0
E-Governance and Security
MINI SEMINAR
30TH JUNE2013
AVCC,NOIDA
India has taken significant steps in the area of e-
governance, with almost all states across the country
launching e-serv...
The other
of the
side
story
Any ICT
infrastructure
must be
Secure
because
Citizen &
Business
transactions
contain
Significant
Confidential
Information
But who decides the Security QR’s…….
Sadly….till date the approach has been mostly
reactive since we have been traditional...
While anti-virus and firewalls are seen more as a
Reactive security mechanism,IDP solutions are more
Proactive and get act...
With the information Technology(IT)
Act 2000 coming into effect from
October 18,2000,transactions on the
internet have got...
And ever since……..
INDUSTRY APPLICATION AVERAGE COST PER
HOUR OF DOWN
TIME(US$)
Financial Brokerage Operations $15,840,000/-
Financial Credit...
Lets try to
get familiar
with the
threat
vectors!!!
Domains of
security
Impersonati
on
Failure
False
Identity
Revoked Rights
Unauth
Disclosure
Theft of Access
Tokens
DoS
Breach of
Anonymity
Unkn...
Probe is a class
of attacks where
an attacker scans
a network to
gather information
or find known
vulnerabilities
MALWARE : Malicious software
Microsoft b70
Internet Infrastructure attacks
These rare but serious attacks involve key components of the
Internet infrastructure rathe...
Denial of Service Attacks
Remote to local attack
User to Root Attack
So
What
Should we not support E-Governance?
Apex Body
on Standards
in DIT
State Wide
Area Network
(S.W.A.N.)
National
E- Government
Intranet
And all this
along with
these two
Current
Giants make
a great
Attack
Surface
Stringent
Security
Policies
Monitoring
tools
Analysis
tools
Firewalls/UT
Ms
Cryptography
E-governance-and-Security
E-governance-and-Security
E-governance-and-Security
E-governance-and-Security
E-governance-and-Security
E-governance-and-Security
E-governance-and-Security
Upcoming SlideShare
Loading in...5
×

E-governance-and-Security

172

Published on

Off course E-Governance is required.Today the worlds top 40 countries in terms of corruption free are all E-Governed!!!!!so y not for akka India.Govt has taken many steps in this direction.Though the speed is slow...is it really worth when India has one of the highest percentage of digital illiterates in the world....here comes security IQ of a common citizen into question!!!!

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
172
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "E-governance-and-Security"

  1. 1. E-Governance and Security MINI SEMINAR 30TH JUNE2013 AVCC,NOIDA
  2. 2. India has taken significant steps in the area of e- governance, with almost all states across the country launching e-services in some form or the other. * Source: india.gov.in/e-governance‎ We all know about the bright future
  3. 3. The other of the side story
  4. 4. Any ICT infrastructure must be Secure because Citizen & Business transactions contain Significant Confidential Information
  5. 5. But who decides the Security QR’s……. Sadly….till date the approach has been mostly reactive since we have been traditional in configuring SECURITY!!!!!!!
  6. 6. While anti-virus and firewalls are seen more as a Reactive security mechanism,IDP solutions are more Proactive and get activated as soon as any abnormal behavior is detected.
  7. 7. With the information Technology(IT) Act 2000 coming into effect from October 18,2000,transactions on the internet have got legal validity in India
  8. 8. And ever since……..
  9. 9. INDUSTRY APPLICATION AVERAGE COST PER HOUR OF DOWN TIME(US$) Financial Brokerage Operations $15,840,000/- Financial Credit Card Sales $7,000,000/- Retail Home Shopping TV $750,000/- Transportation Air Line reservations $350,000/- Entertainment Tele-ticket sales $300,000/- Shipping Package Shipping $250,000/- Financial ATM $200,000/-
  10. 10. Lets try to get familiar with the threat vectors!!!
  11. 11. Domains of security
  12. 12. Impersonati on Failure False Identity Revoked Rights Unauth Disclosure Theft of Access Tokens DoS Breach of Anonymity Unknown Outsider Attack User Fraud Insider Attack Access Threats
  13. 13. Probe is a class of attacks where an attacker scans a network to gather information or find known vulnerabilities
  14. 14. MALWARE : Malicious software Microsoft b70
  15. 15. Internet Infrastructure attacks These rare but serious attacks involve key components of the Internet infrastructure rather than specific systems on the Internet.
  16. 16. Denial of Service Attacks Remote to local attack User to Root Attack
  17. 17. So What Should we not support E-Governance?
  18. 18. Apex Body on Standards in DIT
  19. 19. State Wide Area Network (S.W.A.N.) National E- Government Intranet
  20. 20. And all this along with these two Current Giants make a great Attack Surface
  21. 21. Stringent Security Policies Monitoring tools Analysis tools Firewalls/UT Ms Cryptography
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×