{
    "id": 5982,
    "date": "2023-10-17T15:48:05",
    "date_gmt": "2023-10-17T10:18:05",
    "guid": {
        "rendered": "https:\/\/nidj.ac.in\/?page_id=5982"
    },
    "modified": "2026-03-11T15:36:05",
    "modified_gmt": "2026-03-11T10:06:05",
    "slug": "ict",
    "status": "publish",
    "type": "page",
    "link": "https:\/\/nidj.ac.in\/en\/ict\/",
    "title": {
        "rendered": "ICT"
    },
    "content": {
        "rendered": "<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull has-parallax\" style=\"min-height:300px;aspect-ratio:unset;\"><div class=\"wp-block-cover__image-background wp-image-6705 has-parallax\" style=\"background-position:50% 50%;background-image:url(https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/wa.png)\"><\/div><span aria-hidden=\"true\" class=\"wp-block-cover__background has-neve-text-color-background-color has-background-dim-60 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-white-color has-text-color\" style=\"font-size:23px\"><strong>Information and Communication Technology<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15px\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-nv-site-bg-color has-text-color\" style=\"font-size:16px\">Welcome to the National Institute of Design, Assam where innovation meets education. In today&#8217;s digital age, Information and Communication Technology (ICT) plays a pivotal role in enhancing the learning experience. Our institute is committed to provide students with state- of-the-art ICT facilities that empower them to excel academically, foster creativity, and prepare for the challenges of the modern world. The IT-Cell of NID Assam continues to provide improved, efficient, and effective computational, network infrastructural facilities and IT services to NID Assam community. These facilities are constantly upgraded to meet the evolving standards of the Institute. Among the various responsibilities that the cell shoulders, its primary responsibility is to cater to the common IT related needs\/support of the students, faculty, staff and its stakeholders.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15px\"><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:25px\"><strong>ICT Facilities<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network:<\/strong> At NID Assam, we understand that seamless internet connectivity is essential for academic and administrative work, collaboration, and online learning. The Institute has 1 Gbps leased line NKN Internet connectivity. It has high end networking devices for reliable and secure internet access throughout the campus. Our students can access online resources, participate in virtual classes, and conduct research without any disruptions.<\/li>\n\n\n\n<li><strong>Wi-Fi: <\/strong>The institute has a controller-based campus-enabled Wi-Fi with authentication system providing high-speed NKN internet connections to help students propel their learning. The internet facility is accessible to the faculty members, staff and students anywhere-anytime. The coverage of Wi-Fi is not only restricted to classrooms or office areas but also extends to all the areas including library, Auditorium, cafeteria, and hostels. Consistent data speed throughout the campus adds to uninterrupted resource accessibility. The students can keep pace with e-learning and browsing web-based applications for preparing projects &amp; research papers through secured Wi-Fi authentication approach.<\/li>\n\n\n\n<li><strong>Automated Library:<\/strong> In an era where information is abundant, our digital library stands out as a beacon of knowledge. With an extensive collection of e-books, journals, and multimedia resources, students have access to a vast repository of information that aids in accomplishing their project work and self-directed learning. The library is fully equipped with desktop computers, high-end scanner, printers etc. for supporting the library digitisation with continuous upgradations and technology adoptions. The Institute subscribes to a wide range of digital libraries and e-resources, granting students access to an extensive collection of academic journals, e-books, and research databases. Our digital resources empower students to conduct in-depth research and stay updated with the latest developments in their fields of study.<\/li>\n\n\n\n<li><strong>IT Labs: <\/strong>The institute has a well-designed IT lab equipped with high end workstations, Projection TV, Wacom-Cintiq devices with high-speed Internet connection which are used by students and faculty for their learning enhancement, course modules along with other academic and research activities.<\/li>\n\n\n\n<li><strong><strong>Other Labs: <\/strong><\/strong><br>i).<strong> Digital Media Lab:<\/strong> The Institute has a fully equipped digital media lab with the latest configuration of iMacs system (16 no\u2019s) used extensively for communication and 3D design classes.<br>ii). <strong>XR (Extended Reality Lab): <\/strong>An Extended Reality (XR) lab, which encompasses Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) is an initiative of Interdisciplinary studies requirement specification. The lab is installed with the latest setup to cater to the evolving requirements of realistic, risk-free simulations allowing students to interact with complex subjects, historical events, or scientific concepts in a more engaging way.<br><\/li>\n\n\n\n<li><strong>Video Conferencing: <\/strong>The Institute has a well-furnished and spacious board room for conducting offline and online video conferencing meetings. It is equipped with 360 degree PTZ camera, 65&#8243;inch LED TV and omnidirectional microphone etc.<\/li>\n\n\n\n<li><strong>Auditorium: <\/strong>The Institute has a space designated to accommodate a large audience for various purposes, including performances, lectures, presentations, conferences, seminars, and other events. It has a well-equipped seating arrangement fully air conditioned, a stage with digital podiums, mixer based lighting and sound systems, projection screens and display monitors.<\/li>\n\n\n\n<li><strong>CCTV surveillance: <\/strong>CCTV cameras play a crucial role in enhancing security and safety within an educational institute. NID Assam campus is equipped with a mix of Internet Protocol (IP) and analog cameras installed across the campus and the footage is constantly recorded and monitored by the Security department 24*<em>7*<\/em>365.<\/li>\n\n\n\n<li><strong>Lecture Hall: <\/strong>The Institute has three lecture halls with a total seating capacity of 180 (60 in each room). The room is equipped with short throw projectors, power podium, remote controlled display screen, surround speakers etc. In addition to the lecture hall, the Institute has four studio rooms for conducting classes \/ training.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"http:\/\/192.168.1.21\/download\/\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"580\" height=\"267\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2024\/06\/intra.png\" alt=\"\" class=\"wp-image-8034\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2024\/06\/intra.png 580w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2024\/06\/intra-300x138.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2024\/06\/intra-150x69.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2024\/06\/intra-18x8.png 18w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/a><\/figure>\n\n\n\n<p style=\"font-style:normal;font-weight:500\">The Institute has an Intranet site which is hosted and accessible within the campus network only. Users can access various types of  online \/ offline forms, software&#8217;s etc. <a rel=\"noreferrer noopener\" href=\"http:\/\/192.168.1.21\/download\/\" target=\"_blank\"> <\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-style:normal;font-weight:500\"><\/p>\n\n\n\n<div style=\"text-align:center;\">\n<a href=\"http:\/\/192.168.1.21\/download\" id=\"campusLink\" target=\"_blank\">\n(Click to access the Intranet)\n<\/a>\n<\/div>\n\n<script>\ndocument.getElementById(\"campusLink\").addEventListener(\"click\", function(e){\n\ne.preventDefault();\n\nfetch(\"https:\/\/api.ipify.org?format=json\")\n.then(response => response.json())\n.then(data => {\n\nlet ip = data.ip;\n\n\/* Campus public IP *\/\nif(ip === \"14.139.202.114\"){\nwindow.location.href=\"http:\/\/192.168.1.21\/download\";\n}\nelse{\nalert(\"\u26a0 This service is available only within the Institute Campus Network.\");\n}\n\n})\n.catch(()=>{\nalert(\"Unable to verify network access.\");\n});\n\n});\n<\/script>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:500px;aspect-ratio:unset;\"><img decoding=\"async\" width=\"742\" height=\"602\" class=\"wp-block-cover__image-background wp-image-6449\" alt=\"\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faqd.png\" style=\"object-position:100% 14%\" data-object-fit=\"cover\" data-object-position=\"100% 14%\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faqd.png 742w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faqd-300x243.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faqd-150x122.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faqd-15x12.png 15w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-90 has-background-dim\" style=\"background-color:#f3f3f3\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10px\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\">\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\" style=\"font-size:25px\">Frequently Asked Questions<\/h2>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"598\" height=\"510\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faaqs.png\" alt=\"\" class=\"wp-image-6452\" style=\"width:250px;height:250px\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faaqs.png 598w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faaqs-300x256.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faaqs-150x128.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/faaqs-14x12.png 14w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:65%\">\n<ul class=\"wp-block-list has-nv-dark-bg-color has-text-color\">\n<li><strong>Internet Facility:<\/strong> All the systems and labs are connected to a high speed internet connection. Users are required to fill the Internet access form and submit to IT Cell for availing the facility. <br><\/li>\n\n\n\n<li><strong>Email Facility:<\/strong> An institute email is provided to all the students, faculty and staff members for official and academic communication. The email account is issued by IT Cell after submitting the duly filled email account form. Any account related issues (viz. unable to access, storage, spams) may be reported to IT Cell for necessary assistance. <\/li>\n\n\n\n<li><strong>Issue\/Return of Assets: <\/strong>Various assets viz. DSLR digital cameras &amp; stand, mixer-operated speakers, projectors, Laptop,  studio and photography lights etc. are issued to NID Assam students and faculty members for course work and practical classes upon submission of  Online form available on the Intranet.<\/li>\n\n\n\n<li><strong>IT\/Digital Media Lab booking:<\/strong> The labs can be booked  by faculty \/ staff members through Samarth Portal or by sending an email to IT Cell.<\/li>\n\n\n\n<li><strong>Software \/ hardware related queries:<\/strong> The IT Cell is in charge for installation of licensed software in various labs and users system depending on the course and work requirements. Installation of cracked versions is strictly prohibited. Any new software requirement, activation or troubleshooting, hardware issues etc. may be informed  to IT Cell through email <em>(itcell<strong>(at)<\/strong>nidj<strong>(dot)<\/strong>ac<strong>(dot)<\/strong>in) <\/em>. In addition, you may also call intercom 276 (Ext) for assistance from the IT support team. <\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:500px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-70 has-background-dim\" style=\"background-color:#fffef9\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns alignwide has-text-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"color:#f4e2a9\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<h1 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\" style=\"font-size:25px\"><strong><strong>Online Security: <\/strong><\/strong><br><strong><strong>Do\u2019s and Don\u2019ts<\/strong><\/strong><\/h1>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"906\" height=\"561\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/online-security.png\" alt=\"\" class=\"wp-image-6361\" style=\"width:416px;height:257px\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/online-security.png 906w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/online-security-300x186.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/online-security-150x93.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/online-security-768x476.png 768w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/online-security-18x12.png 18w\" sizes=\"(max-width: 906px) 100vw, 906px\" \/><\/figure><\/div>\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-7e5fce0a wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:65%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-neve-text-color-color has-text-color\">Online security, also known as cybersecurity, refers to the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. It encompasses a wide range of measures and technologies designed to safeguard the confidentiality, integrity, and availability of digital information. One can safeguard their data and confidential information from online frauds and scams by following the Do&#8217;s and Don&#8217;ts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-nv-site-bg-color has-text-color has-background wp-element-button\" href=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/OnlineSecurity.pdf\" style=\"border-radius:10px;background-color:#ed5a5a\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download PDF<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-esab-accordion accordion-903ad479\" data-mode=\"global\"><div class=\"esab__container\" style=\"row-gap:10px;margin:0px 0px 0px 0px\">\n<div class=\"wp-block-esab-accordion-child\" style=\"border:1px solid var(--nv-primary-accent)\"><div class=\"esab__head\" style=\"padding:10px 10px 10px 10px;background-color:transparent\" role=\"button\" aria-expanded=\"false\"><div class=\"esab__heading_txt\"><p class=\"esab__heading_tag\" style=\"color:var(--nv-dark-bg)\"><strong>Do&#8217;s<\/strong><\/p><\/div><div class=\"esab__icon\"><div class=\"esab__collapse\"><svg version=\"1.2\" viewbox=\"0 0 24 24\" width=\"24\" height=\"24\"><path fillrule=\"evenodd\" d=\"m3.5 20.5c-4.7-4.7-4.7-12.3 0-17 4.7-4.7 12.3-4.7 17 0 4.6 4.7 4.6 12.3 0 17-4.7 4.6-12.3 4.6-17 0zm0.9-0.9c4.2 4.2 11 4.2 15.2 0 4.2-4.2 4.2-11 0-15.2-4.2-4.3-11-4.3-15.2 0-4.3 4.2-4.3 11 0 15.2z\"><\/path><path d=\"m11.4 15.9v-3.3h-3.3c-0.3 0-0.6-0.3-0.6-0.6 0-0.4 0.3-0.6 0.6-0.6h3.3v-3.3c0-0.3 0.3-0.6 0.6-0.6 0.3 0 0.6 0.3 0.6 0.6v3.3h3.3c0.3 0 0.6 0.2 0.6 0.6q0 0.2-0.2 0.4-0.2 0.2-0.4 0.2h-3.3v3.3q0 0.2-0.2 0.4-0.2 0.2-0.4 0.2c-0.4 0-0.6-0.3-0.6-0.6z\"><\/path><\/svg><\/div><div class=\"esab__expand\"><svg version=\"1.2\" viewbox=\"0 0 24 24\" width=\"24\" height=\"24\"><path fillrule=\"evenodd\" d=\"m12 24c-6.6 0-12-5.4-12-12 0-6.6 5.4-12 12-12 6.6 0 12 5.4 12 12 0 6.6-5.4 12-12 12zm10.6-12c0-5.9-4.7-10.6-10.6-10.6-5.9 0-10.6 4.7-10.6 10.6 0 5.9 4.7 10.6 10.6 10.6 5.9 0 10.6-4.7 10.6-10.6z\"><\/path><path d=\"m5.6 11.3h12.8v1.4h-12.8z\"><\/path><\/svg><\/div><\/div><\/div><div class=\"esab__body\" style=\"border-top:1px solid #E0E0E0;padding:10px 10px 10px 10px;background-color:var(--nv-site-bg)\">\n\n<ul class=\"has-neve-text-color-color has-text-color wp-block-list\"><li>Keep your passwords or passphrases confidential. Don\u2019t share them with others or write them down. You are responsible for all activities associated with your credentials.<\/li><li>Pay attention to phishing traps in email and watch for telltale signs of a scam. Don\u2019t open mail or attachments from an untrusted source. If you receive a suspicious email, the best thing to do is to delete the message and report it to IT Cell.<\/li><li>Destroy information properly when it is no longer needed. Place paper in designated confidential destruction bins throughout the office or use a crosscut shredder.<\/li><li>Be aware of your surroundings when printing, copying, faxing, or discussing sensitive information.<\/li><li>Lock your computer and mobile phone when not in use. This protects data from unauthorized access and use.<\/li><li>Avoid using public Wi-Fi hotspots for confidential browsing. Always use virtual private network tunnels to protect the data and the device.<\/li><li>Report all suspicious activity and cyber incidents to the IT Cell or call 1390. Keep all areas containing sensitive information physically secured and allow access only to authorized individuals.<\/li><li>Always use hard-to-guess passwords or passphrases. A password should have a minimum of 8 characters using uppercase letters, lowercase letters, numbers, and special characters. To make it easy for you to remember but hard for an attacker to guess.<\/li><li>It is suggested to use different passwords for different accounts. If one password gets hacked, your other accounts are not compromised.<\/li><\/ul>\n\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-esab-accordion-child\" style=\"border:1px solid var(--nv-primary-accent)\"><div class=\"esab__head\" style=\"padding:10px 10px 10px 10px;background-color:transparent\" role=\"button\" aria-expanded=\"false\"><div class=\"esab__heading_txt\"><p class=\"esab__heading_tag\" style=\"color:var(--nv-dark-bg)\"><strong>Dont&#8217;s<\/strong><\/p><\/div><div class=\"esab__icon\"><div class=\"esab__collapse\"><svg version=\"1.2\" viewbox=\"0 0 24 24\" width=\"24\" height=\"24\"><path fillrule=\"evenodd\" d=\"m3.5 20.5c-4.7-4.7-4.7-12.3 0-17 4.7-4.7 12.3-4.7 17 0 4.6 4.7 4.6 12.3 0 17-4.7 4.6-12.3 4.6-17 0zm0.9-0.9c4.2 4.2 11 4.2 15.2 0 4.2-4.2 4.2-11 0-15.2-4.2-4.3-11-4.3-15.2 0-4.3 4.2-4.3 11 0 15.2z\"><\/path><path d=\"m11.4 15.9v-3.3h-3.3c-0.3 0-0.6-0.3-0.6-0.6 0-0.4 0.3-0.6 0.6-0.6h3.3v-3.3c0-0.3 0.3-0.6 0.6-0.6 0.3 0 0.6 0.3 0.6 0.6v3.3h3.3c0.3 0 0.6 0.2 0.6 0.6q0 0.2-0.2 0.4-0.2 0.2-0.4 0.2h-3.3v3.3q0 0.2-0.2 0.4-0.2 0.2-0.4 0.2c-0.4 0-0.6-0.3-0.6-0.6z\"><\/path><\/svg><\/div><div class=\"esab__expand\"><svg version=\"1.2\" viewbox=\"0 0 24 24\" width=\"24\" height=\"24\"><path fillrule=\"evenodd\" d=\"m12 24c-6.6 0-12-5.4-12-12 0-6.6 5.4-12 12-12 6.6 0 12 5.4 12 12 0 6.6-5.4 12-12 12zm10.6-12c0-5.9-4.7-10.6-10.6-10.6-5.9 0-10.6 4.7-10.6 10.6 0 5.9 4.7 10.6 10.6 10.6 5.9 0 10.6-4.7 10.6-10.6z\"><\/path><path d=\"m5.6 11.3h12.8v1.4h-12.8z\"><\/path><\/svg><\/div><\/div><\/div><div class=\"esab__body\" style=\"border-top:1px solid #E0E0E0;padding:10px 10px 10px 10px;background-color:var(--nv-site-bg)\">\n\n<ul class=\"has-nv-dark-bg-color has-text-color wp-block-list\"><li>Don\u2019t install unauthorised programs on your work computer. Malicious applications often pose as legitimate software.<\/li><li>Don\u2019t respond to phone calls or emails requesting confidential data.<\/li><li>Don\u2019t leave sensitive information lying around the office.<\/li><li>Never click on links from an unknown or untrusted source. Cyber attackers often use them to trick you into visiting malicious sites and downloading malware that can be used to steal data and damage networks.<\/li><li>Don\u2019t be tricked into giving away confidential information. It\u2019s easy for an unauthorised person to call and pretend to be an employee or business partner.<\/li><li>Don\u2019t leave printouts or portable media containing private information on your desk. Lock them in a drawer to reduce the risk of unauthorised disclosure.<\/li><li>Don\u2019t post any private or sensitive information, such as credit card numbers, passwords or other private information, on public sites, including social media sites, and Don\u2019t send it through email unless authorised to do so. (Use privacy settings on social media sites to restrict access to your personal information)<\/li><li>Don\u2019t leave wireless or Bluetooth turned on when not in use. Only do so when planning to use and only in a safe environment.<\/li><li>Don\u2019t leave devices unattended. Keep all mobile devices, such as laptops and cell phones physically secured. If a device is lost or stolen, report it immediately to your manager and ISO\/designated security representative.<\/li><li>Don\u2019t plug in portable devices without permission from your management. These devices may be compromised with code just waiting to launch as soon as you plug them into a computer.<\/li><\/ul>\n\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center\" style=\"font-size:28px\">In News &#8211; Cyber Security, Attacks &amp; Crimes<br><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-829b1d53 wp-block-columns-is-layout-flex\" style=\"margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10px\"><\/div>\n\n\n\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-443f78d32f09dc89ca19ba7afd2fa5d6 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;background-color:#ffe37d;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<p class=\"has-medium-font-size\"><strong>Techie falls prey to \u2018digital arrest\u2019, loses Rs 6.29 crore to cyber frauds posing as CBI officers<\/strong><\/p>\n\n\n\n<p>In the largest individual cyber fraud ever registered with Pune City police, a 59-year-old senior IT executive from Pashan lost a staggering Rs 6.29 crore \u2014 nearly his entire life savings \u2014 to online criminals who posed as CBI officers.<br>The fraudsters threatened action in connection with a money laundering case, placing him under \u2018digital arrest\u2019 at his home and forcing him to remain on video call over several hours on the pretext of \u2018surveillance.\u2019 <\/p>\n\n\n\n<p>An FIR was registered at the cyber crime police station of Pune City on wednesday by the 59-year-old resident of Pashan in Pune, who currently works at a top executive position at an IT company in Mumbai. The complainant underwent the ordeal for over a week, starting from November 9. Deputy Commissioner of Police (cyber and economic offences) Vivek Masal said: \u201cThe complainant was approached by cyber criminals posing as CBI officers. They told him that his role was being probed in a money laundering case. On the pretext of conducting the probe, all his personal and financial information was sought by the cyber criminals. He was asked to stay at home, not communicate with anyone and remain under what they said was digital arrest. The cyber criminals asked him to liquidate all his fixed deposits, investments and transfer all the funds to various fraudulent accounts \u2014 saying those were accounts of the RBI \u2014 on the pretext of verification. All over four-five days, he was asked to remain on video call as part of the digital arrest.\u201d<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:12px\">(<strong>Source: <\/strong>The Indian Express)<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-80a423752e5398f5856f64b7fbd65469 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;background-color:#cff8d0;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<p class=\"has-medium-font-size\"><strong>Two Bengaluru residents lose \u20b995 lakh to cyber fraudsters<\/strong><\/p>\n\n\n\n<p>Two people have complained to the police here that they have collectively lost about \u20b995 lakh to cyber fraudsters after they fell prey to fake videos allegedly featuring two top businessmen. In both the cases, the complainants didn&#8217;t check the authenticity of the alleged videos and ended up clicking  some suspicious links which led them to fake websites created by fraudsters to cheat people and make money on promises of giving them higher returns, they said on Monday. &#8220;As per the complainants, only after investing in these social media platforms they realised that the alleged videos featuring Infosys co-founder N R Narayana Murthy and Reliance Industries Chairman Mukesh Ambani were used to get<br>them to suspicious links and without any due diligence on their part, they ended up investing only to realise that they were cheating using fake videos of such personalities,&#8221; a senior police officer said. In the first case, a resident of Banashankari here came across a video promoting a trading platform promising high returns on investments, police said. According to the woman, she clicked the link on some suspicious looking website and shared her details with the alleged platform. Later, she received a call from the an unidentified man, claiming to be an agent associated with the alleged platform convincing her to make investments for higher returns. Initially, she invested around \u20b91.4 lakh and got returns of \u20b98,000 and when she invested \u20b96.7 lakh from the second time, she did not get any returns and lost the invested amount as well, a senior police officer said. In a similar manner, she also got cheated of \u20b967 lakh with another platform, police said.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-small-font-size\">(<strong>Source: <\/strong>Hindustan Times)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10px\"><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-829b1d53 wp-block-columns-is-layout-flex\" style=\"margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10px\"><\/div>\n\n\n\n<div class=\"wp-block-column has-nv-light-bg-background-color has-text-color has-background has-link-color wp-elements-c048d7a84ee4dc0b48080f72ac8b7084 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<p class=\"has-medium-font-size\"><strong>&#8216;Don&#8217;t solely trust caller ID&#8217;: Cyber body issues warning to government official<\/strong><\/p>\n\n\n\n<p>The National Informatics Centre (NIC) has warned government officials against trusting the caller ID information without verification and divulging sensitive information. In the advisory, the cyber security body said cyber criminals may impersonate trusted entities to launch a &#8220;vishing&#8221; attack. &#8220;Attackers may impersonate trusted entities, such as senior government officials, law enforcement agencies, or technical support personnel,&#8221; the advisory issued recently by the National Informatics Centre (NIC) said. The severity of the communication has been categorised as &#8220;high&#8221;. <\/p>\n\n\n\n<p>The body said the attackers can  manipulate the caller ID information to create the impression that the phone call was coming from a legitimate number.<br>In the advisory, the body said there had been an increase in the number of vishing attacks against government officials. These attacks have been used to acquire confidential information and gain unauthorised access to official systems&#8221;.<\/p>\n\n\n\n<p class=\"has-small-font-size\">(<strong>Source: <\/strong>Hindustan Times)<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-2cafa5ca97f0587d2dc0dba5830b8d23 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;background-color:#7de4ff;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<p class=\"has-medium-font-size\"><strong>Three Arrested In Rs 60 Lakh Cyber Fraud Case Involving Fake Investment App By Pimpri Chinchwad Cyber Police Take Action<\/strong><\/p>\n\n\n\n<p>In a major breakthrough, the Pimpri Chinchwad Cyber Police have arrested three suspects from Uttar Pradesh and Chhatrapati Sambhajinagar in  connection with a Rs 61.3 lakh cyber fraud case involving a fake investment app targeting a resident of Sangvi.<\/p>\n\n\n\n<p><br>This marks the first reported crime of its kind at the Pimpri Chinchwad Cyber Police Station. The complainant, a resident of Sangvi, was browsing online for information on the stock market when they encountered an advertisement link for Mstock, a trading company. Upon clicking the link, they were added to a WhatsApp group titled \u201cL067.Mstock\u201d by a woman identified as Kruti, who promised a 25-30% profit on investments made through Mstock\u2019s trading platform. Enticed by the high returns, the complainant was convinced to transfer a total of Rs 61.3 lakh across several bank accounts.<\/p>\n\n\n\n<p class=\"has-small-font-size\">(<strong>Source: <\/strong>Pune Pulse)<\/p>\n\n\n\n<p class=\"has-small-font-size\"><\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10px\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:500px;aspect-ratio:unset;\"><img decoding=\"async\" class=\"wp-block-cover__image-background\" alt=\"\" src=\"https:\/\/nidj.ac.in\/wp-content\/themes\/neve\/assets\/img\/patterns\/neve-patterns-18.jpg\" style=\"object-position:81% 16%\" data-object-fit=\"cover\" data-object-position=\"81% 16%\"\/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-light-bg-background-color has-background-dim-80 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\" style=\"font-size:25px\"><strong>Basic troubleshooting<\/strong><br><strong> before reporting to IT Cell<\/strong><\/h2>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"699\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/troubleshooting.png\" alt=\"\" class=\"wp-image-6621\" style=\"width:250px;height:250px\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/troubleshooting.png 870w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/troubleshooting-300x241.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/troubleshooting-150x121.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/troubleshooting-768x617.png 768w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/troubleshooting-15x12.png 15w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list has-neve-text-color-color has-text-color\">\n<li>If your system is not powering ON, please check the power cable or adaptor connected to the system it may be loose or the cable may be damaged. Remove and re-plug it at both ends. One end is in your computer and other is in the wall jack. If the system is powering ON but still not booting, it could be due to a hardware fault or OS issue. Also remove any bootable flash drive if it is connected. <\/li>\n\n\n\n<li>Sometimes you may encounter software activation issues. Use the email ID and password provided to you by the Institute for reactivation. If you are still unable to activate, please seek assistance from the technical team.<\/li>\n\n\n\n<li>If your monitor display goes blank or laptop goes to sleep mode after idle period you can change the settings in the power option from control panel to overcome the issue.<\/li>\n\n\n\n<li>Network issues may be encountered due to various factors such as cable connectivity, network card or drivers issue, signal strength, mis-configuration, traffic overload etc. <\/li>\n\n\n\n<li>Connect your devices through UPS line only for constant power and to safeguard systems from fluctuation and damage.<\/li>\n\n\n\n<li>If your system is connected through Ethernet cable check to see the port or interface  LED\u2019s are glowing or not. You can try reconnecting the cable. You may also check if the LAN icon in the taskbar is marked as cross (Windows OS). If the icon is marked as exclamation\/ globe symbol right click on it and click on troubleshoot problems doing so can resolve the issue most of the time if the system did not get a valid IP address.<\/li>\n\n\n\n<li>Connect only to the Institute wifi network <strong>ConnectNIDJ<\/strong> for secure and reliable connection. If you are not able to connect please check your network card driver is installed and the wifi signal strength is good. Try running network diagnostics or reset the network adaptor to see if it resolves. Also try updating the operating system to its latest version or patches release as this could also be the cause of issue restricting users to connect to the WiFi network. Once your device is connected to the wifi network, users need to type in the credentials shared by the IT Cell. After successful authentication you will be able to browse Internet.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-cover alignfull has-parallax\" style=\"min-height:200px;aspect-ratio:unset;\"><div class=\"wp-block-cover__image-background wp-image-5879 has-parallax\" style=\"background-position:50% 50%;background-image:url(https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/09\/b5e93f9e5ddfc134a6eea3e7c59dd89146dbbb9fb915427ae64af37003d4df6d174caca5a99288bee4e99bf3512d7c91ad729e9c716d7f3b3fc69f_1280-1.jpg)\"><\/div><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-light-bg-background-color has-background-dim-90 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-neve-text-color-color has-text-color\" style=\"font-size:25px\"><strong>Important links<\/strong><\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybercrime.gov.in\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"306\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime-1024x306.png\" alt=\"\" class=\"wp-image-6336\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime-1024x306.png 1024w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime-300x90.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime-150x45.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime-768x230.png 768w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime-18x5.png 18w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ccrime.png 1404w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"font-size:15px\"><a href=\"https:\/\/cybercrime.gov.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Cyber Crime Reporting Portal <\/a><\/h3>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberswachhtakendra.gov.in\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"116\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/csk.gif\" alt=\"\" class=\"wp-image-6340\"\/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"font-size:15px\"><a href=\"https:\/\/www.cyberswachhtakendra.gov.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Swachta Kendra<\/a><\/h3>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/www.cert-in.org.in\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"220\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/certinm.png\" alt=\"\" class=\"wp-image-6351\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/certinm.png 663w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/certinm-300x100.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/certinm-150x50.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/certinm-18x6.png 18w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"font-size:15px\"><a href=\"https:\/\/www.cert-in.org.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">Indian Computer Emergency Response Team (CERT-In)<\/a><\/h3>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/infosecawareness.in\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"319\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1-1024x319.png\" alt=\"\" class=\"wp-image-6346\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1-1024x319.png 1024w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1-300x94.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1-150x47.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1-768x239.png 768w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1-18x6.png 18w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/isea-1.png 1328w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"font-size:15px\"><a href=\"https:\/\/infosecawareness.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Security Education and Awareness<\/a><\/h3>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-thumbnail\"><a href=\"\/en\/sdfsd\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"148\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ICT-150x148.png\" alt=\"\" class=\"wp-image-6324\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ICT-150x148.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ICT-300x295.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ICT-12x12.png 12w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/ICT.png 671w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong><a href=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/Frequentlyused_IT_Terminologies.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ICT Terminologies<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>&#8220;Information and Communication Technology Terminologies is essential to know for everyone since we all are closely attached with systems, mobiles and internet. Knowing the various technical terms will enable us to understand ICT in a better way &#8230;&#8221;<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-thumbnail\"><a href=\"\/en\/dsfgds\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"112\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/forms-150x112.png\" alt=\"\" class=\"wp-image-6325\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/forms-150x112.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/forms-300x225.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/forms-16x12.png 16w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/forms.png 693w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong><a href=\"http:\/\/192.168.1.21\/download\">Forms &amp; Software<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>&#8220;Various ICT related forms can be filled online to avail the services. Open-source \/ Institutional software   can be downloaded within the Institute Network &#8230;.&#8221;<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-thumbnail is-resized\"><a href=\"\/en\/gfdg\/\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"131\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/policies-150x131.png\" alt=\"\" class=\"wp-image-6323\" style=\"height:150px\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/policies-150x131.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/policies-300x262.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/policies-14x12.png 14w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/policies.png 662w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong>ICT Guidelines \/ Policy<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>&#8220;Information Technology policies are essential documents that outline rules, guidelines and best practices for using technology and information systems&#8230;..&#8221;<\/em><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:300px;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"576\" class=\"wp-block-cover__image-background wp-image-6476\" alt=\"\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/Screenshot-from-2023-10-17-15-28-03.png\" style=\"object-position:31% 0%\" data-object-fit=\"cover\" data-object-position=\"31% 0%\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/Screenshot-from-2023-10-17-15-28-03.png 585w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/Screenshot-from-2023-10-17-15-28-03-300x295.png 300w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/Screenshot-from-2023-10-17-15-28-03-150x148.png 150w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/Screenshot-from-2023-10-17-15-28-03-12x12.png 12w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-light-bg-background-color has-background-dim-90 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h1 class=\"wp-block-heading has-text-align-left has-neve-text-color-color has-text-color\">You can reach us at<\/h1>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-nv-dark-bg-color has-text-color\"><strong>Send an Email<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"65\" height=\"65\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/email-sm.png\" alt=\"\" class=\"wp-image-6202\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/email-sm.png 65w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/email-sm-12x12.png 12w\" sizes=\"(max-width: 65px) 100vw, 65px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center has-nv-dark-bg-color has-text-color\"><em>itcell<strong>(at)<\/strong>nidj<strong>(dot)<\/strong>ac<strong>(dot)<\/strong>in<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-nv-dark-bg-color has-text-color\"><strong>Call<\/strong> <strong>us<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"63\" height=\"63\" src=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/phone-sm.png\" alt=\"\" class=\"wp-image-6203\" srcset=\"https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/phone-sm.png 63w, https:\/\/nidj.ac.in\/wp-content\/uploads\/2023\/10\/phone-sm-12x12.png 12w\" sizes=\"(max-width: 63px) 100vw, 63px\" \/><\/figure><\/div>\n\n\n<p class=\"has-text-align-center has-nv-dark-bg-color has-text-color\">0376-2310108 (Ext:276)<br> Timing: 9 AM &#8211; 5 PM<br>(Monday \u2013 Friday)<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-7e5fce0a wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:65%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<iframe src=\"https:\/\/www.google.com\/maps\/embed?pb=!1m14!1m8!1m3!1d14252.37966738925!2d94.227917!3d26.741347!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x3746c2ae9f32b3ef%3A0x628925d850a938ff!2sNational%20Institute%20Of%20Design%20Assam!5e0!3m2!1sen!2sin!4v1697180965057!5m2!1sen!2sin\" width=\"800\" height=\"250\" style=\"border:0;\" allowfullscreen=\"\" loading=\"lazy\" referrerpolicy=\"no-referrer-when-downgrade\"><\/iframe>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<style>\n    \/* Styles for the floating arrow *\/\n    .floating-arrow {\n      position: fixed;\n      bottom: 30px;\n      right: 30px;\n      width: 50px;\n      height: 50px;\n      background-color: red;\n      color: #fff;\n      text-align: center;\n      line-height: 50px;\n      font-size: 28px;\n      cursor: pointer;\n      border-radius: 50%;\n      box-shadow: 0 2px 5px rgba(0, 0, 0, 0.3);\n      z-index: 9999;\n      opacity: 0.7;\n      transition: opacity 0.3s ease;\n    }\np\n{\n text-align: justify;\n}\n\nH3 {\ntext-align: justify;\n}\n    .floating-arrow:hover {\n      opacity: 1;\n    }\n  <\/style>\n\n\n  <!-- Your page content goes here -->\n \n\n  <!-- Floating arrow -->\n  <div class=\"floating-arrow\" id=\"floatingArrow\" onclick=\"scrollToTop()\">\n    \u2191\n  <\/div>\n\n  <script>\n    \/\/ Function to scroll to the top of the page\n    function scrollToTop() {\n      window.scrollTo({ top: 0, behavior: 'smooth' });\n    }\n\n    \/\/ Show the floating arrow when scrolling down\n    window.onscroll = function() {\n      var floatingArrow = document.getElementById('floatingArrow');\n      if (document.body.scrollTop > 20 || document.documentElement.scrollTop > 20) {\n        floatingArrow.style.display = 'block';\n      } else {\n        floatingArrow.style.display = 'none';\n      }\n    };\n  <\/script>\n<\/div>\n<\/div>\n<\/div>\n<\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>ICT Facilities The Institute has an Intranet site which is hosted and accessible within the campus network only. Users can access various types of online \/ offline forms, software&#8217;s etc. (Click to access the Intranet) ICT Terminologies &#8220;Information and Communication Technology Terminologies is essential to know for everyone since we all are closely attached with&hellip;&nbsp;<a href=\"https:\/\/nidj.ac.in\/en\/ict\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">ICT<\/span><\/a><\/p>",
        "protected": false
    },
    "author": 10,
    "featured_media": 0,
    "parent": 0,
    "menu_order": 0,
    "comment_status": "closed",
    "ping_status": "closed",
    "template": "",
    "meta": {
        "_lmt_disableupdate": "",
        "_lmt_disable": "",
        "neve_meta_sidebar": "full-width",
        "neve_meta_container": "contained",
        "neve_meta_enable_content_width": "",
        "neve_meta_content_width": 0,
        "neve_meta_title_alignment": "",
        "neve_meta_author_avatar": "",
        "neve_post_elements_order": "",
        "neve_meta_disable_header": "",
        "neve_meta_disable_footer": "",
        "neve_meta_disable_title": "",
        "footnotes": ""
    },
    "class_list": [
        "post-5982",
        "page",
        "type-page",
        "status-publish",
        "hentry"
    ],
    "_links": {
        "self": [
            {
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/pages\/5982",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/pages"
            }
        ],
        "about": [
            {
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/types\/page"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/users\/10"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/comments?post=5982"
            }
        ],
        "version-history": [
            {
                "count": 878,
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/pages\/5982\/revisions"
            }
        ],
        "predecessor-version": [
            {
                "id": 11623,
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/pages\/5982\/revisions\/11623"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/nidj.ac.in\/en\/wp-json\/wp\/v2\/media?parent=5982"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}