slugCyber Security in India’sTourism
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2013, Vol 1, Issue 2
Abstract
The growing use of ICT for administration of all the spheres of our daily life cannot be ignored. Also, we also cannot ignore the need to secure the ICT infrastructures used for meeting social function like Tourism. Tourism is a very large industry in India. India has the fifth rank among countries with the fastest growing tourism industry according to the data given by World Travel and Tourism Council. Every year thousand of foreign tourists arrive in India mainly from Union Territories, Unites States and UK. Also, domestic tourists visit the states like Uttar Pradesh, Andhra Pradesh, Tamil Nadu, Himachal Pradesh, Jammu & Kashmir, Chennai, Delhi, Mumbai and many more places. So, the threat of Cyber Security in India’s tourism has put an immense challenge during the last so many years. The threat attacks in resorts, hotels, banks, tourist offices and across all the major tourist places have become an inadequate mechanism to address this challenge. The roll of ICT (Information and Communication Technology) has exposed the users to a huge data bank of information regarding their bank a/c number, credit/debit card number, contact number or any type of personal information etc. and all these information are very much vulnerable if we talk about the use of computers and internet in the field of tourism and hence the probability of cyber attacks cannot be denied. This paper is in regard with the understanding of the nature and effectiveness of cyber security and making an effort to address this challenge, highlighting what could be done. With the advanced development in the country and with the use of tools like email, online shopping, cell phones, satellite phones, on line ticket booking, online reservations etc. , cyber security has become an important issue related to the cyber tourism. The electronic gazettes like computers, laptops, mobiles etc. are being used as a weapon. It is generally unlawful attack and the related threats against the computers, networks & information stored, and cause enough harm to generate fear amongst the local as well as foreign tourists.
Authors and Affiliations
Peeyush Vyas
To Study the Variation in Compressive and Split Tensile Strength of Concrete by Using Various Binders
This paper accentuates the effect of bentonite, sugarcane molasses, jaggery and polyvinyl acetate on strength properties of concrete. The experimentation has been carried out to assess the strength properties of concret...
Analysis of Natural Convection Heat Transfer from Rectangular Fin with Different Forms of Perforation Using Finite Element Analysis
This study examines the natural convective heat transfer from rectangular fins with different forms of perforations under natural convection. In this analysis six different forms of perforations are used with including...
Energy Efficient Intelligent Street Lightning using systems ZigBee and sensors
Solar Photovoltaic panel based street lighting systems are becoming more common these days. But the limitation with these ordinary street light systems is that it lacks intelligent performance. It is very essential to a...
Culture-Free Detection of Enterotoxigenic Escherichia Coli in Food by Polymerase Chain Reaction
Microbial quality of food has immense importance for protection of human health in rural and urban settings. Rapid and specific detection of enterotoxigenic Escherichia coli (ETEC) is critical for the management of the...
Communication System in Hawk Aircraft Using Integrated Communication
The ICRNI [1] system forms an integrated part of a modern avionics system. The system provides the pilot with an effective and efficient means of performing the communication, radio navigation support and identification...