Download - E-governance-and-Security
![Page 1: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/1.jpg)
E-Governance and Security
MINI SEMINAR
30TH JUNE2013
AVCC,NOIDA
![Page 2: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/2.jpg)
![Page 3: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/3.jpg)
India has taken significant steps in the area of e-
governance, with almost all states across the country
launching e-services in some form or the other.
* Source: india.gov.in/e-governance
We all know about the bright
future
![Page 4: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/4.jpg)
![Page 5: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/5.jpg)
The other
of the
side
story
![Page 6: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/6.jpg)
Any ICT infrastructure
must be Secure
because Citizen & Business
transactions contain
Significant Confidential Information
![Page 7: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/7.jpg)
But who decides the Security QR’s…….
Sadly….till date the approach has been mostly reactive since we have been traditional in
configuring SECURITY!!!!!!!
![Page 8: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/8.jpg)
While anti-virus and firewalls are seen more as a
Reactive security mechanism,IDP solutions are more
Proactive and get activated as soon as any abnormal
behavior is detected.
![Page 9: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/9.jpg)
With the information Technology(IT) Act 2000 coming into effect from October 18,2000,transactions on the internet have got legal validity in India
![Page 10: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/10.jpg)
And ever since……..
![Page 11: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/11.jpg)
INDUSTRY APPLICATION AVERAGE COST PER HOUR OF DOWN
TIME(US$)
Financial Brokerage Operations $15,840,000/-
Financial Credit Card Sales $7,000,000/-
Retail Home Shopping TV $750,000/-
Transportation Air Line reservations $350,000/-
Entertainment Tele-ticket sales $300,000/-
Shipping Package Shipping $250,000/-
Financial ATM $200,000/-
![Page 12: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/12.jpg)
Lets try to
get familiar
with the
threat
vectors!!!
![Page 13: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/13.jpg)
Domains of
security
![Page 14: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/14.jpg)
![Page 15: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/15.jpg)
![Page 16: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/16.jpg)
Impersonati
on Failure
False
Identity
Revoked Rights
Unauth
Disclosure
Theft of Access
Tokens
DoS
Breach of
Anonymity
Unknown
Outsider Attack
User Fraud
Insider Attack
Access
Threats
![Page 17: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/17.jpg)
![Page 18: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/18.jpg)
Probe is a class
of attacks where
an attacker scans
a network to
gather information
or find known
vulnerabilities
![Page 19: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/19.jpg)
MALWARE : Malicious software Microsoft b70
![Page 20: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/20.jpg)
Internet Infrastructure attacks
These rare but serious attacks involve key components of the
Internet infrastructure rather than specific systems on the Internet.
![Page 21: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/21.jpg)
Denial of Service Attacks
Remote to local attack
User to Root Attack
![Page 22: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/22.jpg)
So
What Should we not support E-Governance?
![Page 23: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/23.jpg)
Apex Body on Standards
in DIT
![Page 24: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/24.jpg)
State Wide Area Network
(S.W.A.N.)
National E- Government Intranet
![Page 25: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/25.jpg)
And all this along with these two
Current Giants make
a great Attack Surface
![Page 26: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/26.jpg)
Stringent
Security
Policies
Monitoring
tools
Analysis
tools
Firewalls/UT
Ms
Cryptography
![Page 27: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/27.jpg)
![Page 28: E-governance-and-Security](https://reader033.vdocuments.mx/reader033/viewer/2022052905/55863274d8b42a56578b512a/html5/thumbnails/28.jpg)