Transcript
Page 1: E-governance-and-Security

E-Governance and Security

MINI SEMINAR

30TH JUNE2013

AVCC,NOIDA

Page 2: E-governance-and-Security
Page 3: E-governance-and-Security

India has taken significant steps in the area of e-

governance, with almost all states across the country

launching e-services in some form or the other.

* Source: india.gov.in/e-governance‎

We all know about the bright

future

Page 4: E-governance-and-Security
Page 5: E-governance-and-Security

The other

of the

side

story

Page 6: E-governance-and-Security

Any ICT infrastructure

must be Secure

because Citizen & Business

transactions contain

Significant Confidential Information

Page 7: E-governance-and-Security

But who decides the Security QR’s…….

Sadly….till date the approach has been mostly reactive since we have been traditional in

configuring SECURITY!!!!!!!

Page 8: E-governance-and-Security

While anti-virus and firewalls are seen more as a

Reactive security mechanism,IDP solutions are more

Proactive and get activated as soon as any abnormal

behavior is detected.

Page 9: E-governance-and-Security

With the information Technology(IT) Act 2000 coming into effect from October 18,2000,transactions on the internet have got legal validity in India

Page 10: E-governance-and-Security

And ever since……..

Page 11: E-governance-and-Security

INDUSTRY APPLICATION AVERAGE COST PER HOUR OF DOWN

TIME(US$)

Financial Brokerage Operations $15,840,000/-

Financial Credit Card Sales $7,000,000/-

Retail Home Shopping TV $750,000/-

Transportation Air Line reservations $350,000/-

Entertainment Tele-ticket sales $300,000/-

Shipping Package Shipping $250,000/-

Financial ATM $200,000/-

Page 12: E-governance-and-Security

Lets try to

get familiar

with the

threat

vectors!!!

Page 13: E-governance-and-Security

Domains of

security

Page 14: E-governance-and-Security
Page 15: E-governance-and-Security
Page 16: E-governance-and-Security

Impersonati

on Failure

False

Identity

Revoked Rights

Unauth

Disclosure

Theft of Access

Tokens

DoS

Breach of

Anonymity

Unknown

Outsider Attack

User Fraud

Insider Attack

Access

Threats

Page 17: E-governance-and-Security
Page 18: E-governance-and-Security

Probe is a class

of attacks where

an attacker scans

a network to

gather information

or find known

vulnerabilities

Page 19: E-governance-and-Security

MALWARE : Malicious software Microsoft b70

Page 20: E-governance-and-Security

Internet Infrastructure attacks

These rare but serious attacks involve key components of the

Internet infrastructure rather than specific systems on the Internet.

Page 21: E-governance-and-Security

Denial of Service Attacks

Remote to local attack

User to Root Attack

Page 22: E-governance-and-Security

So

What Should we not support E-Governance?

Page 23: E-governance-and-Security

Apex Body on Standards

in DIT

Page 24: E-governance-and-Security

State Wide Area Network

(S.W.A.N.)

National E- Government Intranet

Page 25: E-governance-and-Security

And all this along with these two

Current Giants make

a great Attack Surface

Page 26: E-governance-and-Security

Stringent

Security

Policies

Monitoring

tools

Analysis

tools

Firewalls/UT

Ms

Cryptography

Page 27: E-governance-and-Security
Page 28: E-governance-and-Security

Top Related