{"id":43355,"date":"2018-07-16T11:09:46","date_gmt":"2018-07-16T05:39:46","guid":{"rendered":"https:\/\/hindi.theindianwire.com\/?p=43355"},"modified":"2018-07-16T00:31:58","modified_gmt":"2018-07-15T19:01:58","slug":"%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be","status":"publish","type":"post","link":"https:\/\/hindi.theindianwire.com\/%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-43355\/","title":{"rendered":"\u0938\u093e\u0907\u092c\u0930 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u0915\u094d\u092f\u093e \u0939\u0948? \u092a\u0930\u093f\u092d\u093e\u0937\u093e, \u0909\u092a\u093e\u092f, \u0928\u093f\u092c\u0902\u0927"},"content":{"rendered":"\n

\u0938\u093e\u0907\u092c\u0930 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u0915\u0940 \u092a\u0930\u093f\u092d\u093e\u0937\u093e (Cyber Security definition in hindi)<\/h3>\n

\u092a\u0930\u093f\u092d\u093e\u0937\u093e \u2013 <\/strong>\u092f\u0939 \u090f\u0915 \u0924\u0930\u0939 \u0915\u0940 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u0939\u0948 \u091c\u094b \u0915\u0940 \u0907\u0902\u091f\u0930\u0928\u0947\u091f \u0938\u0947 \u091c\u0941\u095c\u0947 \u0939\u0941\u090f \u0938\u093f\u0938\u094d\u091f\u092e\u094b\u0902 \u0915\u0947 \u0932\u093f\u090f \u0939\u094b\u0924\u0940 \u0939\u0948\u0964 \u0907\u0938\u092e\u0947 \u0939\u093e\u0930\u094d\u0921\u0935\u0947\u092f\u0930, \u0938\u0949\u092b\u094d\u091f\u0935\u0947\u092f\u0930 \u0914\u0930 \u0921\u093e\u091f\u093e \u0915\u094b \u0938\u093e\u0907\u092c\u0930 \u0905\u092a\u0930\u093e\u0927 \u0938\u0947 \u092c\u091a\u093e\u0928\u0947 \u0915\u093e \u092d\u0940 \u0915\u093e\u092e \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n

\u0938\u093e\u0907\u092c\u0930 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u0914\u0930 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u092b\u094b\u0930\u094d\u0938 \u0926\u094b\u0928\u094b\u0902 \u0939\u0940 \u0921\u093e\u091f\u093e \u0915\u0940 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u0915\u0947 \u0932\u093f\u090f \u0930\u0916\u0947 \u091c\u093e\u0924\u0947 \u0939\u0948\u0902 \u091c\u093f\u0938\u0938\u0947 \u0915\u0940 \u0915\u093f\u0938\u0940 \u092d\u0940 \u0924\u0930\u0939 \u0938\u0947 \u0921\u093e\u091f\u093e \u0915\u0940 \u091a\u094b\u0930\u0940 \u0928 \u0939\u094b \u0914\u0930 \u0938\u092d\u0940 \u0921\u0949\u0915\u092f\u0941\u092e\u0947\u0902\u091f \u0914\u0930 \u092b\u093e\u0907\u0932 \u0938\u0941\u0930\u0915\u094d\u0937\u093f\u0924 \u0930\u0939\u0947\u0902\u0964 \u092c\u095c\u0947 \u092c\u095c\u0947 \u0915\u092e\u094d\u092a\u094d\u092f\u0941\u091f\u0930 \u0935\u093f\u0936\u0947\u0937\u091c\u094d\u091e \u0914\u0930 \u0906\u0908\u091f\u0940 \u0915\u0947 \u092a\u094d\u0930\u0936\u093f\u0915\u094d\u0937\u093f\u0924 \u0932\u094b\u0917 \u0907\u0938 \u0924\u0930\u0939 \u0915\u0947 \u0915\u093e\u092e \u0915\u0930\u0928\u0947 \u092e\u0947\u0902 \u0938\u092e\u0930\u094d\u0925 \u0939\u094b\u0924\u0947 \u0939\u0948\u0902\u0964<\/p>\n

\u0938\u093e\u0907\u092c\u0930 \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u0915\u0947 \u0924\u0924\u094d\u0935 (elements of cyber security in hindi)<\/h3>\n

\u0907\u0938\u092e\u0947 \u0915\u093e\u092b\u0940 \u0924\u0930\u0939 \u0915\u0947 \u092a\u094d\u0930\u092f\u093e\u0938 \u0915\u093f\u090f \u091c\u093e\u0924\u0947 \u0939\u0948\u0902 \u091c\u093f\u0938\u0938\u0947 \u0915\u0940 \u0921\u093e\u091f\u093e \u0915\u094b \u0938\u0941\u0930\u0915\u094d\u0937\u093f\u0924 \u0930\u0916\u093e \u091c\u093e \u0938\u0915\u0947\u0964<\/p>\n