India's Cybersecurity Architecture: A Comprehensive Analysis of CERT-In and Police Cyber Cells

India's Cybersecurity Architecture: A Comprehensive Analysis of CERT-In and Police Cyber Cells


This comprehensive blog has been prepared as an activity 'Hackathon for Social Media Awareness Campaign' of Cyberclub-MKBU (Maharaja Krishnakumarsinhji Bhavnagar University) to provide students and cybersecurity enthusiasts with an in-depth understanding of India's national cybersecurity framework. As digital transformation accelerates across India through initiatives like Digital India, understanding the institutional mechanisms that protect our cyberspace becomes increasingly critical. This blog synthesizes multiple perspectives on India's dual-pillar cybersecurity architecture combining technical incident response through CERT-In with criminal investigation through Police Cyber Cells to offer a holistic view of how the nation defends against cyber threats.




Introduction

In an era where cyber threats have escalated from mere inconveniences to matters of national security, understanding how nations defend their digital infrastructure is no longer optional it's essential. As future cybersecurity professionals, technology leaders, legal experts, and informed citizens, we must comprehend not just the technical aspects of cyber defense, but also the regulatory, investigative, and collaborative mechanisms that form the backbone of a nation's security apparatus.

India, as the world's most populous democracy and one of the fastest-growing digital economies, faces unique cybersecurity challenges. With over 2.27 million cyber incidents reported in 2024 alone and financial fraud losses exceeding ₹36,450 crore, the stakes have never been higher. Yet, India has responded with one of the world's most comprehensive and stringent cybersecurity frameworks a dual-pillar architecture that seamlessly integrates technical response capabilities with criminal investigation powers.



Part I: Understanding India's Cybersecurity Ecosystem

The Digital Transformation and Security Imperative

The digital transformation of the Indian state has fundamentally reconfigured the nation's security landscape. As critical services, financial transactions, and citizen data migrate to the cloud and interconnected networks, vulnerability to sophisticated cyber threats has grown exponentially. In response, the Government of India has established a multi-layered governance structure characterized by a functional division between technical incident response and criminal investigation.

This architecture is anchored by two primary pillars:

  1. The Indian Computer Emergency Response Team (CERT-In) under the Ministry of Electronics and Information Technology (MeitY)

  2. Specialized Cyber Cells of State Police and Union Territory forces, coordinated through the Ministry of Home Affairs' Indian Cyber Crime Coordination Centre (I4C)

The Rising Stakes: A Global Context

The financial cost of cybercrime is escalating at an alarming rate. Monetary damage reported to the US Internet Crime Complaint Center surged from $3.5 billion in 2019 to a staggering $10.3 billion in 2022. In India, by early 2025, financial cyber fraud losses reported through the National Cyber Crime Reporting Portal reached ₹36,450 crore. These figures underscore the urgent need for robust national defense strategies.



Part II: CERT-In - The Technical Guardian of Indian Cyberspace

Origins and Statutory Foundation

The Indian Computer Emergency Response Team, commonly referred to as CERT-In or IN-CERT, serves as the national nodal agency for responding to computer security incidents within the Indian cyber community. Established on January 19, 2004, the agency was initially a functional unit within MeitY but gained robust statutory backing through the Information Technology (Amendment) Act of 2008.

Specifically, Section 70B of the IT Act designates CERT-In as the national agency responsible for a comprehensive suite of cybersecurity functions. Its mission is to enhance the security of India's communications and information infrastructure through proactive action and effective collaboration.

What is a CERT?

A Computer Emergency Response Team (CERT) or Computer Security Incident Response Team (CSIRT) is a national-level organization tasked with preventing cyber-attacks and coordinating the technical response to security incidents. The historical foundation for this model is the CERT Division of Carnegie Mellon University, widely considered "the birthplace of cybersecurity." For over 35 years, this pioneering organization has partnered with government, industry, and law enforcement to advance the practice of cybersecurity.

Core Functions and Mandate

CERT-In performs several critical functions:

  • Collection, analysis, and dissemination of information on cyber incidents

  • Forecasting and issuing alerts for cyber security threats

  • Taking emergency measures for handling cyber security incidents

  • Coordinating cyber incident response activities across stakeholders

  • Issuing guidelines, advisories, vulnerability notes, and whitepapers relating to information security practices

The agency's vision is to contribute proactively to securing India's cyberspace and building a safe and trusted cyber ecosystem for its citizens.

Organizational Structure and Leadership

CERT-In is headed by a Director General, currently Dr. Sanjay Bahl, a renowned cybersecurity expert who provides strategic leadership. The technical infrastructure includes application servers, next-generation firewalls with combined capabilities of botnet control and antivirus, and intrusion prevention systems at the gateway.

Specialized Operational Units

National Cyber Coordination Centre (NCCC): Acts as a control room that scans the national cyberspace to generate real-time situational awareness of existing and potential threats. It facilitates coordination among different agencies by sharing metadata from cyberspace, allowing stakeholder organizations and state governments to take pre-emptive action.

Cyber Swachhta Kendra: Launched in 2017, this Botnet Cleaning and Malware Analysis Centre focuses on securing the digital ecosystem for citizens by detecting botnet infections and providing free tools and guidance for malware removal.

CSIRT-Fin: A specialized incident response team specifically for the financial sector, recognizing the critical nature of financial infrastructure.

Empanelled Security Auditing Organizations: CERT-In maintains an extensive panel of approximately 200 empanelled security auditing organizations as of 2024 that support and audit the implementation of information security best practices across government and critical sectors.


Part III: The Revolutionary 6-Hour Reporting Mandate

The April 2022 Directive

A watershed moment in Indian cybersecurity regulation occurred on April 28, 2022, when CERT-In issued a set of directions under Section 70B(6) of the IT Act. These directions, which became effective in June 2022, imposed some of the world's strictest incident reporting and data retention requirements on service providers, intermediaries, data centers, and body corporates.

Understanding the 6-Hour Rule

The most prominent feature of the 2022 directive is the requirement that all cyber security incidents must be reported to CERT-In within six hours of being noticed or brought to the attention of the entity. This requirement applies to a broad range of incidents, including:

  • Targeted scanning of critical networks

  • Unauthorized access to systems

  • Data breaches

  • Ransomware attacks

  • Attacks on IoT devices

  • Fake mobile apps

  • Unauthorized access to social media accounts

  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks

Global Comparison: India vs. The World

India's 6-hour rule is dramatically stricter than those in other major jurisdictions:

Country/Region

Regulation/Authority

Reporting Deadline

Key Details

India

CERT-In

6 hours

Mandatory for a wide range of specified incidents

United Kingdom

NIS Regulations / ICO

72 hours

Triggered by incidents with 'substantial impact'

Australia

SOCI Act / ACSC

12 hours (verbal), 84 hours (written)

Multi-stage approach for critical infrastructure

Germany

BSIG / BSI

'Immediately'

Applies to critical infrastructure operators

European Union

EU Regulation

24 hours

Limited to trust service providers

France

EU GDPR / CNIL

72 hours

For personal data breaches likely to result in risk

Canada

PIPED Act

'As soon as feasible'

Triggered by 'Real Risk of Significant Harm'

USA (DoD)

CMMC / DFARS

72 hours

Specific to defense industrial base

This means Indian companies must produce a report in less than 9% of the time allotted to their European counterparts under GDPR.

Industry Criticism and Government Rationale

The aggressive deadline drew sharp criticism from a coalition of industry associations, including the US Chamber of Commerce (USCC), US-India Business Council (USIBC), and The Software Alliance (BSA), who argued the rule could make it difficult for businesses to operate in India.

However, the Indian government maintained that the complexity and speed of modern cyberattacks often conducted from remote jurisdictions necessitate immediate notification for national-level mitigation. While international standards often provide a 72-hour window, India's approach reflects a clear priority: national security over business convenience.

Beyond the 6-Hour Rule: Comprehensive Compliance Requirements

The 2022 directives introduced several other stringent requirements:

Log Retention: All entities must enable and securely maintain logs of all their Information and Communication Technology (ICT) systems for a rolling period of 180 days within Indian jurisdiction.

Data Provider Requirements: Data Centers, Virtual Private Server (VPS) providers, Cloud Service providers, and Virtual Private Network (VPN) providers must register and maintain detailed subscriber information for 5 years, even after cancellation of service. This includes:

  • Validated names

  • Physical addresses

  • Contact numbers

  • Periods of hire

  • IP addresses allotted

  • Email addresses and timestamps at registration

  • Purpose for hiring the service

KYC for Virtual Assets: Virtual asset service providers, virtual asset exchange providers, and custodian wallet providers must maintain Know Your Customer (KYC) information and records of all financial transactions for 5 years to ensure traceability.

Time Synchronization: All entities must synchronize their ICT system clocks with the Network Time Protocol (NTP) servers of the National Informatics Centre (NIC) or the National Physical Laboratory (NPL).

Designated Point of Contact: Every organization must designate a Point of Contact to interface with CERT-In.

Penalties for Non-Compliance

Failure to comply with these directions is punishable under Section 70B(7) of the IT Act, 2000, with penalties that may extend to imprisonment for up to one year, a fine of up to one lakh rupees, or both.



Part IV: Police Cyber Cells - The Investigative Arm

The Law Enforcement Framework

While CERT-In addresses the technical and systemic layers of cybersecurity, the investigative and prosecutorial functions reside with the specialized Cyber Cells of state and union territory police forces. These units are tasked with the registration of FIRs (First Information Reports), collection of digital evidence, identification of perpetrators, and submission of charge sheets in courts of law.

Organizational Hierarchy

State Level - State Cyber Crime Coordination Cell (SCCCC):

  • Headed by Additional Director General of Police (ADGP) or Inspector General of Police (IGP)

  • Designated as the State Cyber Crime Coordinator

  • Responsible for setting up institutional mechanisms at district and police station levels

  • Oversees capacity building and provides high-end lab resources

District Level - Cyber Crime Cells:

  • Headed by Deputy Superintendent of Police (DSP) or Additional Superintendent of Police (Addl. SP)

  • Supported by Inspectors and Sub-Inspectors

  • Each district cell supported by at least three domain experts in information technology, mobile telephony, digital forensics, and cyber law

Forensic and Investigative Competencies

Cyber Cells operate under procedural guidelines established by the Ministry of Home Affairs and various judicial precedents. Their investigative workflow involves:

  1. Securing the crime scene to prevent unauthorized access to devices

  2. Documenting the state of seized devices

  3. Using write-blockers during data acquisition to prevent accidental alteration

  4. Maintaining rigorous chain of custody

  5. Using specialized tools like Faraday bags to isolate mobile devices from network signals

Officers are encouraged to obtain professional certifications such as:

  • Certified Cyber Crime Investigator (CCCI)

  • Computer Hacking Forensic Investigator (CHFI)

  • Certified Information Systems Security Professional (CISSP)

Investigative Scope

The investigative scope covers a wide range of offenses:

  • Financial fraud (phishing, vishing)

  • Crimes against women and children (cyberstalking, harassment)

  • Identity theft

  • Data breaches

  • Online harassment and bullying

  • Digital payment fraud


Part V: I4C - The Central Coordination Hub

Establishment and Role

The Indian Cyber Crime Coordination Centre (I4C), established by the Ministry of Home Affairs in 2018 and formally inaugurated in 2020, serves as the central node for coordinating the battle against cybercrime across India. Effective July 1, 2024, I4C has been designated as an Attached Office of the MHA, further solidifying its role in the national security apparatus.

The Seven-Pillar Framework

1. National Cybercrime Threat Analytics Unit (TAU): Produces cybercrime threat intelligence reports by analyzing interconnected pieces of various crimes and identifying interstate linkages.

2. National Cybercrime Reporting Portal (NCRP): The portal (cybercrime.gov.in) allows citizens to report all types of cybercrime, with special focus on crimes against women and children. Integrated with a 1930 helpline for immediate reporting of financial frauds. Over ₹1,100 crore saved for victims in 4 lakh cases.

3. Platform for Joint Cybercrime Investigation Teams: Facilitates coordinated action against organized cybercrime networks operating across state borders. Seven teams established for crime hotspots like Jamtara and Mewat.

4. National Cybercrime Forensic Laboratory (NCFL) Ecosystem: Provides state-of-the-art forensic assistance to Law Enforcement Agencies, including a dedicated facility in New Delhi and a newer center in Assam.

5. National Cybercrime Training Centre (NCTC): Offers standardized curricula and a massive open online course (MOOC) platform called CyTrain, which has certified over 50,000 officials as of 2024.

6. Cybercrime Ecosystem Management Unit: Develops partnerships between academia, industry, and government to spread awareness and establish standard operating procedures.

7. National Cyber Crime Research and Innovation Centre: Tracks emerging technological developments and predicts potential vulnerabilities.

Key Initiatives and Impact

CFCFRMS (Citizen Financial Cyber Fraud Reporting and Management System): Successfully disrupted scam networks by blocking over 10 lakh SIM cards, 2 lakh IMEI numbers, and 2,800 fraudulent URLs.

Pratibimb Module: Maps the locations of criminals and their infrastructure in real-time, facilitating arrest of 16,840 accused through location tracking.

Suspect Registry: Introduced in 2024, contains data on over 1.4 million cybercriminals linked to financial fraud, shared in real-time with all banks and financial institutions to monitor suspicious transactions.


Part VI: Legal Framework and Digital Evidence

Admissibility of Digital Evidence

The success of Cyber Cells in the courtroom depends on their ability to prove the authenticity and integrity of digital evidence. In India, the primary legal standards are set by the Information Technology Act, 2000, and the recently enacted Bharatiya Sakshya Adhiniyam (BSA), 2023, which replaced the Indian Evidence Act, 1872.

Section 65B and Certification Standards

Under the traditional framework, Section 65B was the cornerstone of digital evidence admissibility. It established that any information contained in an electronic record would be deemed a document if the computer producing it was used regularly and was operating properly at the time.

The most critical procedural requirement is the Section 65B(4) certificate, which must be signed by a responsible official to confirm the source and authenticity of the electronic record.

Key judicial decisions:

  • Anvar P.V. v. P.K. Basheer (2014): Supreme Court ruled that a Section 65B certificate is mandatory for admitting secondary electronic evidence.

  • Shafhi Mohammad (2018): Suggested the requirement might be procedural and not always mandatory for a party not in possession of the original device.

Transition to New Criminal Laws (2024)

As of July 1, 2024, the Indian criminal justice system transitioned to:

  • Bharatiya Nyaya Sanhita (BNS) - replacing IPC

  • Bharatiya Nagarik Suraksha Sanhita (BNSS) - replacing CrPC

  • Bharatiya Sakshya Adhiniyam (BSA) - replacing Evidence Act

Major Procedural Shifts:

  1. Explicit Definitions: Section 2(8) of BNS expands the definition of "document" to include electronic and digital records.

  2. Procedural Modernization: BNSS allows for digital service of summons and filing of e-FIRs remotely without jurisdictional limitations.

  3. Mandatory Forensics: Under Section 176(3) of BNSS, forensic analysis is now mandatory for crimes with punishment of seven years or more.

  4. Victim-Centric Approach: BNS broadens the scope of harassment against women to include digital venues, addressing modern threats like online shaming and cyberbullying.


Part VII: Cyber Crisis Management

The CCMP Framework

CERT-In has formulated the Cyber Crisis Management Plan (CCMP) for implementation by all central and state government departments and critical sectors. The CCMP provides a strategic roadmap for a multi-disciplinary approach to identifying, responding to, and recovering from cyberattacks.

Severity Levels and Response

Level 1 (Individual Organization): The affected entity isolates the system, preserves logs, and implements technical advisories provided by CERT-In.

Level 2 & 3 (National/Regional): Involve multiple organizations or sectors and require strategic coordination by the NCCC, Sectoral CERTs, and top-tier governance bodies like the National Cyber Security Committee.

Core Principles

The plan emphasizes "Protect, Detect, and Respond" as its core principles. Organizations are required to:

  • Appoint a Chief Information Security Officer (CISO)

  • Maintain a Crisis Management Group led by the head of the organization

  • Conduct regular cybersecurity mock drills (over 100 conducted by CERT-In involving thousands of organizations)


Part VIII: Case Study - The 2022 AIIMS Delhi Cyber Attack

The Incident

The ransomware attack on the All India Institute of Medical Sciences (AIIMS), Delhi, in late 2022 serves as a definitive case study in the collaborative role of CERT-In and Cyber Cells during a national security crisis. On November 23, 2022, the e-Hospital servers hosting patient registration, billing, and lab services were compromised by a ransomware strain, forcing the institution to switch to manual operations for over 15 days.

Multi-Agency Response

The response involved unprecedented inter-agency cooperation:

Technical Recovery: CERT-In and the National Informatics Centre (NIC) worked on technical recovery and forensic analysis of the five affected servers.

Criminal Investigation: Led by Delhi Police's Intelligence Fusion and Strategic Operations (IFSO) unit, which registered an FIR under Section 66F of the IT Act (cyber terrorism).

Joint Probe: National Investigation Agency (NIA), Central Bureau of Investigation (CBI), Intelligence Bureau (IB), and I4C joined the investigation.

Key Findings

  • Breach made possible due to improper network segmentation

  • Attackers allegedly demanded ₹200 crore in cryptocurrency

  • Over 1TB of hospital data was encrypted

  • Medical records of high-profile government officials were compromised

Outcome and Impact

The government denied the ransom theory and focused on data restoration from unaffected backup servers. The incident prompted:

  • A nation-wide security audit of government-run healthcare facilities

  • Reinforced classification of health data as part of critical national infrastructure

  • Emphasis on the importance of network segmentation and backup protocols


Part IX: Building a Compliant Cyber Defense

The Modern Cybersecurity Team

Meeting a 6-hour reporting deadline is practically impossible without a well-structured team and pre-defined plan. The modern cybersecurity team requires an eclectic mix of skills that goes beyond technical prowess.

Key Roles:

Chief Information Security Officer (CISO): The strategic leader responsible for the overall security program. This role is often filled by MBA-qualified executives with years of business experience who understand both the cyber world and the business world. The CISO bears ultimate accountability for avoiding penalties of non-compliance, which include imprisonment and significant fines.

Security Analyst: The first responder responsible for detecting and analyzing incidents to meet the 6-hour deadline. Ensures correct system clocks are synchronized with NTP servers of the NIC or NPL.

Security Engineer: Develops, deploys, and configures security solutions necessary for continuous monitoring and logging, directly addressing CERT-In's mandate for maintaining ICT logs for a rolling 180-day period.

Penetration Tester: Often called an "ethical hacker," this professional proactively finds and helps remediate vulnerabilities before they can be exploited by malicious actors.

Domain Experts: Specialists in information technology, mobile telephony, digital forensics, and cyber law who supplement the technical skills of other team members.

The Investigative Mindset

The skills required go far beyond technical prowess; team members need a holistic understanding of hacker techniques, their motivations, and a deep appreciation of the business itself. A cybersecurity team needs to think like an anti-crime unit. This investigative mindset is critical in a world where a reportable 'incident' can be something as subtle as network probing, not just a full-blown attack.

Computer Security Incident Response Plan (CSIRP)

This team must operate with a tactical playbook. A modern incident response lifecycle has three core components:

  1. Incident Response Policy: Defines key roles, responsibilities, and specific triggers that activate incident response procedures.

  2. Incident Response Plan (CSIRP): Outlines step-by-step tactical actions from initial detection through full recovery.

  3. Ongoing Risk Management: Focuses on continuous improvement by regularly testing the plan, performing post-incident reviews, and addressing lessons learned.

Crucially, the CSIRP must be explicitly designed to align with regulatory reporting requirements, ensuring that the 6-hour mandate is embedded into the workflow.

The Virtual Security Team Model

For many businesses, the traditional model of building a large, in-house cybersecurity team is becoming obsolete. The primary challenges are pace and cost. Keeping up with the rapid evolution of security tools is a constant struggle, and the capital required to hire and retain talent for highly specialized roles is often prohibitive.

Consequently, virtual security teams, with retainer-based professionals and specialized knowledge, become the only viable option for many organizations. This shift to a virtual, outsourced model is a strategic response to a regulatory environment that is becoming increasingly complex and unforgiving.



Part X: Future Outlook and Global Cooperation

Artificial Intelligence: Double-Edged Sword

As India enters the mid-2020s, the cybersecurity landscape is being redefined by Artificial Intelligence (AI) and the rise of sophisticated, often state-sponsored, threat actors. CERT-In and I4C are increasingly integrating AI-driven analytics and automation to detect and respond to incidents in real-time.

Dr. Sanjay Bahl has highlighted that while AI provides advanced threat detection and forensic capabilities, it also enables "malicious AI-enabled attacks" that are harder to detect through traditional signature-based security. In 2024, India reported a sharp increase in cyber incidents, with nearly 2.27 million cases tracked by CERT-In.

International Cooperation

Cyber threats don't respect national borders, which means an effective defense cannot afford to, either. CERT-In has entered into international cooperation arrangements with over a dozen countries, including Japan, Russia, the United Kingdom, and the United States, for collaborating in cybersecurity research and threat intelligence exchange.

A 2025 MoU between the U.S. and India specifically focuses on collaboration in cybercrime investigations between the U.S. Homeland Security Investigations (HSI) and I4C. The CyberEast project has worked to develop Standard Operating Procedures (SOPs) to streamline cooperation between national CSIRTs and law enforcement agencies.

Strategic Resilience Metrics

Metric

2022

2023

2024

Reported Cyber Incidents

1,391,457

1,592,917

2,041,360

Mock Drills Conducted

90+

100+

109

Participating Organizations

1,100+

1,300+

1,438

Saved Financial Amount (Fraud)

~₹200 crore

~₹600 crore

₹1,100+ crore



Part XI: Operational Synergy - The Complete Response Workflow

The Seamless Handoff

The security of Indian cyberspace depends on the seamless handoff between technical responders and criminal investigators. When a significant breach occurs, the process typically follows a defined path:

1. Detection and Technical Mitigation:

  • Affected entity reports the incident to CERT-In within six hours

  • CERT-In's Incident Response Team provides technical analysis to contain the threat and restore systems

2. Information Sharing:

  • Relevant threat intelligence and metadata shared through the CyMAC platform with I4C and state Cyber Cells

3. Criminal Investigation:

  • If the incident involves a crime (fraud, extortion), victim files complaint via NCRP

  • District Cyber Cell initiates investigation, utilizing technical indicators of compromise (IoCs) provided by CERT-In or I4C's Threat Analytics Unit

4. Forensic and Legal Action:

  • Digital evidence processed at NCFL or state forensic lab

  • Evidence certified following requirements of BSA to ensure admissibility in court

This dual-pillar approach ensures that while the immediate technical "fire" is extinguished by CERT-In, the "arsonist" is identified and prosecuted by the Police Cyber Cells.


Conclusion: Navigating the New Era of Cyber Accountability

India's cybersecurity architecture represents one of the most comprehensive and stringent national cybersecurity frameworks in the world. The CERT-In directives, led by the aggressive 6-hour reporting rule, place a significant compliance burden on businesses but reflect a clear government strategy to strengthen national security by ensuring that critical incident information is available for rapid response and investigation.

Seven Uncomfortable Truths of Modern Cyber Defense

  1. The Clock is Ticking: India's 6-hour rule is the strictest in the world 9% of the time given under GDPR.

  2. Cybersecurity Has a Birthplace: The CERT Division at Carnegie Mellon University is "the birthplace of cybersecurity."

  3. Teams Think Like Cops: Modern cybersecurity requires an investigative mindset and business acumen, not just technical skills.

  4. The Future is Virtual: In-house teams are becoming obsolete; virtual security teams with specialized knowledge are the viable option.

  5. Privacy Services Aren't Anonymous: VPNs and crypto wallets must maintain detailed customer data for five years in India.

  6. "Incident" is Broadly Defined: Even network probing and fake apps are reportable incidents under CERT-In directives.

  7. Defense is a Team Sport: International cooperation through MoUs and SOPs is essential for effective cyber defense.

The Path Forward

This development signals a broader global shift towards greater cyber accountability. The era of reactive, ad-hoc cybersecurity is over. The future of business resilience in India and beyond will depend on an organization's ability to build a proactive and highly organized defense model, equipped with the right team, a tested plan, and the capacity to act with speed and precision.

The institutionalized nationwide integrated system comprising the National Cyber Security Committee for agency coordination, CERT-In for technical defense, and I4C for law enforcement support now serves as a comprehensive shield against the multifaceted threats of the digital age. The ongoing modernization of criminal laws and the deployment of AI-based monitoring systems suggest that India is building a resilient digital infrastructure capable of defending against both current threats and the unknown challenges of the future.

As our digital lives and economies become ever more intertwined, the question remains: How do we ensure our laws and collaborative efforts can keep pace with the threats of tomorrow?


Works Cited

"All about digital evidence." iPleaders, blog.ipleaders.in/all-about-digital-evidence/. Accessed 31 Dec. 2025.

"All India Institute of Medical Sciences (AIIMS), Delhi: Cyberattack Puts Digitalisation Under Scanner." Journal of the Indian Medical Association, jim.imibh.edu.in/doi/pdf/10.1177/ijim.241240911.pdf. Accessed 31 Dec. 2025.

"All Major and Minor Changes in India's New Criminal Laws: BNS, BNSS, and BSA Explained." LegalOnus, legalonus.com/all-major-and-minor-changes-in-indias-new-criminal-codes-bns-bnss-and-bsa-explained/. Accessed 31 Dec. 2025.

"BRIDGING PHYSICAL & CYBER CRIMES IN BHARATIYA NYAYA SANHITA 2023." JETIR, vol. 11, no. 8, Aug. 2024, www.jetir.org/papers/JETIR2408430.pdf. Accessed 31 Dec. 2025.

"CERT-In Certification: What You Need to Know." WeSecureApp, wesecureapp.com/blog/cert-in-certification-what-you-need-to-know/. Accessed 31 Dec. 2025.

"CERT-In hosts visiting foreign journalists for an interaction on India's cybersecurity framework." Press Information Bureau, 17 Dec. 2024, www.pib.gov.in/PressReleasePage.aspx?PRID=2203387. Accessed 31 Dec. 2025.

"Cert-In's six hour reporting rule for cyber security incidents - Statutory Interpretation and Analysis." Argus Partners, www.argus-p.com/papers-publications/thought-paper/cert-ins-six-hour-reporting-rule-for-cyber-security-incidents-statutory-interpretation-and-analysis/. Accessed 31 Dec. 2025.

"CHAPTER – I." Ministry of Electronics and Information Technology, Mar. 2024, www.meity.gov.in/static/uploads/2024/03/Chapter-1-1.pdf. Accessed 31 Dec. 2025.

"CHAPTER - VI." Ministry of Electronics and Information Technology, Mar. 2024, www.meity.gov.in/static/uploads/2024/03/Chapter-6_1.pdf. Accessed 31 Dec. 2025.

"Curbing Cyber Frauds in Digital India." Press Information Bureau, 18 Nov. 2024, www.pib.gov.in/PressReleasePage.aspx?PRID=2176146. Accessed 31 Dec. 2025.

"Cyber Crisis Management Plan." Scribd, www.scribd.com/document/435018403/Cyber-Crisis-Management-Plan. Accessed 31 Dec. 2025.

"Cyber security and financial fraud combat." Press Information Bureau, 27 Dec. 2024, www.pib.gov.in/PressReleasePage.aspx?PRID=2205201. Accessed 31 Dec. 2025.

"Cyber security infrastructure." Press Information Bureau, 19 Dec. 2024, www.pib.gov.in/PressReleasePage.aspx?PRID=2197529. Accessed 31 Dec. 2025.

"Cyberciminals hacked AIIMS' servers, encrypted 1TB-plus hospital data: MoS Chandrasekhar." The Times of India, 23 Dec. 2022, timesofindia.indiatimes.com/gadgets-news/cyberciminals-hacked-aiims-servers-encrypted-1tb-plus-hospital-data-mos-chandrasekhar/articleshow/97820546.cms. Accessed 31 Dec. 2025.

"decoding the cert-in directive for enterprises to report cyber incidents." Tata Communications, tatacommunications.com/hubfs/47271964/TaCO-2024/security/doc/ensuring-cert-in-compliance-for-reporting-cyber-security-incidents.pdf. Accessed 31 Dec. 2025.

"Details about Indian Cybercrime Coordination Centre (I4C) Scheme." Ministry of Home Affairs, www.mha.gov.in/en/division_of_mha/cyber-and-information-security-cis-division/Details-about-Indian-Cybercrime-Coordination-Centre-I4C-Scheme. Accessed 31 Dec. 2025.

"Developing a cybersecurity crisis management plan." DCAF – Geneva Centre for Security Sector Governance, www.dcaf.ch/sites/default/files/publications/documents/Booklet-cyber-crisis-managment-EN.pdf. Accessed 31 Dec. 2025.

"Difference Between IPC and BNS (2025 Updated)." Zolvit, www.zolvit.com/blog/difference-between-ipc-and-bns/. Accessed 31 Dec. 2025.

"Electronic Evidence Understanding through Case Laws." RostrumLegal, www.rostrumlegal.com/electronic-evidence-understanding-through-case-laws/. Accessed 31 Dec. 2025.

"Electronic Evidence-Key Components." S3waas, cdnbbsr.s3waas.gov.in/s37a68443f5c80d181c42967cd71612af1/uploads/2025/03/202503192042830769.pdf. Accessed 31 Dec. 2025.

"F.No 24013/31/2015-CSR-IVICIS Government of India/Bharat..." भारतसरकार.भारत.in, भारतसरकार.भारत.in/sites/default/files/2022-08/CIS_AdvisoryCyberC


Comments

Popular posts from this blog

Socrates: The Life and The Trial

An Astrologer’s Day by R K Narayan

Teacher's Day 2024

The Poet's Insight

W.H. Auden's Poems

Comparative Analysis of Chaucer, Spenser and Shakespeare

Heroism and Memory in Hemingway’s "For Whom the Bell Tolls"

Aristotle's Poetics : Death Of a Salesman

Assignment- Paper:-102: Literature of the Neo-Classical period

An Artist of the Floating World