{"id":180,"date":"2025-10-31T20:42:00","date_gmt":"2025-10-31T20:42:00","guid":{"rendered":"https:\/\/janatarchithi.com\/?p=180"},"modified":"2025-11-01T08:45:18","modified_gmt":"2025-11-01T08:45:18","slug":"cyber-security-a-to-z-%e0%a6%97%e0%a7%8d%e0%a6%b0%e0%a6%a8%e0%a7%8d%e0%a6%a5-%e0%a6%aa%e0%a7%8d%e0%a6%b0%e0%a6%95%e0%a6%be%e0%a6%b6-%e0%a6%95%e0%a6%b0%e0%a6%b2%e0%a7%8b-%e0%a6%aa","status":"publish","type":"post","link":"https:\/\/janatarchithi.com\/?p=180","title":{"rendered":"\u201cCyber Security, A to Z\u201d \u0997\u09cd\u09b0\u09a8\u09cd\u09a5 \u09aa\u09cd\u09b0\u0995\u09be\u09b6 \u0995\u09b0\u09b2\u09cb \u09aa\u09cd\u09b0\u09be\u0987\u09ae \u0987\u09a8\u09ab\u09cb\u09b8\u09be\u09b0\u09cd\u09ad"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"446\" src=\"https:\/\/janatarchithi.com\/wp-content\/uploads\/2025\/11\/IMG-20251101-WA0013-1024x446.jpg\" alt=\"\" class=\"wp-image-181\" srcset=\"https:\/\/janatarchithi.com\/wp-content\/uploads\/2025\/11\/IMG-20251101-WA0013-1024x446.jpg 1024w, https:\/\/janatarchithi.com\/wp-content\/uploads\/2025\/11\/IMG-20251101-WA0013-300x131.jpg 300w, https:\/\/janatarchithi.com\/wp-content\/uploads\/2025\/11\/IMG-20251101-WA0013-768x335.jpg 768w, https:\/\/janatarchithi.com\/wp-content\/uploads\/2025\/11\/IMG-20251101-WA0013.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>\u0995\u09b2\u0995\u09be\u09a4\u09be<\/strong>: \u09b8\u09be\u0987\u09ac\u09be\u09b0 \u09b8\u09bf\u0995\u09bf\u0989\u09b0\u09bf\u099f\u09bf \u0985\u09cd\u09af\u09be\u0993\u09af\u09bc\u09be\u09b0\u09a8\u09c7\u09b8 \u09ae\u09be\u09b8 \u0989\u09aa\u09b2\u0995\u09cd\u09b7\u09c7 Prime Infoserv Pvt. Ltd, Indus Net Technologies (INT)-\u098f\u09b0 \u09b8\u09b9\u09af\u09cb\u0997\u09bf\u09a4\u09be\u09af\u09bc \u098f\u09ac\u0982 Infosec Foundation-\u098f\u09b0 \u09b8\u09ae\u09b0\u09cd\u09a5\u09a8\u09c7 \u0986\u099c \u09aa\u09cd\u09b0\u09c7\u09b8\u0995\u09cd\u09b2\u09be\u09ac \u0995\u09b2\u0995\u09be\u09a4\u09be\u09df \u09aa\u09cd\u09b0\u0995\u09be\u09b6 \u0995\u09b0\u09b2 \u201cCyber Security, A to Z\u201d \u2014 \u098f\u0995 \u0985\u09a8\u09a8\u09cd\u09af \u0997\u09cd\u09b0\u09a8\u09cd\u09a5 \u09af\u09be \u09b8\u099a\u09c7\u09a4\u09a8\u09a4\u09be \u09a5\u09c7\u0995\u09c7 \u0995\u09b0\u09cd\u09ae\u09c7\u09b0 \u09aa\u09a5\u09c7 \u09aa\u09a5\u099a\u09b2\u09be \u09a8\u09bf\u09b0\u09cd\u09a6\u09c7\u09b6 \u0995\u09b0\u09c7\u0964<\/p>\n\n\n\n<p>\u09ac\u09bf\u09b6\u09cd\u09ac\u09ac\u09cd\u09af\u09be\u09aa\u09c0 \u0995\u09cd\u09b0\u09ae\u09ac\u09b0\u09cd\u09a7\u09ae\u09be\u09a8 \u09b8\u09be\u0987\u09ac\u09be\u09b0 \u09b9\u09c1\u09ae\u0995\u09bf \u098f\u09ac\u0982 \u09ad\u09be\u09b0\u09a4\u09c7\u09b0 \u09a1\u09bf\u099c\u09bf\u099f\u09be\u09b2 \u099d\u09c1\u0981\u0995\u09bf\u09b0 \u09aa\u09cd\u09b0\u09c7\u0995\u09cd\u09b7\u09bf\u09a4\u09c7 \u098f\u0987 \u09ac\u0987\u099f\u09bf \u09aa\u09cd\u09b0\u09af\u09c1\u0995\u09cd\u09a4\u09bf \u0993 \u09ae\u09be\u09a8\u09ac \u0986\u099a\u09b0\u09a3\u09c7\u09b0 \u09ae\u09a7\u09cd\u09af\u09c7 \u098f\u0995 \u09b8\u09c7\u09a4\u09c1\u09ac\u09a8\u09cd\u09a7\u09a8 \u2014 \u09af\u09be \u09b8\u099a\u09c7\u09a4\u09a8\u09a4\u09be \u09a5\u09c7\u0995\u09c7 \u09ac\u09be\u09b8\u09cd\u09a4\u09ac \u09b8\u09c1\u09b0\u0995\u09cd\u09b7\u09be\u09b0 \u09a6\u09bf\u0995\u09c7 \u09a8\u09bf\u09af\u09bc\u09c7 \u09af\u09be\u09af\u09bc\u0964<\/p>\n\n\n\n<p>\u0985\u09a8\u09c1\u09b7\u09cd\u09a0\u09be\u09a8\u09c7 \u0985\u09a4\u09bf\u09a5\u09bf \u09b9\u09bf\u09b8\u09c7\u09ac\u09c7 \u099b\u09bf\u09b2\u09c7\u09a8 \u09b6\u09cd\u09b0\u09c0 \u09b9\u09b0\u09bf \u0995\u09bf\u09b6\u09cb\u09b0 \u0995\u09c1\u09b8\u09c1\u09ae\u0995\u09b0, IPS, \u0985\u09a4\u09bf\u09b0\u09bf\u0995\u09cd\u09a4 \u09aa\u09c1\u09b2\u09bf\u09b6 \u09ae\u09b9\u09be\u09aa\u09b0\u09bf\u09a6\u09b0\u09cd\u09b6\u0995 \u2013 \u0995\u09cb\u09b8\u09cd\u099f\u09be\u09b2 \u09b8\u09bf\u0995\u09bf\u0989\u09b0\u09bf\u099f\u09bf, CISO \u0993 \u09b8\u09a6\u09b8\u09cd\u09af, AI CoE, \u09aa\u09b6\u09cd\u099a\u09bf\u09ae\u09ac\u0999\u09cd\u0997 \u09aa\u09c1\u09b2\u09bf\u09b6\u0964 \u098f\u099b\u09be\u09dc\u09be\u0993 \u09b6\u09cd\u09b0\u09c0 \u09b8\u099e\u09cd\u099c\u09af\u09bc \u0995\u09c1\u09ae\u09be\u09b0 \u09a6\u09be\u09b8, \u0985\u09a4\u09bf\u09b0\u09bf\u0995\u09cd\u09a4 \u09b8\u099a\u09bf\u09ac, \u09ac\u09bf\u099c\u09cd\u099e\u09be\u09a8 \u0993 \u09aa\u09cd\u09b0\u09af\u09c1\u0995\u09cd\u09a4\u09bf \u098f\u09ac\u0982 \u09ac\u09be\u09af\u09bc\u09cb\u099f\u09c7\u0995\u09a8\u09cb\u09b2\u099c\u09bf \u09ac\u09bf\u09ad\u09be\u0997 \u0993 \u09b0\u09be\u099c\u09cd\u09af \u09a4\u09a5\u09cd\u09af \u09b8\u09c1\u09b0\u0995\u09cd\u09b7\u09be \u0986\u09a7\u09bf\u0995\u09be\u09b0\u09bf\u0995, \u09aa\u09b6\u09cd\u099a\u09bf\u09ae\u09ac\u0999\u09cd\u0997 \u09b8\u09b0\u0995\u09be\u09b0; \u098f\u09ac\u0982 \u09b6\u09cd\u09b0\u09c0 \u099a\u09bf\u09a4\u09cd\u09b0\u09a6\u09c0\u09aa \u099a\u0995\u09cd\u09b0\u09ac\u09b0\u09cd\u09a4\u09c0, \u0996\u09cd\u09af\u09be\u09a4\u09a8\u09be\u09ae\u09be \u09b8\u09be\u0987\u09ac\u09be\u09b0 \u09b8\u09bf\u0995\u09bf\u0989\u09b0\u09bf\u099f\u09bf \u09b2\u09c7\u0996\u0995 \u09aa\u09cd\u09b0\u09ae\u09c1\u0996 \u0989\u09aa\u09b8\u09cd\u09a5\u09bf\u09a4 \u099b\u09bf\u09b2\u09c7\u09a8\u0964<\/p>\n\n\n\n<p>\u09e8\u09ec\u099f\u09bf \u0985\u09a7\u09cd\u09af\u09be\u09af\u09bc\u09c7 \u09b8\u09be\u099c\u09be\u09a8\u09cb \u098f\u0987 \u0997\u09cd\u09b0\u09a8\u09cd\u09a5\u099f\u09bf \u09b8\u09be\u0987\u09ac\u09be\u09b0 \u09b8\u09bf\u0995\u09bf\u0989\u09b0\u09bf\u099f\u09bf\u09b0 \u09aa\u09cd\u09b0\u09a4\u09bf\u099f\u09bf \u0985\u0995\u09cd\u09b7\u09b0 \u09a7\u09b0\u09c7 \u09ae\u09c2\u09b2 \u09a7\u09be\u09b0\u09a3\u09be \u09ac\u09cd\u09af\u09be\u0996\u09cd\u09af\u09be \u0995\u09b0\u09c7 \u2014 Anatomy of a Cyber Attack \u09a5\u09c7\u0995\u09c7 Zero Trust Security \u09aa\u09b0\u09cd\u09af\u09a8\u09cd\u09a4\u0964<br>\u09ac\u09b8\u09cd\u09a4\u09c1\u09a4,\u09ad\u09be\u09b0\u09a4 \u09ac\u09bf\u09b6\u09cd\u09ac\u09c7\u09b0 \u09b6\u09c0\u09b0\u09cd\u09b7 \u09eb\u099f\u09bf \u09a6\u09c7\u09b6\u09c7\u09b0 \u09ae\u09a7\u09cd\u09af\u09c7 \u098f\u0995\u099f\u09bf, \u09af\u09c7\u0996\u09be\u09a8\u09c7 \u09ae\u09cd\u09af\u09be\u09b2\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 \u09b8\u0982\u0995\u09cd\u09b0\u09ae\u09a3 \u09b8\u09b0\u09cd\u09ac\u09be\u09a7\u09bf\u0995\u0964 \u09ec\u09eb% \u09b8\u09be\u0987\u09ac\u09be\u09b0 \u0998\u099f\u09a8\u09be \u0986\u09b0\u09cd\u09a5\u09bf\u0995 \u09ac\u09be \u09aa\u09b0\u09bf\u099a\u09af\u09bc \u09aa\u09cd\u09b0\u09a4\u09be\u09b0\u09a3\u09be\u09b0 \u09b8\u0999\u09cd\u0997\u09c7 \u09af\u09c1\u0995\u09cd\u09a4\u0964 AI \u0993 \u09a1\u09bf\u09aa\u09ab\u09c7\u0995 \u09b8\u09cd\u0995\u09cd\u09af\u09be\u09ae \u09a6\u09cd\u09b0\u09c1\u09a4 \u09ac\u09c3\u09a6\u09cd\u09a7\u09bf \u09aa\u09be\u099a\u09cd\u099b\u09c7\u0964 \u09ad\u09be\u09b0\u09a4\u09c7 \u098f\u0995 \u098f\u0995\u099f\u09bf \u09a1\u09c7\u099f\u09be \u09ac\u09cd\u09b0\u09bf\u099a\u09c7\u09b0 \u0997\u09a1\u09bc \u0996\u09b0\u099a \u20b9\u09e7\u09ee \u0995\u09cb\u099f\u09bf \u099b\u09be\u09a1\u09bc\u09bf\u09af\u09bc\u09c7\u099b\u09c7\u0964 \u09b8\u09c7\u0996\u09be\u09a8\u09c7 \u099c\u09a8\u09b8\u099a\u09c7\u09a4\u09a8\u09a4\u09be \u09b8\u09c3\u09b7\u09cd\u099f\u09bf\u09a4\u09c7 \u09ac\u0987\u099f\u09bf\u09b0 \u09a4\u09be\u09ce\u09aa\u09b0\u09cd\u09af \u0985\u09ad\u09c2\u09a4\u09aa\u09c2\u09b0\u09cd\u09ac\u0964<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0995\u09b2\u0995\u09be\u09a4\u09be: \u09b8\u09be\u0987\u09ac\u09be\u09b0 \u09b8\u09bf\u0995\u09bf\u0989\u09b0\u09bf\u099f\u09bf \u0985\u09cd\u09af\u09be\u0993\u09af\u09bc\u09be\u09b0\u09a8\u09c7\u09b8 \u09ae\u09be\u09b8 \u0989\u09aa\u09b2\u0995\u09cd\u09b7\u09c7 Prime Infoserv Pvt. Ltd, Indus Net Technologies (INT)-\u098f\u09b0 \u09b8\u09b9\u09af\u09cb\u0997\u09bf\u09a4\u09be\u09af\u09bc \u098f\u09ac\u0982 Infosec Foundation-\u098f\u09b0<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[42,19],"class_list":["post-180","post","type-post","status-publish","format-standard","hentry","category-16","tag-42","tag-19"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","morenews-featured":"","morenews-large":"","morenews-medium":""},"author_info":{"info":["Editor"]},"category_info":"<a href=\"https:\/\/janatarchithi.com\/?cat=16\" rel=\"category\">\u09b6\u09bf\u0995\u09cd\u09b7\u09be<\/a>","tag_info":"\u09b6\u09bf\u0995\u09cd\u09b7\u09be","comment_count":"0","_links":{"self":[{"href":"https:\/\/janatarchithi.com\/index.php?rest_route=\/wp\/v2\/posts\/180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/janatarchithi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/janatarchithi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/janatarchithi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/janatarchithi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=180"}],"version-history":[{"count":1,"href":"https:\/\/janatarchithi.com\/index.php?rest_route=\/wp\/v2\/posts\/180\/revisions"}],"predecessor-version":[{"id":182,"href":"https:\/\/janatarchithi.com\/index.php?rest_route=\/wp\/v2\/posts\/180\/revisions\/182"}],"wp:attachment":[{"href":"https:\/\/janatarchithi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/janatarchithi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/janatarchithi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}