What is a Phishing?
Phishing is an e-mail-borne fraudulent attempt to obtain confidential information from the recipient such as usernames, passwords, and credit card details by disguising oneself as a reliable entity or downloading malware by clicking on a hyperlink in the message. Scammers impersonate legitimate organisations (banks, government agencies) through emails, SMS, or phone calls, contact people, and…
Read articleOverview of the IT Act: Gopalakrishna Committee Recommendations
The Gopalakrishnan committee is a committee of experts on the concept of non-personal data (NPD) constituted by the Ministry of Electronics & Information Technology (MeitY). The stated goals for the committee were (i). To study various issues relating to non-personal data (NPD). (ii). to make specific suggestions for consideration of the Central Government on the…
Read articleHow to analyse a Cash flow statement?
The Cash flow statement represents the increased or decreased position of cash and cash equivalents in a business. In a way, it is useful in assessing the company’s ability to meet its short-term obligations. Cash equivalent means highly liquid current assets which can be readily converted into cash without any loss in value or time.…
Read articleTypes of Trial Balance and Preparation of a Trial Balance
A trial balance is a list of debits and credit items (assets/liabilities/income/expenses) extracted from the closing balance in each account of the general ledger. This type of report is generated in a double-entry account format before the finalization of the balance sheet on a certain date, usually at the end of an accounting period. There…
Read articleUnderstanding Information Security (I.S) and I.S audit
IS security or information security refers to the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, that includes those measures necessary to detect, document, and counter such threats. It protects information, processes, and communication and protects…
Evaluation requirement for IT security
Evaluation requirement for IT Security refers to the procedure of conducting regular reviews and checks of IT systems to ensure compliance with organizational security policies, standards, and procedures, as well as industry best practices. India has a few IT evaluation requirements, including Common Criteria (CC) Certification, Indian Common Criteria Certification Scheme (IC3S), IoT System Certification…
Read article





