India Questions ICANN Policy-2(ICP-2)

India’s Ministry of Electronics and Information Technology (MeitY) has opposed ICANN’s raised concerns about how regional bodies manage and distribute Internet addresses, emphasizing the need for a more equitable governance model. As the global body overseeing the Domain Name System (DNS), ICANN’s proposals are central to ongoing discussions about evolving Internet governance frameworks, with India advocating for changes that reflect the interests of all stakeholders, especially nations from the Global South.

The concern arises when in October 2024, ICANN opened a comment period on its Internet Coordination Policy 2 (ICP-2), which sets the criteria for recognizing new Regional Internet Registries (RIRs). These RIRs play a critical role in managing the allocation and registration of IP addresses within their respective regions. A key point of contention in ICP-2 is a clause that grants significant decision-making authority to the Number Resource Organisation-Executive Council (NRO EC). This council, made up of the five existing RIRs, would have the power to propose the recognition or derecognition of new RIRs, subject to ICANN’s approval.

India has raised concerns regarding this proposal, highlights a lack of transparency in ICANN’s decision-making processes, stronger accountability, stresses the importance of global representation, advocating for a more inclusive governance structure that gives equitable voice to nations from the Global South. These reforms, India believes, are essential to ensure a fair and representative future for global internet governance.

Why It Matters:

The outcome of this debate holds significant importance as it will shape the future of global internet governance, influencing how the internet is managed, regulated, and governed worldwide. As a major player in the global digital economy, India’s stance carries considerable weight, with far-reaching implications for the country’s digital growth, security, and its role in shaping international internet policies.

What India Demands:

India has called for a revision of ICANN’s proposal to address its key concerns, including the need for greater transparency, accountability, and global representation. The government stresses the importance of adopting a multistakeholder approach to Internet governance, one that actively involves governments, civil society, and the private sector.

Instead of granting power to the NRO EC, MeitY has recommended a more inclusive, multi-stakeholder approach to recognising new RIRs. The Indian government has urged ICANN to involve its broader community in developing the evaluation process for new RIRs. This approach would help ensure that decision-making is fair, transparent, and not dominated by any group.

MeitY also suggested that ICANN establish an independent body to assess new RIR proposals. Such a body would ensure that the process remains transparent and balanced, helping to build trust among stakeholders and minimise any bias in the system.

India’s Concerns on Amendments and Derecognition of RIRs

India has voiced reservations about the proposed rules for amending ICP-2 and the process for derecognizing Regional Internet Registries (RIRs). The draft policy requires unanimous approval from all existing RIRs for any amendments, a condition India argues grants excessive control to these entities. While acknowledging the importance of involving RIRs, India stressed that no single registry or group should hold veto power.

The proposal, which is believed to shift governance dynamics or increase the role of specific stakeholders, has raised apprehensions about fairness, accountability, and its alignment with national interests. As a key player in the global Internet ecosystem, India has consistently advocated for a more inclusive, multilateral approach to internet governance, one that ensures equal representation of nations in decision-making processes

“Balancing Growth and Bias: Most Indian Firms Concerned About AI Integrity”

“Explore India’s pivotal role in AI governance, addressing data bias, and fostering equitable advancements. Learn how businesses can balance innovation with responsibility to drive ethical AI leadership.”

In recent years, the world has rapidly embraced AI, transforming industries and reshaping everyday experiences. As one of the fastest-growing economies, India is emerging as a global leader in technology and AI adoption. The country’s AI market is projected to reach $17 billion by 2027, with an impressive annual growth rate of 25-30%. While many organizations view AI as a reliable driver of growth at both individual and organizational levels, others struggle with the challenges it poses, particularly data bias. A recent report suggested that 69% of the Indian companies are concerned about data bias while 55% trusting AI/ML and trying to increase their reliability on the AI market.

technology, business, analysis

Data bias is a significant challenge in any system, but in AI, it demands even greater attention and action. When data used in AI systems is biased, it results in outputs that are skewed, discriminatory, or misinterpreted—particularly in critical domains such as finance, healthcare, and recruitment. The impact of AI bias extends beyond technical issues, influencing societal concerns like gender inequality. In response to this challenge, India has partnered with NITI Aayog to address these biases and promote the development of responsible AI. However, the real test lies in how effectively organizations implement these guidelines to ensure fair and ethical AI practices.

Responsible AI practises

The responsibility for addressing AI bias largely rests with companies rather than individual users. Organizations must take proactive steps, such as investing in ethical and robust frameworks, and training data scientists to understand ethical considerations and mitigate risks associated with AI. Collaboration with stakeholders—including academia and industry peers—is crucial to staying informed about best practices and advancements in the field.

India’s NITI Aayog has outlined guidelines for responsible AI, emphasizing integrity, security, inclusivity, and alignment with international standards like the European GDPR (General Data Protection Regulation). Beyond adhering to these guidelines, companies must recognize the unique dynamics of the Indian market, balancing local and international standards to create equitable and trustworthy AI systems that not only meet requirements but also foster customer confidence.

Learning from other International Regulations

Addressing data bias transparently and committing to responsible AI practices are crucial for building public trust and confidence in technology. By 2026, Gartner predicts that 50% of global governments will mandate the implementation of responsible AI practices, reflecting the growing recognition of AI’s transformative impact and the need for ethical oversight.

In India, the regulatory landscape is evolving rapidly, with significant measures like the Digital Personal Data Protection Act (DPDP). This act underscores critical principles such as consent, accountability, and transparency in managing personal data. It aims to balance the protection of individual rights with the lawful processing needs of organizations, ensuring ethical and equitable data practices.

data, chart, graph

As these frameworks take shape, Indian organizations must not only comply with emerging regulations but also take proactive steps to integrate these values into their AI systems. This involves adopting robust mechanisms for consent management, establishing accountability measures, and maintaining transparency throughout the data lifecycle. By aligning with both domestic regulations and global standards, India can lead in fostering responsible AI development, paving the way for innovation that is both ethical and inclusive.

India’s role in shaping AI governance is pivotal, reflecting its proactive stance in past international negotiations. Much like its leadership in climate change discussions, India has the opportunity to champion equitable AI governance by advocating for inclusion and representation from the Global South. However, as the country experiences rapid AI-driven growth, it becomes imperative to address the pressing issue of data bias to ensure advancements are fair, inclusive, and beneficial for all.

To tackle these challenges, businesses must prioritize reliability checks to identify and mitigate AI data biases. They should also evaluate their AI practices to align with ethical standards and global best practices. By adopting a collaborative approach that balances innovation with responsibility, India can position itself as a global leader in AI governance, setting an example of how technology can drive progress while upholding ethical and inclusive values.

The Ongoing Debate on Multistakholderism

Last week, I had the opportunity to engage in a thought-provoking discussion about the widely debated concept of Multistakeholderism‘, a key topic within the Internet Governance community. The session, part of an ongoing program with the Internet Society, featured an open discussion where participants presented both pro and con arguments. The zoom virtual town hall format allowed for dynamic interaction between speakers and the audience, sparking insightful debates supported by facts and evidence on the strengths and challenges of the multistakeholder model.

During the discussion, I began to realize that while the multistakeholder model is often lauded for its emphasis on inclusivity, it does have its drawbacks. At its core, the model advocates for the involvement of a wide range of stakeholders—governments, private sector actors, civil society, technical experts, and others—in decision-making processes related to Internet governance. On the surface, this appears to be a democratic and inclusive approach. However, as the conversation progressed, it became clear that the model is not without its complexities. I’m reflecting on what I’ve learned personally from the discussion.

Why Multistakeholder Model?

The “multistakeholder model” is often portrayed as a single solution, but in reality, it’s not a one-size-fits-all approach. Instead, it’s a flexible framework that enables diverse individuals and organizations to come together, exchange ideas, and build consensus. It’s akin to a well-organized orchestra: while each instrument brings its own sound, they work together to create a harmonious performance. The multistakeholder approach thrives on collaboration, adaptability, and the ability to draw on various areas of expertise to address complex global issues.

For instance, consider the process of designing a public transportation system. A top-down, government-only approach might miss critical insights from local communities, engineers, and environmental experts. In contrast, a multistakeholder approach brings together city planners, citizens, transportation experts, and environmentalists to develop a system that meets the diverse needs of the population. This approach is most effective in situations where decisions affect a broad range of people, require expertise from different fields, and demand legitimacy to ensure successful implementation. Since the 2005 World Summit on the Information Society (WSIS), stakeholders have widely endorsed multistakeholderism as the preferred approach for addressing Internet governance and other complex global challenges.

Critiques of the Multistakeholder Model

The idea of “inclusivity” often implies a balance of power among all stakeholders, but in practice, this balance can be difficult to achieve. The Internet, as a global and decentralized entity, doesn’t belong to any single individual or organization, and no one stakeholder group has full control over its operation or development. However, despite the intention to ensure broad representation, certain groups—especially those with more financial, technical, or political power—can dominate discussions, potentially sidelining less powerful voices. This raises questions about the true level of inclusivity that the model offers, and whether it can truly capture the diverse interests and needs of all who are affected by the Internet, especially marginalized or underrepresented communities.

A key challenge in defining multistakeholderism is that no clear, agreed-upon definition exists for who qualifies as a “stakeholder.” While the concept suggests that anyone with an interest in an issue should have a voice, it doesn’t explain how we select stakeholders or what makes someone legitimately part of the conversation. This lack of clarity leads to different groups using various, sometimes conflicting, definitions of who counts as a stakeholder—despite the fact that the legitimacy of the entire governance process depends on this definition.

For example, in Internet governance, we could consider every user a stakeholder, but how do we actually represent these users? Additionally, one person may be seen as representing multiple identities, such as geographic region, gender, or other aspects, but does that mean they truly represent everyone within those categories? For instance, does the involvement of one woman in a multistakeholder setting truly reflect gender representation? Similarly, does having one civil society representative mean the full complexity of civil society is represented? These questions highlight the complexities and limitations of the multistakeholder model in practice.

In conclusion, while the multistakeholder model is designed to be a collaborative and inclusive framework, its implementation often requires balancing competing interests, addressing power imbalances, and ensuring that all voices are heard and valued equally. This remains a dynamic and ongoing debate that calls for continued dialogue, open forums, and active participation, particularly from younger generations. The future of multistakeholderism depends on our collective ability to engage in these discussions and work towards more inclusive, transparent, and effective governance structures.

“RBI’s Vision for Aatmanirbhar Bharat: Launching Local Cloud Services by 2025”

Addressing going concerns over data privacy and and the longstanding dominance of global IT giants in the cloud services domain, Bharat’s(India) central bank, Reserve bank of India(RBI), is reportedly gearing up to launch its own cloud services by 2025. The aim behind this excellent initiative is to enhance the country’s digital infrastructure and ensure the security of financial data as well. The project described as “first-of-its-kind initiative” objective is to decrease the reliance on the foreign cloud providers like the cloud platform will leverage solutions from domestic IT firms, offering alternatives to services like Amazon Web Services(AWS), Microsoft Azure, Google Cloud, and IBM Cloud and enhance control over critical financial infrastructure.

Indian map close-up with a flag and multiple colored pushpins.

The RBI’s public cloud service plans were first announced in December 2022. The initial development is being led by Indian Financial Technology and Allied Services (IFTAS) in collaboration with private tech companies, with consultancy firm EY appointed as an advisor.The initial funding, amounting to ₹229.74 billion ($2.72 billion), will be sourced from the central bank’s asset development fund. Over time, financial firms will be invited to invest and acquire equity in the cloud service. The RBI has restricted bidding for the project to companies incorporated in India with prior experience in developing cloud-related solutions, underscoring its focus on localizing digital infrastructure for payments and financial data storage and processing, according to the report.

The RBI’s initiative to launch its own cloud services comes with both significant opportunities and challenges, especially given the scale of providing cloud infrastructure to the world’s most populous nation.

The ‘PROS’ includes:
Enhanced Data Sovereignty:The platform would guarantee that critical financial data is stored and processed within India, minimizing the risks linked to foreign data management.

Being self-reliant: By providing a local alternative, the RBI could challenge the dominance of companies like Google, Amazon, and Microsoft in India’s financial ecosystem. Building in-house capabilities would also help mitigate the risks posed by geopolitical tensions affecting foreign tech providers.

Domestic IT Firms growth platform:The project would create opportunities for Indian IT companies, driving growth and innovation within the country.

Improved Security and Control with Innovation: A central bank-controlled platform could provide enhanced security and ensure better regulatory compliance for critical financial data. By fostering competition, this initiative could drive innovation among both domestic and global cloud service providers.

Cost Efficient: In the long term, localized cloud services could help lower operational costs for Indian financial institutions compared to using international providers.

The ‘CONS’ includes:
Major amount of Investment: The project requires a significant upfront investment, with initial funding of ₹229.74 billion ($2.72 billion).

Cloud Technology and the challenges: Building a scalable and secure cloud service that rivals the infrastructure and reliability of global giants like Amazon, Google, and Microsoft is a considerable challenge. Moreover, Indian IT firms may face difficulties in acquiring the advanced expertise necessary to manage a national-level cloud platform capable of supporting India’s expansive financial system.

Adoption Challenges and costs: Many financial institutions are already dependent on global cloud providers, which may make them hesitant to transition to a new, untested local platform. Additionally, continuous investment will be required to stay ahead in the rapidly evolving cloud technology landscape while maintaining high security and uptime standards.

Monopoly factors: The RBI-managed platform could dominate the market, potentially stifling competition and limiting innovation. This could create a centralized ecosystem where fewer players control the landscape, reducing the incentives for both domestic and global providers to innovate or offer competitive services. In the long run, this lack of competition could lead to inefficiencies and slower technological advancements.

Scalability and roll out challenge: Considering India’s vast size and diverse financial ecosystem, scaling the platform to meet the needs of the entire sector could take several years to fully achieve. The process would involve significant time and resources to ensure the platform is capable of handling the complexities of India’s financial institutions, varying regional requirements, and growing data demands. This gradual rollout could delay the widespread adoption and effectiveness of the platform, posing a challenge in meeting the rapidly evolving needs of the financial sector.

RBI’s initiative to develop a localized cloud platform offers promising benefits for data security and the growth of domestic IT, aligning with the vision of Aatmanirbhar Bharat. However, the project faces considerable challenges, particularly in terms of technical complexity, financial investment, and adoption by financial institutions. While this move can enhance self-reliance and reduce dependence on foreign providers, successfully launching such a large-scale initiative would be a monumental achievement. Yet, the obstacles it presents must not be underestimated, as it requires careful planning and execution to meet the diverse needs of India’s financial sector.

Person Using Laptop Computer during Daytime



“Balancing Screens and Minds for teens: The Challenge of Managing Social Media”

Concerns are rising over children spending too much time on social media and joining platforms at inappropriate ages. While India hasn’t addressed this issue yet, Australia is taking action by proposing a ban on social media for users under 16. This growing concern may prompt similar measures in India.

Australia is taking a bold step that few countries have dared to follow, proposing a ban on social media for those under 16. Not to be mistaken for a blanket internet restriction, this initiative specifically targets platforms like Instagram and Facebook due to their potential harmful effects on young people, including impacts on body image, social anxiety, and digital dependency. The question is whether this measure will truly “weather-proof” young Australians from these issues.

Prime Minister  Anthony Albanese stated “This one is for the mums and dads… who, like me, worry deeply about our kids’ online safety. Australian families, your government is on your side.” He also described the proposal, which is set to be introduced to parliament next week, as “world-leading” legislation to curb the “harm” social media inflicts on Australian children. While the specifics are still under discussion, it’s clear that if enacted, this legislation will have far-reaching implications, even for those young users already active on social media.

Some experts believe that banning apps like TikTok, Instagram, and Facebook only delays young people’s exposure to these platforms, rather than teaching them essential skills to safely navigate the online world. Previous efforts to restrict access, including those in the European Union, have largely been ineffective or met with pushback from tech companies. There’s also uncertainty around how such bans would be enforced, especially with the availability of tools to bypass age-verification.

In an open letter sent to the government in October, over 100 academics and 20 civil society organizations, led by the Australian Child Rights Taskforce, called on Prime Minister Albanese to prioritize “safety standards” for social media platforms instead of outright bans. They pointed to UN recommendations, which suggest that national policies should focus on providing children with safe opportunities to engage with digital spaces. At the same time, grassroots campaigners in Australia are pushing for these laws, arguing that bans are necessary to protect children from harmful content, misinformation, bullying, and other social pressures online.

Backlogs of Social Media

Facebook’s internal research, made public in 2021, revealed that Instagram was aware of its negative effects on teenage girls, especially around body image issues, self-esteem, and unrealistic standards of validation based on appearance. Studies indicate that children who spend over three hours daily on social media are twice as likely to experience mental health challenges like depression and anxiety, fueled by comparisons with others’ seemingly ideal lives. Social media usage can disrupt focus during school or homework, while browsing on mobile devices before bed is linked to poor sleep quality. Additionally, frequent social media exposure can impact brain areas related to emotions and learning—particularly significant as children and teens develop their sense of self between ages 10 and 19.

What can resistant bring as a challenge?

Young teens often resist restrictions, feeling entitled to the same access to technology as their peers. This resistance can lead to conflicts with parents, resulting in interpersonal stress and potential mistrust. Bans may not be effective; similar to alcohol restrictions, prohibiting access can sometimes increase desire. Tech-savvy teens are likely to find ways around limitations, which may also impact their ability to process online interactions in the future.Reducing social media time can also help lower risks of cyberbullying, online harassment, and body shaming. Furthermore, limiting app usage encourages children to spend more time outdoors, participate in physical activities, pursue hobbies, and adopt healthier habits overall. Excessive screen time often leads to a sedentary lifestyle, while balanced restrictions can promote a more active, engaged, and socially connected childhood.

But keeping the both sides in vision, challenge is what, how and when to educate young minds to divert and use their neural energy for their better future. Coming to a challenge in a country like India, ban and restrictions won’t change anything only, the real challenge of managing social media use among young people is complex. Simply imposing a ban or restrictions on platforms for those under a certain age might not have the desired impact, as enforcing these rules can be difficult given the sheer number of users and access points. Tech-savvy teens can find ways around restrictions, and blanket bans could push usage underground, making it harder for parents and educators to monitor online activities.

The real issue lies in determining the right approach, timing, and tools to educate young people on using digital platforms responsibly. With India’s vast youth population, the focus should ideally be on proactive digital education, helping young users understand the long-term impact of their online interactions and encouraging them to harness technology in ways that support their growth. Rather than a one-size-fits-all ban, developing age-appropriate digital literacy programs in schools, promoting open discussions at home, and setting practical boundaries can build a healthier digital culture. Empowering young users with the skills to navigate online spaces safely could be more effective and sustainable than enforcing restrictions that may lead to unintended consequences.

Like many other challenges, this issue requires ongoing discussion and a collaborative approach, particularly involving parents. A dedicated research team focused on understanding young minds and their digital behaviors is crucial. Australia has taken steps based on what they believe needs to be done, and now, it will be interesting to see what India contributes to this conversation in pursuit of meaningful change.

“SOCH Organisation: Bridging Mountain People with Happiness”

“Open hills, mountain thrills, friends to share, lessons to bear,  
Nature’s charm, village calm, bracelets worn, sun’s warm,  
Flowing streams, trees in bloom, kind souls, dreams to groom,  
Helping hands, striving high, a passion fierce, thoughts that fly…  
With all this grace, what more to chase?”


As I pondered ways to give back to the mountains, social media led me to the inspiring page of SOCH organization, where I saw the dreams of mountain communities being transformed into reality. I connected, followed, and reached out to express how deeply their vision resonated with my own and how eager I was to be a part of it. Joining SOCH and committing to this journey for a lifetime has been one of my best decisions. Now, as a member of this beautiful SOCH family, I proudly say “we” instead of “I.”

At SOCH, we pursue dreams—those of the younger generations, the elders, women seeking empowerment, and passionate individuals who have talent but lack basic resources. SOCH supports impactful projects that transform the lives of disadvantaged children and youth across various regions of Uttarakhand. We are a team of change makers who believe that every helping hand can uplift a child and pave the way for a brighter future.

Our journey began with extending support to underprivileged children and youth eager to learn and strive for a better life. This mission grew stronger as we realized just how many children needed assistance with essentials like food, shelter, and education. Our team expanded, reaching out to more regions to help as many children as possible. Today, we operate shelter homes, schools, and accessible dining facilities that support these young individuals. We’ve also established helpline offices nationwide so anyone in need can reach us anytime.

Our mission is to ensure that all children and young people receive the support they need, whenever they need it—whether it’s a supportive conversation, financial aid, education, job training, or simply knowing they’re not alone. We aim to build a world where no child or youth feels isolated, where everyone struggling can easily reach out for help with education, employment, and more. Our goal is to expand across every region to ensure we’re accessible to all in need.

Our numbers inspire us to give our best and continually break our own records. We’re thrilled to be growing and helping more people every day: with over 1,000K members worldwide, we’ve raised more than $300M in funds, helped 950,000+ children, and provided 50,000T of food. 

We operate shelter homes, schools, and an affordable community kitchen that serves young people in need. Additionally, we have helpline offices accessible at any time. Our goal is to empower the next generation with essential skills, especially around Digital Bharat, ensuring they can fully benefit from the opportunities of the growing digital era.

As the song goes, “Jahaan Pawan bahaye Sankalp liye, Jahaan parvat garv sikhate hai, Jahaan uchche neeche sab raste, bhakti ki dhun mein gatte hai,” meaning, “Where the wind flows with determination, the towering mountains instill pride, where all paths—high and low—unite in a melody of devotion.”

With that same spirit of determination, SOCH is committed to achieving success, prosperity, and happiness for the mountains, honoring the motherland, and creating pathways for all generations. 

By blending the innovative skills of the youth with the wisdom of the older generations, we aim to foster growth and development. SOCH brings joy, purpose, and dedication to the mountain communities, helping them find both pace and peace in their lives. 

For more information, visit the official SOCH website at [sochorganization.com](https://sochorganization.com/), or connect with us on Instagram, Facebook, LinkedIn, and Twitter.

Cloud Computing

Every computing service that can be delivered over the Internet mode is known as cloud computing. The computing involves resources like tools and applications as data servers, networking, data storage, and software. The name cloud computing comes as a virtual space/ cloud space having the information that is accesssible and stored in the cloud space only and computing of all the information and data is known as cloud computing. The biggest advantage of this is that the user who is using it, don’t require to gain access to a specific location to access the data, the user can work remotely. The cloud computing can be done via public as well as private mode referring to what access you want to use or want to give to the user as well.

Types of Cloud Services: Cloud computing services give its users a series of function that includes, email, data analyzing, audio and video streaming, delivery of software on demand, creating and testing apps, VM creation and storage, data retreival etcetera.

Deployment Models: 

Saying certainly that there are three type of clouds wouldn’t be possibleand right, better we can comprehend that there are various types of cloud and each one is different than the other.

Public cloud, is the cloud which works like an open-source, freely available to public providing storage and servers services over the internet. Public cloud is being operated by third-party companies, who manages hardware, software and other general infrastructure.

Private cloud, is the cloud which is not freely available, thus user needs to pay an amount to use the cloud services and it is reserved for specific clientele, usually one business or organization. The user access is reserved by the admin and is being directly operated and managed by the organisation who buys it.

Hybrid cloud,as the name suggest is the combination of both above-mentioned clouds, the public and the private one. This type of cloud provides flexibility with restriction and security for the right optimization and function of the cloud by the user.

Multi-cloud, this is a cloud service in which the client don’t restricted to use the service of only one type of cloud service provider. Insead the client can use the cloud service of one provider and for other they can opt out for some other service provider.

Types of Cloud Computing

The cloud computing types is based on Shared responsibility model, which emphasise on sharing the responsibility and work at different hierarchical level. The Shared responsibility as name defines, is sharing responsibility, i.e.,  the security team maintains some responsibilities for security, while the provider takes some responsibility, but not all the responsibility will be  put on someone’s shoulder to handle it on single-hand mode. Cloud computing is based on three services which are as follows:

Software-as-a-service (SaaS), the service provider has the major responsibility of handling and operating the system and services.It is based on product-perspective based cloud service.The service provider provides you with a license to access the software applications like Microsoft office’s 365.

Infrastructure-as-a-service (IaaS), the services is handled majorly by the customer, the service provider maintain the hardware, network connectivity and physical security. Main Function is to lift nd shift or migrate from an on-premise data centre to a cloud-deployment. Example of IaaS is Microsoft Azure.

Platform-as-a-service (PaaS), this is the complex one as a service as it shares some responsibility of SaaS and some of the IaaS. The main function of PaaS is to provide the platform for the cloud service for developing the software instead of giving the software as a service which is seen in SaaS.

Advantages of Cloud Computing 

Cloud computing based software provides a number of benefits, which includes the ability to use software from any device through browser or app based function. Thus, user can have the access from anywhere and anytime. 

The storage provide by the Cloud computing services make it possible for the users to keep backup of their data  ensuring that the files are available to them whenever they need it.

Reliability, the ability of a system to recover from failure and continues to function and  Predictability, the ability of a system to perform during the major outbreak of traffic and usage, the cloud computing has proven righteous for both the above-explained cases.

Disadvantages of the Cloud

With everything that the cloud comes out in name of services and flexibility, but security is the biggest concern not for cloud computing only, but for every computing device irrespective of whether it is working on internet or not. Servers maintained by the cloud computing service provider can be a victim of cyber attacks, internal bugs, power outages etcetera.

Cyber Security, Time Demands

Securing everything which is over the internet or is a piece of critical information is called cyber Information Technology Security. It is a general, but important practice of securing critical systems and important information from any kind of digital attack. Cyber security policies and rules are defined and designed in a way that their main function is to combat all kinds of threats against networks, systems, applications, and data.

According to data shared via ‘n’ a number of research organizations, it was stated that, ‘in the year 2020, the average cost of a data breach is found to be USD 3.86 million globally. Cybercriminals target customers personally and organizations via information like address, name, Credit card information etcetera.

Cybersecurity domains:

If the user can follow a well-defined strategy for protection in order to defend against any cybercrime or cyber-attacks, one can safeguard the information and data from cybercriminals. There are layers of protective measures that can be considered as cybersecurity domains for safety from cyber attacks.  The security parameters lie in Critical Infrastructure Security, Application and Network Security, Cloud and Information Security, End User Education, Storage Security, Mobile Security, and Data Disaster Recovery are some of the very important measures in the cybersecurity domains.

Cybersecurity MythsWith technology rising day by day, the myths related to it are also rising to create more misconceptions at the user’s end. But to get full security, one should be aware of all the pros and cons of it. The notions and myths related to technology. Some of the myths related to  Cybersecurity are like Cybercriminals are outsiders which is not true, instead, most of the time cybersecurity breaches are often the result of malicious insiders, working for outsiders who are hackers. Attack vectors are contained in nature which they actually are not, to predict exactly their behavior is quite a difficult job. Risk are known, which actually aren’t because the vulnerabilities are increasing in old as well as new devices and applications, thus giving a certain behavioral result about any risks is not a good practice. Industry Safe,  no industry is safe or far away from the vulnerability access of cyber criminals. Whether you are sitting in a gov. organization or any private firm, you are or can be in the radar of the cybercriminal, so it’s better to be safe, than to get cyberattacked by any criminal.

Common Cyber Threats:Let’s discuss some of the security threats which are as follows:

1) Malware: The term ‘malware’ defines as ‘malicious software, and this software can be worms, viruses, trojans, and spyware. This malware files less and gets unauthorized access to the device and corrupts or misuses the data of the system. 


2) Ransomware: It is a type of malware that demands ransom from the victim by locking down the files, and data, and to release it asks for the ransom, unless a ransom is paid, the data won’t be released.


3) Phishing: These are the most prevalent attacks nowadays, causing victims a heavy loss of amount by using platforms like emails, messages, and calls acting as an authenticate service provider.

4) Insider Threats: Data revelation by the current or former partners, employees, or compromise of the device they are/were using. As they are insider threats, thus are invisible or less vulnerable to security solutions like firewalls, and IDS (Intrusion Detection System), as the focus is on external threats.

5) DDoS Attacks: The purpose of this distributed denial of services is to overwhelm the network of the enterprise by overloading it with irrelevant traffic, usually from multiple coordinated systems.

6) APTs: Advanced persistent threats, are made by an intruder or group of intruders to infiltrate a system by remaining undetected for a time period to steal data and use it in attacks or other illegal activities.

7) Man in the Middle: It is an eavesdropping attack in which the data is stolen by the man in the middle of the service provider and the user. Like the data between the User of an insecure Wi-Fi and the Wi-Fi service provider can be attacked by the man-in-the-middle because of the insecure mode of the Wi-Fi.

Cyber Security Best Practises:

  1. Keep hardware and software up-to-date.
  2. Avoid opening suspicious emails.
  3. Use a secure file-sharing solution to encrypt data or use a VPN to privatize your system.
  4. A strong Password is a key to security.
  5. 2-factor authentication is a must.
  6. Remove adware from your machine.
  7. Double-check for the HTTPS or SSL certificate of the website.
  8. Don’t store or share information on an insecure platform.
  9. Avoid public device usage.
  10. Education at both ends, users as well as providers.
  11. Protect access with efficient identity management.
  12. Use anti-virus and anti-malware.

API, the Application Interface is in working mode!

The applications you are using like food eateries, clothing, e-commerce, and all, on every application you are sending a request and getting a reply; the request sent from the user end is taken via the application to the concerned server and the server gives a reply to it eventually. Thus, for all the above-mentioned cycle processes API aka application programming interface is working.

What exactly API is?

An application Programming Interface or API is a middleman in application technology whose function is to set rules, standards and protocols that will allow the different software applications to communicate, receive or send data with each other on different or same grounds. So, basically, API is asking you to let your application services of yours interact with the application service of others without even asking each other that ‘how they are processing or working?

API can be released in different policies method:

Private: The company is the master of this API and is controlled by the company only.

Public: This API is open to all and can be used by any innovator to use by, to create any innovation.

Partner: Partner API defined itself, that it is sometimes private or sometimes public in nature, i.e., partners can limit the sharing and usage of API, without compromising the API quality and encryption.

Composite: These combine two or more APIs’ together to address complex system requirements at the user end.

Usage of API:

The main function is to request data from one end and send it to another end, like a request made by the user replied to by the API on a web browser.

API is an updating tool as well which means updating social media, updating servers, adding, or deleting things etcetera. API uses all this through integration property.

Benefits of using API:

–Data Sharing

–Increased Security

–Easy to use

How does API function?

REST API: Representational State Transfer. The REST API let the data be shared between the client and server using the HTTP method via a set of functions like GET, PUT etcetera. It is stateless in nature, thus not saving any user data at an end. The REST API has major benefits like integration, innovation, ease of maintenance and expansion. REST API can be made secure via authentication tokens and API Keys

SOAP API: Simple Object Access Protocol. The messages between the client and server are exchanged via the XML method. This is an old API method, frequently used in past, nowadays REST API is more frequently in usage.

RFC API: Remote Procedure Calls. At first, the client input the function/procedure on the server then only the server give output to the client.

WebSocket API: It is another modern API after the REST API. It uses JSON to exchange messages between clients and the server. It supports two-way communication, i.e., a client can send call-back messages to the server, making it more efficient than the REST API.

GRAPH QL API: It is a special type of query language created for the API exchange of messages only. It is a developer-friendly, fast, and flexible format an easy manner giving an output of required data only neither less than that nor more than asked. It gives free hand to developers for the database’s multiple queries, microservices and APIs’, thus making it easy to handle and update developers.

API GATEWAY: An API Gateway is a management tool client that will use a broad range of activities. Like all gateways, the API Gateway handles the tasks like user authentication, rate management and statistics overall API calls. For example, Amazon API Gateway.

What is API testing?

API testing strategies are like other software testing methodologies. The focus is on validating server responses. API testing includes making multiple requests to API endpoints for performance testing, writing tests to check business logic and function and security testing by simulating system attacks.

Creating an API: A reliable, flexible, fast and developer-friendly is the prime goal while creating an API.

–PLAN API

–BUILD API

–TEST API

–DOCUMENT THE API

–MARKET THE API