the ecommerce platforms liable 101
S. Page
No. Topic Sub Topic No.
649 Software Security Analysis of Indian law on software security 310
Anil Kumar Srivastava vs. Addl Director, MHFW (2005) - forged the
200 Case Law signature & forged document 109
49 Cyber Security Antivirus - Cyber Security Techniques 39
759 Data Analytics Apache Spark 344
372 Digital India API Setu 192
595 Network Security Application Layer 285
873 Info. Sys. Application of Information Systems in Business 390
921 Internet Application of Internet: Major Types 428
549 Computer H&S Application software 271
576 Computer H&S Application Software 276
627 Software Application Software - Software Classification 302
920 Internet Applications of Internet 428
889 MIS Applications of Management Information System 404
890 MIS Applications of Management Information System in Service Sectors 405
458 QLP Applications of Quantitative Legal Prediction 229
875 Info. Sys. Areas of implementation of Information Systems 391
545 Computer H&S Arithmetic and Logic Unit (ALU) 269
379 Cyber Security Arrangement for continuous surveillance 195
697 DBM Arrays 329
782 Data Analytics Artifacts 348
517 Computer H&S Artificial Intelligence (AI) and Machine Learning 264
557 Computer H&S Artificial Intelligence (AI): Ushering in intelligent enterprise systems 272
122 Cyber Threats Attacks on IoT Devices 88
854 Info. Sys. Attributes of DSS 383
975 Internet Augmented Reality (AR) 451
687 DBM Authentication 327
46 Cyber Security Authentication - Cyber Security Techniques 38
610 Network Security Authentication Applications 292
804 Data Analytics Authenticode 356
688 DBM Authorization 327
Avnish Bajaj v. State (NCT) of Delhi, (2008) 150 DLT 769 -
intermediaries are not obligated to actively track every piece of
information posted on their platforms, they have a duty to promptly
645 Case Law remove any illegal content after receiving notice from the authorities 309
Avnish Bajaj vs. State and the Amendment to the IT Act 2008 - Safe
171 Case Law Harbour 98
S. Page
No. Topic Sub Topic No.
133 Cyber Threats Backdoors 89
718 DBM Backup and Recovery 331
327 MMP Banking - MMP 185
893 MIS Banking Information System 406
770 Data Analytics Bare metal restores 346
101 Cyber Threats Basic elements of Cyber Terrorism 84
568 Computer H&S Batch Processing 274
900 ERP Before ERP and After ERP 413
946 Internet Benefits and Limitations of E-Commerce 436
28 Cyber Security Benefits of AI in Cyber Security 21
209 AI Benefits of AI in India 114
871 Info. Sys. Benefits of an Office Automation System 389
748 Data Analytics Benefits of Data Analytics 341
901 ERP Benefits of Enterprise Resource Planning 415
Bharat National Cyber Security Exercise 2023: Elevating India’s
70 Cyber Security Cybersecurity Preparedness to New Heights 58
465 Machine Learning Bias - Machine Learning 235
463 Machine Learning Bias and Variance in Machine Learning 233
462 Machine Learning Bias/ Variance, Precision/Recall & Dimensionality 233
472 Machine Learning Bias-Variance Trade-Off 238
442 Data Analytics Billing analytics 223
626 Software BIOS 302
962 Internet Block Chain Technology 447
527 Computer H&S Blockchain 266
Blockchain: Augmenting enterprise solutions with transparency,
556 Computer H&S efficiency and security 272
980 Internet Bluetooth and Wi-Fi 452
134 Cyber Threats Bots 89
286 Digital Forensics Branches in Digital Forensics 159
606 Network Security Bridges 291
114 Cyber Threats Brute force 87
241 Cyber Crime Buffer overflow 142
773 Data Analytics Business Continuity/Disaster Recovery (BCDR) 346
439 Data Analytics Business of Law Analytics vis-a-vis Practice Law Analytics 223
446 Data Analytics Case Analytics – Data Analytics 224
641 Case Study Case Study - Mobile Security 307
642 Case Study Case Study - Pune Citibank mphasis Call Centre Fraud 308
640 Software Case Study and Case Laws of Indian Law on Software Security 307
951 Internet Categories of CRM 442
S. Page
No. Topic Sub Topic No.
495 Computer H&S Categories: Types of Computer System 258
CBI v. Arif Azim, (2008) 150 DLT 769 - Section 66C of the IT Act,
2000, which addresses identity theft and the illegal and dishonest use
of electronic passwords, signatures, and other personal identifying
648 Case Law elements 310
Central Government Initiative on Strengthening Mechanism to Lever
258 Cyber Crime Cyber Crimes 144
322 MMP Central government initiatives as Mission Mode Projects (MMP) 185
806 Data Analytics Certificate Authorities (CA) 357
812 Data Analytics Chain of Custody 360
195 Digital India Act Challenges Ahead in the Implementation of DIA, 2023 107
21 Cyberspace Challenges and Opportunities of AI 16
53 Cyber Security Challenges and Restrictions - Cyber Security 41
33 AI Challenges in AI adoption in Law and Compliance 24
844 Info. Sys. Changeover plans for Information System 377
494 Computer H&S Characteristics of a Computer 257
736 DBM Characteristics of data mining 335
738 DBM Characteristics of data warehousing 335
855 Info. Sys. Characteristics of DSS 383
850 Info. Sys. Characteristics of Executive Information System 381
615 Software Characteristics of Good Software 299
880 MIS Characteristics of Management Information System 398
665 Software Characteristics of SAAS 317
Chatbots and Virtual
12 Assistance Chatbots and Virtual Assistance: Boon or Bane 10
Christian Louboutin SAS vs. Nakul Bajaj and Ors (2018) - failing to
observe ‘due diligence’, could amount to ‘conspiring, aiding, abetting or
176 Case Law inducing’ unlawful conduct 100
259 Cyber Crime Citizen Financial Cyber Fraud Reporting and Management System 145
Civil Liability in case of data, computer database theft, privacy violation
216 Data Protection etc. 117
582 Computer H&S Closed source 277
633 Software Closed Source Software 303
912 ERP Cloud ERP 422
772 Data Analytics Cloud virtualization 346
563 Computer H&S Code quality 274
432 Data Analytics Cohort analysis 221
775 Data Analytics Collection Options - Data Analytics 347
S. Page
No. Topic Sub Topic No.
783 Data Analytics Collection Steps 349
848 Info. Sys. Common Benefits of Information system 380
276 Cyber Crime Common cyber-crimes of 2023-2024 154
54 Cyber Security Common Kinds of Cyber-attacks 42
601 Network Security Common Network Attacks 289
341 MMP Common Services Centers - Integrated MMP 187
355 Digital India Common Services Centres 191
197 Companies Act Companies Act, 2013 – Cyber threats and Cyber Law 109
531 Computer H&S Components of Computer System 266
856 Info. Sys. Components of DSS 383
841 Info. Sys. Components of Information System 376
623 Software Components of Language Processor 301
883 MIS Components of Management Information System 400
866 Info. Sys. Components of Transaction Processing System 387
381 Cyber Security Comprehensively address network and database security 196
79 Cyber Security Computer Emergency Response Team (CERT-In) 66
407 Cyber Security Computer Emergency Response Team (CERT-In) - Detailed 211
793 Data Analytics Computer Evidence Processing Steps 351
278 Computer Forensics Computer Forensics 155
277 Computer Forensics Computer Forensics and Digital Evidence 155
282 Computer Forensics Computer Forensics Vis -A- Vis Cyber Security 157
532 Computer H&S Computer hardware 266
801 Data Analytics Computer Image Verification and Authentication 356
544 Computer H&S Computer Peripherals – Inputs, Output, and Storage Devices 269
533 Computer H&S Computer software 267
548 Computer H&S Computer Software : An Introduction 270
541 Computer H&S Computer Storage Capacities 268
493 Computer H&S Computer System: Concept 256
514 Computer H&S Computing Power 264
675 DBM Conceptual Level 326
717 DBM Concurrency Control 331
224 Data Protection law Consent manager 122
684 DBM Constraints 327
445 Data Analytics Contract Analytics – Data Analytics 224
451 Data Analytics Contract Review and Management 225
546 Computer H&S Control Unit 269
784 Data Analytics Controlling Contamination: The Chain of Custody 349
142 Cyber Threats Covid-Themed Phishing Attacks 90
360 Digital India CO-WIN 191
S. Page
No. Topic Sub Topic No.
242 Cyber Crime Cracking 142
331 MMP Crime and Criminal Tracking Network & Systems - State MMP 186
202 Criminal Law Criminal Law is proposed to be replaced from New Legislations 110
Criminal Liability in case of data, computer database theft, privacy
217 Data Protection violation etc. 117
162 Cyber Threats Cryptography 96
950 Internet Customer Relationship Management (CRM) 442
303 Cyber Attack Cyber attack by Tamil Tigers 170
305 Cyber Attack Cyber Attack on Estonia 171
300 Cyber Attack Cyber Attacks in Middle East 170
98 Cyber Threats Cyber Crime 83
238 Cyber Crime Cyber Crime vis-a-vis Indian Scenario 141
383 Cyber Security Cyber Crisis Management Plan 196
61 Cyber Security Cyber expertise is coming to the Boardroom 49
81 Cyber Security Cyber Regulations Appellate Tribunal (CRAT) 67
409 Cyber Security Cyber Regulations Appellate Tribunal (CRAT) - Detailed 212
86 Cyber Security Cyber Resilient Organizational Study (A Caselet) 70
42 Cyber Security Cyber Security 36
299 Security Audit Cyber Security Audit Checklist 169
298 Security Audit Cyber Security Audit: A Snapshot 168
203 Cyber Security Cyber Security Framework (NCFS) 111
44 Cyber Security Cyber Security Fundamentals 37
63 Cyber Security Cyber Security Policies - National and International 49
Cyber Security Policy to be distinct from the broader IT policy / IS
378 Cyber Security Security Policy of a bank 195
71 Cyber Security Cyber Security Policy: International Standards (ISO/IEC) 58
384 Cyber Security Cyber security preparedness indicators 196
45 Cyber Security Cyber Security Techniques 38
75 Cyber Security Cyber Security: Legal and Compliance Assessment 61
76 Cyber Security Cyber Security: Legal Assessment 62
78 Cyber Security Cyber Security: Major Regulating Bodies and Compliance Requirements 66
85 Cyber Security Cyber Security: Recent Government Initiatives in India 68
99 Cyber Threats Cyber Terrorism 83
100 Cyber Threats Cyber Terrorism vis-à-vis Cyber Crime 84
152 Cyber Threats Cyber Threat Hunting and Digital Forensics 93
94 Cyber Threats Cyber Threats 82
97 Cyber Threats Cyber Warfare 82
530 Computer H&S Cybersecurity 266
S. Page
No. Topic Sub Topic No.
Cyber-security awareness among stakeholders / Top Management /
388 Cyber Security Board 197
560 Computer H&S Cybersecurity: A Key consideration when building enterprise solutions 273
417 Data Analytics Data Analysis and Computing 219
423 Data Analytics Data Analysis Steps 220
413 Data Analytics Data Analytics 218
416 Data Analytics Data Analytics and Statistics 219
429 Data Analytics Data Analytics Techniques 221
435 Data Analytics Data Analytics Tools 221
743 Data Analytics Data Analytics Types 340
123 Cyber Threats Data Breaches 88
137 Cyber Threats Data Centre Disrupted by Natural Disaster 89
682 DBM Data Definition Language (DDL) 327
710 DBM Data Definition Language (DDL) 331
125 Cyber Threats Data Destruction 89
713 DBM Data Dictionary 331
243 Cyber Crime Data Didling 142
221 Data Protection law Data fiduciary 122
271 Cyber Crime Data hiding analysis 153
454 Legal Analytics Data Incorporated into Legal Analytics 226
683 DBM Data Integrity 327
716 DBM Data Integrity 331
124 Cyber Threats Data Manipulation 88
711 DBM Data Manipulation Language (DML) 331
418 Data Analytics Data mining 219
735 DBM Data Mining 334
734 DBM Data Mining and Warehousing 334
677 DBM Data Models 327
223 Data Protection law Data principal 122
420 Data Analytics Data Processing 219
222 Data Protection law Data processor 122
204 AI Data Protection and AI: Laws and Regulations 111
211 Data Protection Data Protection: Indian Legal Perspective 115
766 Data Analytics Data Recovery Ethics 345
763 Data Analytics Data Recovery Procedures and Ethics 344
749 Data Analytics Data Recovery Tools 341
686 DBM Data Security 327
715 DBM Data Security 331
S. Page
No. Topic Sub Topic No.
692 DBM Data Structure 328
737 DBM Data Warehousing 335
673 DBM Database Abstraction 326
671 DBM Database Concepts 326
723 DBM Database Files 333
707 DBM Database Management System 331
681 DBM Database Management System (DBMS) 327
516 Computer H&S Datafication 264
708 DBM DBMS Architecture 331
709 DBM DBMS Components 331
714 DBM DBMS Features 331
720 DBM DBMS Users 332
852 Info. Sys. Decision Support system (DSS) 382
95 Cyber Threats Definition of Cyber Threats 82
Chatbots and Virtual
15 Assistance Demerits of Using ChatBots and Virtual Assistance 12
115 Cyber Threats Denial of Service 87
425 Data Analytics Descriptive Analytics 220
744 Data Analytics Descriptive Analytics 340
945 Internet Development of E-commerce 434
625 Software Device Driver 302
426 Data Analytics Diagnostic Analytics 220
745 Data Analytics Diagnostic Analytics 340
116 Cyber Threats Dictionary attacks 87
981 Internet Difference between Bluetooth and Wi-Fi 452
624 Software Difference between Compiler and Interpreter 301
739 DBM Differences between Data Mining and Data Warehousing 336
469 Machine Learning Different Combinations of Bias-Variance - Machine Learning 236
358 Digital India DigiLocker 191
347 E-Governance Digital Cloud for every Indian 188
958 Internet Digital Currency 445
350 Digital India Digital Empowerment 190
764 Data Analytics Digital Ethics 344
156 Cyber Threats Digital Forensics 95
288 Digital Forensics Digital Forensics - Chain of Custody 161
284 Digital Forensics Digital Forensics/ Digital Evidences 158
807 Data Analytics Digital ID 357
803 Data Analytics Digital IDS and Authentication Technology 356
349 Digital India Digital India- Meaning and Concepts 189
S. Page
No. Topic Sub Topic No.
348 Digital India Digital India Program 188
351 Digital India Digital Infrastructure 190
158 Cyber Threats Digital Intellectual Property 95
Digital Personal Data Protection Act, 2023: New Paradigm of Data
77 Cyber Security Privacy and Compliance 65
160 Cyber Threats Digital Rights Management (DRM) 96
164 Cyber Threats Digital Signature Technology 96
48 Cyber Security Digital Signatures - Cyber Security Techniques 39
914 ERP Digital Transformation 423
519 Computer H&S Digital Trust 265
163 Cyber Threats Digital Watermark Technology 96
365 Digital India Diksha 192
482 Data Assessment Direct Assessment - Data Assessment 243
364 Digital India Direct Benefit Transfers 192
343 E-Governance Direct Cash Transfer 188
29 Cyber Security Disadvantages of AI in Cyber Security 22
691 DBM Disadvantages of Database 328
722 DBM Disadvantages of DBMS 333
882 MIS Disadvantages of Management Information System 399
661 Software Disadvantages of PAAS 315
753 Data Analytics Disk Drill 342
147 Cyber Threats Distributed Denial of Service (DDoS) Attacks 91
106 Cyber Threats DNS Spoofing 86
809 Data Analytics Document A Chain of Custody and Its Importance 358
267 Cyber Crime Documentation – Cyber Crimes 151
292 Digital Forensics Documentation/Authentication of Chain of Custody 162
Draft Information Technology [Intermediaries Guidelines (Amendment)
177 IT Act Rules], 2018, (“Draft Rules”) (2018) 100
68 Cyber Security Draft National Cyber Security Strategy 57
138 Cyber Threats Drive-by Downloads 89
551 Computer H&S Driver software 271
67 Cyber Security DSCI – National Cyber Security Strategy Report, 2020 56
789 Data Analytics Duplication and Preservation of Digital Evidence 351
750 Data Analytics EaseUS Data Recovery Wizard 342
340 MMP e-Biz - Integrated MMP 187
944 Internet E-Commerce 434
966 Internet E-Commerce Security – Mobile Commerce 449
339 MMP e-Courts - Integrated MMP 187
524 Computer H&S Edge Computing 265
S. Page
No. Topic Sub Topic No.
953 Internet EDI Documents 443
954 Internet EDI Users 444
335 MMP e-District - State MMP 186
357 Digital India e-District Mission Mode Project (MMP) 191
352 Digital India E-Governance & e-Services 190
311 E-Governance E-Governance in India 182
330 MMP e-Governance in Municipalities - State MMP 186
E-Governance/Digital India: Snap Shot of Recent Government
354 Digital India Initiatives 191
346 E-Governance E-Kranti Scheme 188
952 Internet Electronic Data Interchange (EDI) 443
955 Internet Electronic Fund Transfers (EFT) 444
956 Internet Electronic Funds Transfer (EFT): How it works 444
165 Cyber Threats Electronic Marking 96
842 Info. Sys. Elements of complete Information System implementation 377
73 Cyber Security Elements of Effective Cyber Security Policy 60
6 AI Emergence of AI in a Modern it World 6
26 Cyber Security Emergence of AI in Cyber Security 21
512 Computer H&S Emerging Technologies 262
Emerging technologies related to computer systems and information and
513 Computer H&S communication technologies 264
689 DBM Encryption 327
47 Cyber Security Encryption - Cyber Security Techniques 38
382 Cyber Security Ensuring Protection of customer information 196
323 MMP e-office - MMP 185
334 MMP e-panchayat - State MMP 186
338 MMP e-procurement - Integrated MMP 187
903 ERP ERP Related Technologies 418
464 Machine Learning Errors in Machine Learning 234
228 Data Protection law European Union (Proposed) AI Act, 2024 125
800 Data Analytics Evidence Collection - Digital Crime Scene 355
810 Data Analytics Evidence Collection - Digital ID 358
797 Data Analytics Evidence Collection Procedure 354
811 Data Analytics Evidence Marking and Packaging 359
799 Data Analytics Evidence Notebook 354
788 Data Analytics Evidence Search and Seizure 350
3 AI Evolution of AI 5
206 AI Evolution of AI 112
415 Data Analytics Evolution of Data Analytics 219
S. Page
No. Topic Sub Topic No.
313 E-Governance Evolution of E-Governance 182
233 Data Protection law Evolution of Social Media and Other Intermediaries 129
878 MIS Evolution of the Concept of Management Information System 397
270 Cyber Crime Examination – Cyber Crimes 152
922 Internet Example of Application of Internet 429
4 AI Examples of AI 6
583 Computer H&S Examples of application software 277
489 Data Analysis Examples of Data Analysis 244
967 Internet Examples of M-commerce use in specific industries 449
965 Internet Examples of Payment Gateways 449
869 Info. Sys. Examples of Transaction Processing System 388
761 Data Analytics Excel 344
849 Info. Sys. Executive Information System 381
225 Data Protection law Exemptions under the DPDP Act 123
818 Data Analytics EXT File Systems 363
518 Computer H&S Extended Reality 265
823 Data Analytics Extraction - file system forensics process 364
588 Network Security Extranets 283
431 Data Analytics Factor analysis 221
816 Data Analytics FAT 32 File System 362
815 Data Analytics FAT File System 362
274 Cyber Crime File analysis 154
819 Data Analytics File format 364
118 Cyber Threats File Inclusion attacks 87
768 Data Analytics File Restore 345
611 Network Security Firewall 293
50 Cyber Security Firewall - Cyber Security Techniques 39
795 Data Analytics Forensic Evidence 353
230 Data Protection law Four (4) Point Summary of European Union Proposed AI 126
579 Computer H&S Freeware 277
630 Software Freeware 302
780 Data Analytics Freezing the Scene 348
931 Internet FTP (File Transfer Protocol) 431
577 Computer H&S Function of application software 276
620 Software Functions of an Operating System 300
868 Info. Sys. Functions of Transaction Processing System 388
11 AI Future of AI in India 9
974 Internet Future of Mobile Commerce 451
491 Data Analysis Future of network analysis in legal history 248
S. Page
No. Topic Sub Topic No.
667 Software Future of SAAS 318
Gagan Harsh Sharma vs. State of Maharashtra (2018) - issue of non-
201 Case Law bailable and non-compoundable offences & bailable and compoundable 110
Gathering Evidence- Precautions, Preserving And Safely Handling
774 Data Analytics Original Media For Its Admissibility 346
521 Computer H&S Genomics 265
227 Data Protection law Global Data Protection Models – Cyber Crimes 125
419 Data Analytics Google Web Search 219
943 Internet Gopher. 434
231 Data Protection law Governance 128
395 Cyber Security Governance - Cyber Security 204
319 E-Governance Government to Businesses (G2B) - E-Governance 184
318 E-Governance Government to Citizen (G2C) - E-Governance 184
320 E-Governance Government to Employees (G2E) - E-Governance 184
317 E-Governance Government to Government (G2G) - E-Governance 184
703 DBM Graphs 330
8 AI Growth of AI vis-a-vis Indian Vision: Glimpse of Future of India 7
Guidelines Related to Social Media to Be Administered by Ministry of
235 Data Protection law Electronics and IT 130
309 Hacking Hacking 174
509 Computer H&S Handheld game console 262
732 DBM Hashed Files 334
333 MMP Health - State MMP 186
704 DBM Heaps 330
450 Data Analytics Help perform Due Diligence 225
726 DBM Hierarchal Files 333
678 DBM Hierarchical Model 327
781 Data Analytics Honey Potting 348
891 MIS Hospital Information System 405
892 MIS Hotel Information System 405
808 Data Analytics How Authenticode works with VeriSign Digital IDs? 358
839 Computer Forensics How does computer forensics work? 371
899 ERP How ERP Works 413
845 Info. Sys. How Information System is Useful for Business 378
87 Cyber Security How organizations measured the increase in severity of incidents 72
475 Machine Learning How to avoid the Overfitting in Model 240
470 Machine Learning How to identify High variance or High Bias? 237
933 Internet HTTP (Hyper Text Transfer Protocol) 432
934 Internet HTTPS (Hyper Text Transfer Protocol Secure) 432
S. Page
No. Topic Sub Topic No.
155 Cyber Threats Hunting Steps 94
485 Data Analysis I C - Customer Analysis 243
658 Software IAAS : Storage 314
654 Software IAAS Platform and Architecture 312
655 Software IAAS Pricing 313
653 Software IAAS Services 312
939 Internet ICMP 433
396 Cyber Security Identify - Cyber Security 205
486 Data Analysis II C - Competitor Analysis 244
487 Data Analysis III C - Corporation Analysis 244
941 Internet IMAP 433
Immigration, Visa and Foreigner’s Registration & Tracking (IVFRT) -
324 MMP MMP 185
706 DBM Implementation of Data Structures 330
843 Info. Sys. Implementation Plans of Information System 377
438 Data Analytics Implementing Data Analytics to Legal Practice 223
389 Cyber Security Implications of RBI Requirements - Cyber Security 197
837 Computer Forensics Importance - computer forensics 371
828 Data Analytics Importance - Data privacy 367
798 Data Analytics Incident Coordinator 354
10 AI Increase in AI Usage in Various Sectors 8
22 AI Increased AI Interest in India 17
731 DBM Indexed Files 334
208 AI India and AI 113
301 Cyber Attack India and Pakistan Conflict - Cyber Attacks 170
India is the 80th most targeted country worldwide in cybercrime:
239 Cyber Crime Report 141
220 Data Protection law India’s Digital Personal Data Protection Act, 2023: Key Provisions 122
307 Cyber Attack Indian Law & Cyber Terrorism 171
212 Data Protection Indian Laws for Data Protection 116
198 IPC Indian Penal Code, 1860 – Cyber threats and Cyber Law 109
483 Data Assessment Indirect Assessment - Data Assessment 243
7 AI Influence on Modern Society – AI 7
840 Info. Sys. Information System 376
874 Info. Sys. Information System in Daily life 390
876 Info. Sys. Information Systems and Security 392
888 MIS Information systems that are part of management information system 403
218 IT Act Information Technology (Amendment) Act, 2008 119
S. Page
No. Topic Sub Topic No.
Information Technology (Intermediary Guidelines and Digital Media
232 Data Protection law Ethics Code) Rules 2021 128
Information Technology (Intermediary Guidelines and Digital Media
180 IT Act Ethics Code) Rules, 2021 101
169 IT Act Information Technology Act, 2000 (IT Act) 98
182 IT Act Information Technology Act, 2000 (IT Act, 2000) 102
213 Data Protection Information Technology Act, 2000 and Data Protection 117
187 IT Act Information Technology Rules (IT Rules) 104
Initiatives to Regulate and Control Cyber Crimes: Governmental and Law
257 Cyber Crime Enforcement Agencies 143
353 Digital India Initiatives under Digital India 190
105 Cyber Threats Injection attacks 86
144 Cyber Threats Insider Threats 91
410 Cyber Security Insurance Regulatory and Development Authority (IRDAI) 212
337 MMP Integrated Mission Mode Projects - E-Governance 187
139 Cyber Threats Intellectual Property Theft 89
72 Cyber Security International Convention on Cyberspace 60
74 Cyber Security International Convention on Cyberspace: A Brief Timeline 60
International Principles Governing AI, Cyber Security and Cyberspace:
404 Cyber Security An Overview 209
589 Network Security Internet 283
597 Network Security Internet Layer 286
528 Computer H&S Internet of Things (IoT) 266
594 Network Security Internet Protocol Suite 285
923 Internet Internet Protocols 430
587 Network Security Intranets 283
1 AI Introduction – AI 4
492 Computer H&S Introduction - Computer Hardware And Software 256
236 Cyber Crime Introduction - Cyber Crimes And Investigation Procedures 140
92 Cyber Threats Introduction – Cyber threats and Cyber Law 80
412 Data Analytics Introduction – Data Analytics and Law 218
896 ERP Introduction - Enterprise Resource Management 412
877 MIS Introduction - Management Information Systems – An Overview 396
584 Network Security Introduction - Network Basics And Security 282
613 Software Introduction - Softwares And Software Security 298
741 Data Analytics Introduction to Data Analytics 340
436 Data Analytics Introduction to Legal Analytics 222
447 Data Analytics Introduction to Machine Learning for Lawyers 224
264 Cyber Crime Investigation of Cyber Crimes under Indian Laws 149
S. Page
No. Topic Sub Topic No.
283 Computer Forensics Investigations vide Computer Forensics 157
926 Internet IP Address 430
937 Internet IPv4 432
938 Internet IPv6 432
83 Cyber Security IRDAI - Regulating Body - Cyber Security 67
380 Cyber Security IT architecture should be conducive to security 195
Kalandi Charan Lenka vs. the State of Odisha (2017) - guilty of
199 Case Law cyberstalking 109
Kent Ro Systems Ltd & Anr vs. Amit Kotak & Ors (2017) - intermediary,
before posting any information on its computer resources is required to
satisfy itself that the same does not infringe the intellectual property
175 Case Law rights of any person 100
575 Computer H&S Key differences between online and real-time systems 275
872 Info. Sys. Key features of an Office Automation System 389
705 DBM Key Features of Data Structures 330
414 Data Analytics Kinds of Data collected by Company 219
185 Case Law Kumar vs. Whiteley (1991) - unauthorized use of broadband Internet 102
559 Computer H&S Language and framework trends for developing enterprise apps 273
621 Software Language Processor 301
506 Computer H&S Laptops 261
Chatbots and Virtual
14 Assistance Latest Trends – Chatbots and Virtual Assistance 12
181 Cyber Threats Laws Applicable to AI and Cyber Laws 102
592 Network Security Layers of OSI model 284
670 Software Legal and Compliance Requirements of Software Security 319
794 Data Analytics Legal Aspects of Collecting and Preserving Computer 353
102 Cyber Threats Legal Provisions dealing with Cyber terrorism 84
796 Data Analytics Legal Requirements – Forensic Evidence 353
453 Data Analytics Legal Research – Data Analytics 226
Legal/Regulatory regime of “Intermediary/Online Platform Liability” in
168 Cyber Threats India 97
167 Cyber Threats Liability of Online Platforms 97
902 ERP Limitations of Enterprise Resource Planning 417
571 Computer H&S Limitations of Online Systems 275
459 QLP Limitations of Quantitative Legal Prediction 231
573 Computer H&S Limitations of Real-Time Systems 275
867 Info. Sys. Limitations of Transaction Processing Systems 387
696 DBM Linear Data Structures 329
S. Page
No. Topic Sub Topic No.
698 DBM Linked Lists 329
778 Data Analytics Live Forensics 348
534 Computer H&S Liveware 267
771 Data Analytics Local virtualization 346
272 Cyber Crime Log files analysis 154
477 Machine Learning Logistic Regression in Machine Learning 241
562 Computer H&S Low-Code Development 273
M/S Luxottica Group S.P.A & Another vs. M/S Mify Solutions Pvt Ltd &
Ors (2019) - trademark infringement suit and sells counterfeit products
178 Case Law online 101
498 Computer H&S Mainframe 259
23 AI Major Challenges of AI in India 18
957 Internet Major Features of Electronic Funds Transfer (EFT) 445
Major reasons which necessitates the introduction of proposed Digital
192 Digital India Act India Act 106
126 Cyber Threats Malvertising 89
150 Cyber Threats Malvertising 92
244 Cyber Crime Malware 142
110 Cyber Threats Malware 87
111 Cyber Threats Malware on Mobile Apps 87
119 Cyber Threats Man in the Middle Attacks 87
858 Info. Sys. Management Information System (MIS) 384
862 Info. Sys. Management Information System and Its Application 386
894 MIS Management Information System and Other Academic Disciplines 406
887 MIS Management Information System and Other Information Systems 403
895 MIS Management Information System and Security 407
62 Cyber Security Managing Third-Party risk to stay resilient 49
Master Direction on Information Technology Governance, Risk, Controls
390 Cyber Security and Assurance Practices 199
443 Data Analytics Matter analytics 224
478 Machine Learning Maximum Likelihood Estimation (MLE) 241
MC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra, CM APPL. No. 33474
of 2016 - The court emphasized that after obtaining notification from
the person who is impacted or a court order, intermediaries must take
immediate action to remove unlawful information. attention to the
necessity for a balance between the protection of free expression and
647 Case Law the protection of reputation and privacy. 309
S. Page
No. Topic Sub Topic No.
973 Internet M-commerce vs. E-commerce 450
312 E-Governance Meaning of E-Governance 182
373 Digital India MeitY 192
547 Computer H&S Memory Registers 270
362 Digital India MeriPehchaan 191
787 Data Analytics Methodology Development 350
779 Data Analytics Methods of Collection 348
269 Cyber Crime Methods to preserve the Digital Evidence 151
501 Computer H&S Microcomputers 260
504 Computer H&S Microcontroller 260
511 Computer H&S Microcontrollers 262
552 Computer H&S Middleware 272
500 Computer H&S Midrange Computers 259
884 MIS MIS and Its Functional Subsystems 401
555 Computer H&S Mixed Reality (MR): High potential in enterprise solutions 272
367 Digital India M-KISAN 192
977 Internet Mobile banking 451
970 Internet Mobile banking 450
370 Digital India Mobile based advisory system for agriculture & Horticulture (M4AGRI) 192
505 Computer H&S Mobile Computers 261
919 ERP Mobile ERP 424
971 Internet Mobile payments 450
976 Internet Mobile SEO 451
969 Internet Mobile shopping 450
979 Internet Mobile ticketing 452
398 Cyber Security Monitoring and Detection - Cyber Security 208
433 Data Analytics Monte Carlo simulations 221
566 Computer H&S Multi-Processing 274
565 Computer H&S Multi-Programming 274
My Space Inc. vs. Super Cassettes Industries Ltd. (2017) - actual or
specific knowledge of the existence of infringing content on their
174 Case Law website from content owners 100
361 Digital India MyGov 191
345 E-Governance MyGov Citizen Portal 188
363 Digital India MyScheme 191
366 Digital India National Agriculture Market (e-NAM) 192
National Critical Information Infrastructure Protection Center
80 Cyber Security (NCIIPC) 66
S. Page
No. Topic Sub Topic No.
National Critical Information Infrastructure Protection Center
408 Cyber Security (NCIIPC) - Detailed 211
65 Cyber Security National Cyber Security Policy -2013 50
69 Cyber Security National Cyber Security Strategy 2023: Latest Updates 57
66 Cyber Security National Cyber Security Strategy: Recent Trends 56
321 E-Governance National E-governance Plan - E-Governance 184
336 MMP National Land Records Modernization Programme (NLRMP) - State MMP 186
190 Digital India Act Necessity for Digital India Act (DIA) 105
16 Cyberspace Need and Significance of AI in Cyberspace 13
191 Digital India Act Need for Digital India Act 105
925 Internet Need of Protocols 430
507 Computer H&S Netbook 261
598 Network Security Network Access/Interface Layer 286
488 Data Analysis Network Analysis and Law 244
605 Network Security Network Devices Hubs 290
727 DBM Network Files 334
679 DBM Network Model 327
585 Network Security Network Security 282
590 Network Security Networking Concepts 284
522 Computer H&S New Energy Solutions 265
189 Digital India Act Nine Pillars of Digital India 105
701 DBM Non-Linear Data Structures 330
695 DBM Non-Primitive Data Structures 329
817 Data Analytics NTFS File System 363
314 E-Governance Objectives of E-Governance 183
879 MIS Objectives of Management Information System 397
586 Network Security Objectives of Network Security 283
728 DBM Object-Oriental Files 334
776 Data Analytics Obstacles 347
405 Cyber Security OECD AI Principles: Overview 210
870 Info. Sys. Office Automation System 388
668 Software On Premise Software 319
368 Digital India One Stop Window 192
569 Computer H&S On-Line and Real Time Processing 275
Online and real-time systems are two different types of computer
574 Computer H&S systems used in organizations 275
371 Digital India Open Government Data 192
632 Software Open Source Software 303
S. Page
No. Topic Sub Topic No.
591 Network Security Open System Interconnection (OSI) Model 284
581 Computer H&S Open-source 277
619 Software Operating System 300
729 DBM Organization of Database Files 334
387 Cyber Security Organizational arrangements 197
19 Cyberspace Organizations operating online can benefit from AI 15
406 Cyber Security Other Applicable Regulatory Framework 211
915 ERP Other Technology Integrated With ERP 423
629 Software Other Types of Software on The Basis of Availability and Shareability 302
564 Computer H&S Outsourcing 274
474 Machine Learning Overfitting - Machine Learning 239
473 Machine Learning Overfitting, Underfitting, & Cross-Validation 238
237 Cyber Crime Overview of Cyber Crimes 140
457 QLP Overview of Quantitative Legal Prediction (QLP) 228
659 Software PAAS 314
949 Internet Parts of Supply Chain Management 440
602 Network Security Passive Attack 289
964 Internet Payment Portal - Digital Currencies 448
326 MMP Pensions - MMP 185
402 Cyber Security Periodic Audit - Cyber Security 209
503 Computer H&S Personal Computer or PC 260
219 Data Protection law Personal Data Protection Bill, 2019 - Key Highlights 121
916 ERP Personalization 423
245 Cyber Crime Phishing 142
108 Cyber Threats Phishing 86
149 Cyber Threats Phishing 92
674 DBM Physical Level (Internal Level) 326
315 E-Governance Pillars of E-Governance 183
905 ERP Planning Evaluation and Selection of ERP Systems 420
24 AI Policy Changes Needed for AI in India 19
146 Cyber Threats Polyglot Files 91
Poona Auto Ancillaries Pvt. Ltd., Pune vs. Punjab National Bank, HO New
184 Case Law Delhi & Others (2018) - Responding to Phishing mail 102
936 Internet POP3 (Post Office Protocol 3) 432
599 Network Security Ports 287
186 IT Act Positive and negative aspects of IT Act, 2000 103
328 MMP Posts - MMP 186
930 Internet PPP (Point-to-Point Protocol) 431
S. Page
No. Topic Sub Topic No.
444 Data Analytics Practice of Law Analytics 224
452 Data Analytics Predict Legal Outcomes 225
427 Data Analytics Predictive Analytics 220
746 Data Analytics Predictive Analytics 341
918 ERP Predictive Analytics 424
421 Data Analytics Predictive Modeling 219
428 Data Analytics Prescriptive Analytics 220
747 Data Analytics Prescriptive Analytics 341
275 Cyber Crime Presentation – Cyber Crimes 154
268 Cyber Crime Preservation – Cyber Crimes 151
790 Data Analytics Preserving the Digital Crime Scene 351
535 Computer H&S Primary and Secondary Storage 267
694 DBM Primitive Data Structures 329
291 Digital Forensics Procedure to establish the Chain of Custody 162
290 Digital Forensics Process of Chain of Custody 161
742 Data Analytics Process of Data Analytics 340
261 Cyber Crime Process of Reporting a Cyber Crime 146
266 Cyber Crime Process of search & arrest – Cyber Crimes 149
553 Computer H&S Programming software 272
561 Computer H&S Progressive Web Applications (PWAs) 273
Proposed Digital India Act: An Act in Progress to replace Information
188 IT Act Technology Act, 2000 105
961 Internet Pros & Cons of Digital Currencies 447
861 Info. Sys. Pros & Cons of MIS 385
93 Cyber Threats Pros and Cons of Information Technology 81
669 Software Pros and Cons of On-Premise Software 319
397 Cyber Security Protection - Cyber Security 205
215 Data Protection Provisions pertaining to data protection and personal data protection 117
332 MMP Public Distribution System - State MMP 186
805 Data Analytics Public Key Cryptography 357
308 Cyber Attack Punishment for cyber terrorism 172
672 DBM Purpose of Database 326
663 Software Purpose-Built PAAS Types 316
758 Data Analytics Python 343
456 QLP Quantitative Legal Prediction Vis-À-Vis Business of Law 228
497 Computer H&S Quantum Computer 259
525 Computer H&S Quantum Computing 266
712 DBM Query Language 331
700 DBM Queues 330
S. Page
No. Topic Sub Topic No.
757 Data Analytics R Programming 343
536 Computer H&S RAM (Random Access Memory) - Primary Storage 267
121 Cyber Threats Ransomware 88
88 Cyber Security Ransomware and how much it costs organizations 72
143 Cyber Threats Ransomware Attacks 90
762 Data Analytics RapidMiner 344
234 Data Protection law Rationale and Justification for New Guidelines 130
542 Computer H&S Raw Capacity 268
375 Cyber Security RBI and Artificial Intelligence: Evolving Governance 193
377 Cyber Security RBI Cyber Security Circular 195
376 Cyber Security RBI Cyber Security Framework 194
374 Cyber Security RBI Regulations governing AI, Cyber Security and Cyberspace 192
RBI’s Updated Master Direction: Navigating the Digital Landscape
391 Cyber Security Safely 200
141 Cyber Threats Recent Cybers Threats - 2022 90
18 Cyberspace Recent Example of Cyber Attacks 14
36 AI Recent Indian case laws related to AI and intellectual property 28
342 E-Governance Recent Initiatives - E-Governance 187
911 ERP Recent Trends in ERP: 2023 422
785 Data Analytics Reconstructing the Attack 349
824 Data Analytics Reconstruction - file system forensics process 365
831 Data Analytics Recover Swap Files/Temporary Files/Cache Files 368
826 Data Analytics Recovery of Internet Usage Data 365
751 Data Analytics Recuva 342
430 Data Analytics Regression analysis 221
725 DBM Relational Data 333
680 DBM Relational Model 327
825 Data Analytics Reporting - file system forensics process 365
260 Cyber Crime Reporting of Cyber Crime 145
17 Cyberspace Requirement of AI in Cyberspace 14
35 AI Requirement of Amendment in Laws 27
64 Cyber Security Requirement of Cyber Security Policies 50
Requirement of Industry Alignment towards Goals and Proposed
194 Digital India Act Structure of DIA 107
827 Data Analytics Requirements of remote recovery 366
490 Data Analysis Research Case of Network Analysis in Law 245
399 Cyber Security Response and Recovery - Cyber Security 208
302 Cyber Attack Retribution by China 170
834 Data Analytics Retrieving cached files 369
S. Page
No. Topic Sub Topic No.
833 Data Analytics Retrieving deleted files 369
835 Data Analytics Retrieving files in unallocated space 369
449 Data Analytics Review Documents and Legal Research 224
38 AI Right to Privacy (Aadhaar Case) 31
57 Cyber Security Rise of AI Threats and Cybersecurity: Predictions for 2024 48
58 Cyber Security Rise of Specialized Language Models 48
523 Computer H&S Robotic Process Automation (RPA) 265
127 Cyber Threats Rogue Software 89
281 Computer Forensics Role of Computer Forensics 157
765 Data Analytics Role of Digital Ethics in Data Storage 345
886 MIS Role of Management Information System in Decision Making 402
860 Info. Sys. Role of MIS in various deptartments 385
537 Computer H&S ROM (Read-Only Memory) - Primary storage 267
246 Cyber Crime Rootkit 142
754 Data Analytics R-Studio 342
685 DBM Rules 327
664 Software SAAS Services 317
SAAS; PAAS, IAAS and On-Premise Software: Overview and Recent
652 Software Trends 312
170 IT Act Safe Harbour Protection 98
791 Data Analytics Safeback – Data Evidence 351
247 Cyber Crime Salami Attack 143
193 Digital India Act Salient Features of Proposed Digital India Act 107
760 Data Analytics SAS 344
719 DBM Scalability 332
786 Data Analytics Searching and Seizing 349
82 Cyber Security SEBI - Regulating Body - Cyber Security 67
SEBI Cyber Security Guidelines, 2023 – Cyber Security and Cyber
394 Cyber Security Resilience framework for Portfolio Managers 203
393 Cyber Security SEBI Regulations Governing AI, Cyber Security and Cyberspace 201
540 Computer H&S Secondary memory - Characteristics 268
538 Computer H&S Secondary memory - meaning 268
539 Computer H&S Secondary memory - Types 268
600 Network Security Secure Protocols 288
293 Security Audit Security Audit - Computer Forensics 163
608 Network Security Security Devices 292
166 Cyber Threats Security Features of Operating System 97
730 DBM Sequential Files 334
499 Computer H&S Server Computer 259
S. Page
No. Topic Sub Topic No.
107 Cyber Threats Session Hijacking 86
932 Internet SFTP (Secure File Transfer Protocol) 431
39 Case Law Shamnad Basheer vs. Union of India - NLSIU candidate Admission 31
580 Computer H&S Shareware 277
631 Software Sharewares 303
400 Cyber Security Sharing of information - Cyber Security 208
385 Cyber Security Sharing of information on cyber-security incidents with RBI 196
310 Hacking Short list of great hackers of the world 174
Shreya Singhal v. Union of India (AIR 2015 SC 1523) - S.66A to be
unconstitutional as it was ambiguous, overbroad, and unclear, thus
infringing the fundamental right of free speech and expression
644 Case Law guaranteed under Art. 19(1)(a) of the Constitution 308
Shreya Singhal vs. Union of India (2015) - directions to intermediaries
173 Case Law to disable specific content 99
43 Cyber Security Significance of Cyber Security 36
898 ERP Significance of ERP 413
289 Digital Forensics Significance of maintaining Chain of Custody 161
294 Security Audit Significance of Security Audit 164
515 Computer H&S Smarter Devices 264
510 Computer H&S Smartphone 262
929 Internet SMTP (Simple Mail Transfer Protocol) 431
792 Data Analytics Snapback – Data Evidence 351
248 Cyber Crime Sniffer 143
249 Cyber Crime Social Engineering 143
148 Cyber Threats Social Engineering 92
616 Software Software Classification 299
634 Software Software Security 303
637 Software Software Security Goals 305
636 Software Software Security: A Proactive Security 304
638 Software Software Security: Best Practices 305
635 Software Software Security: Overview and Significance 303
554 Computer H&S Software Trends 272
614 Software Software-Overview 298
369 Digital India Soil Health Card 192
Solution – Confrontation Strategy to Challenges and Limitations of
55 Cyber Security Cyber Attack 43
814 Data Analytics Some commonly used file systems 362
306 Cyber Attack Sony PlayStation Network, Microsoft’s Xbox Live network case 171
S. Page
No. Topic Sub Topic No.
96 Cyber Threats Sources of Cyber Threats 82
109 Cyber Threats Spear Phishing 87
802 Data Analytics Special Needs of Evidential Authentication 356
440 Data Analytics Spend analytics 223
60 Cyber Security Spike in Third-Party Data Breaches 48
250 Cyber Crime Spoofing 143
251 Cyber Crime Spyware 143
112 Cyber Threats Spyware 87
942 Internet SSH 433
699 DBM Stacks 330
906 ERP Stage 1 - Plan Requirement - ERP Systems 422
907 ERP Stage 2 - Request For Proposals (RFP) - ERP Systems 422
908 ERP Stage 3 - Solution Evaluation - ERP Systems 422
909 ERP Stage 4 - Contract Negotiation - ERP Systems 422
910 ERP Stage 5 - Selection and Agreement - ERP Systems 422
329 MMP State Mission Mode Projects - E-Governance 186
263 Cyber Crime State Nodal Officer and Grievance Officer – Cyber Crimes 149
State of Tamil Nadu v. Suhas Kutti, CC No. 4680 of 2004 - application
of IPC provisions to cases of online harassment and has brought
attention to the necessity for legislation and regulations to deal with
646 Case Law the particular problems created by cybercrime 309
252 Cyber Crime Steganography 143
51 Cyber Security Steganography - Cyber Security Techniques 40
752 Data Analytics Stellar Data Recovery 342
297 Security Audit Steps – On Conducting Security Audit 165
Steps for companies prepare for compliance under the Digital Personal
226 Data Protection law Data Protection Act 123
285 Digital Forensics Steps in Digital Forensics 159
287 Digital Forensics Steps in Preserving Digital Evidence 160
820 Data Analytics Steps in the file system forensics process 364
157 Cyber Threats Steps of Digital Forensics 95
37 AI Steps of Government of India on AI: A Snap Shot 29
210 AI Steps taken by the Government 114
229 Data Protection law Summary of European Union proposed AI Act 126
496 Computer H&S Supercomputer 258
386 Cyber Security Supervisory Reporting framework 197
140 Cyber Threats Supply Chain Attacks 89
145 Cyber Threats Supply Chain Attacks 91
S. Page
No. Topic Sub Topic No.
90 Cyber Security Supply chain attacks and disaster recovery 74
948 Internet Supply Chain Management 440
607 Network Security Switch 291
Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr. [Andhra
High Court, reported as 2005 CriLJ 4314] - reprograming the handset
by alteration of ESN by service providers like TATA Indicom, is an
643 Case Law offence under Section 65 of the Information Technology Act, 2000 308
550 Computer H&S System software 271
129 Cyber Threats System-Based Attacks 89
617 Software Systems Software 300
756 Data Analytics Tableau Public 343
508 Computer H&S Tablet 262
928 Internet TCP/IP (Transmission Control Protocol/ Internet Protocol) 431
593 Network Security TCP/IP Model (The Internet Protocol Suite) 285
161 Cyber Threats Technical Protection Measures (TPM) 96
Telecom Regulatory Authority of India (TRAI) & Department of
411 Cyber Security Telecommunications (DoT) 213
935 Internet TELNET (Terminal Network) 432
41 AI The Facial Recognition Case 31
40 AI The Gig Economy Case 31
183 IT Act The important provisions of IT Act, 2000 102
651 Software Security The Indian Penal Code (IPC 1980) 311
The Information Technology (Intermediaries Guidelines) Rules, 2011
172 IT Act (“Intermediary Guidelines”) (2011) 99
650 Software Security The Information Technology Act (IT Act 2000) 310
558 Computer H&S The Internet of Things (IoT) 272
392 Cyber Security Thematic Objectives of the New RBI Master Directions 201
59 Cyber Security Threat Actors will use AI to get ahead 48
153 Cyber Threats Threat Hunting Investigations 93
154 Cyber Threats Threat Hunting Techniques 94
273 Cyber Crime Time frame analysis 154
434 Data Analytics Time series analysis 221
567 Computer H&S Time Sharing 274
755 Data Analytics Tips for using Data recovery tool effectively 342
240 Cyber Crime Tools and Techniques used to Commit Cyber Crimes 142
471 Machine Learning Trade Offs and Bias - Machine Learning 237
84 Cyber Security TRAI & DoT - Regulating Body - Cyber Security 67
401 Cyber Security Training - Cyber Security 209
963 Internet Transaction Process - Block Chain Technology 447
S. Page
No. Topic Sub Topic No.
863 Info. Sys. Transaction Processing System 386
865 Info. Sys. Transaction Processing System Features 387
813 Data Analytics Transfer of Evidence to Property Room 361
846 Info. Sys. Transformation of Business through Information System 379
596 Network Security Transport Layer 286
702 DBM Tress 330
484 Data Analysis Triple C Theory and Data Analysis 243
481 Data Assessment Triple C Theory and Data Assessment 242
253 Cyber Crime Trojan 143
132 Cyber Threats Trojan horse 89
120 Cyber Threats Trojans 87
913 ERP Two-tier ERP 423
904 ERP Type of ERP System Modules 418
604 Network Security Types of Active Attack 290
5 AI Types of AI 6
578 Computer H&S Types of application software 277
91 Cyber Security Types of attacks for which organizations have incident response plans 74
280 Computer Forensics Types of Computer Forensics 156
838 Computer Forensics Types of computer forensics - Data Analytics 371
103 Cyber Threats Types of Cyber Threats/ Attacks 85
424 Data Analytics Types of Data Analytics 220
767 Data Analytics Types of Data Recovery 345
693 DBM Types of Data Structures 329
724 DBM Types of Database Files 333
853 Info. Sys. Types of decision in DSS 382
959 Internet Types of Digital Currencies 445
857 Info. Sys. Types of DSS 384
947 Internet Types of E-Commerce (B2B, B2C, C2C and C2B) 439
612 Network Security Types of Firewall 294
847 Info. Sys. Types of Information System 380
316 E-Governance Types of Interaction in E-Governance 183
927 Internet Types of Internet Protocol 430
622 Software Types of Language processor 301
968 Internet Types of M-commerce 450
859 Info. Sys. Types of MIS 384
609 Network Security Types of Network Security Devices 292
296 Security Audit Types of Security Audit 164
618 Software Types of system software 300
S. Page
No. Topic Sub Topic No.
864 Info. Sys. Types of Transaction Processing System 386
657 Software Typical use case IAAS 314
940 Internet UDP 433
UNCLTRAL (United Nations Commission on International Trade Law)
214 Data Protection model law 117
476 Machine Learning Underfitting - Machine Learning 240
897 ERP Understanding Enterprise Resource Planning (ERP) 413
356 Digital India Unified Mobile Application for New-age Governance (UMANG) 191
359 Digital India Unified Payment Interface (UPI) 191
325 MMP Unique Identification Number (UID) - MMP 185
128 Cyber Threats Unpatched Software 89
117 Cyber Threats URL Interpretation 87
543 Computer H&S Usable Capacity 269
Usage of computer forensics software tools to cross-validate findings in
836 Computer Forensics computer evidence- related cases 370
662 Software Use Cases for PAAS 315
448 Data Analytics Use of AI and Machine Learning in Law 224
27 Cyber Security Use of AI in Cyber Security 21
279 Computer Forensics Use of Computer Forensics 156
740 DBM Uses of Data Mining and Data Warehousing 336
461 QLP Using QLP for Profiling Judges and its Rule of Law Implications 233
460 QLP Using QLP to Predict Court Case Outcomes 232
628 Software Utility Software 302
Utilization of Management Information System in Indian Business
885 MIS Scenario 401
822 Data Analytics Validation and discrimination - file system forensics process 364
467 Machine Learning Variance Error - Machine Learning 235
441 Data Analytics Vendor analytics 223
403 Cyber Security Vendors or Service Providers - Cyber Security 209
676 DBM View Level (External Level) 326
526 Computer H&S Virtual Reality and Augmented Reality 266
254 Cyber Crime Virus 143
130 Cyber Threats Virus 89
422 Data Analytics Visualization 219
777 Data Analytics Volatile Evidence 348
769 Data Analytics Volume Restore 346
196 Digital India Act Way Forward for Effective Implementation of DIA, 2023 108
159 Cyber Threats Ways for Protection of Digital / Intellectual Property 96
832 Data Analytics Ways to Recover Deleted Temp Files 369
S. Page
No. Topic Sub Topic No.
466 Machine Learning Ways to reduce High Bias - Machine Learning 235
468 Machine Learning Ways to Reduce High Variance - Machine Learning 236
455 Legal Analytics Ways to use Legal Analytics 226
104 Cyber Threats Web-Based Attacks 86
What are some of the challenges businesses face when protecting user
830 Data Analytics privacy? 368
What are some of the challenges users face when protecting their
829 Data Analytics online privacy? 367
479 Machine Learning What is the likelihood? - Maximum Likelihood Estimation 242
639 Software What to Avoid in Software Security? 306
265 Cyber Crime Who can investigate? – Cyber Crimes 149
89 Cyber Security Why organizations infected by ransomware refused to pay a ransom 73
113 Cyber Threats Wiper Attacks 87
262 Cyber Crime Work Flow for Reporting a Cyber Crime 147
924 Internet Working of Internet Protocol 430
480 Machine Learning Working of Maximum Likelihood Estimation 242
972 Internet Working of Mobile Commerce 450
502 Computer H&S Workstation Computer 260
255 Cyber Crime Worm 143
131 Cyber Threats Worm 89
304 Cyber Attack Yugoslavia Conflict 170
135 Cyber Threats Zero-Day Exploits 89
151 Cyber Threats Zero-Day Exploits 92
256 Cyber Crime Zombie 143