Security and Compliance in E-GovernanceRuchin KumarPrincipal Solution Architect – India & SAARCSafeNet Inc.Ruchin.kumar@sa...
Governance to eGovernance    > Visibility              From scattered information on files TO a              consolidated ...
Made Possible through implementation of IT          for Workflow Automation                                         eindia...
Governance – False sense of security                                         What can’t be found can’t stolen or manipulat...
Use Case - Crime and Criminal Tracking Network And System                                         eindia.eletsonline.com© ...
Data Elements Stored in the CCTNS system         Criminal Details         Lost or unauthorized property details         Pa...
Integrated Financial Management System            (IFMS) and Integrated Workflow and      Document Management System (IWDM...
Data Elements Stored in the Treasury System         Financial Data in terms of                 Debt Management            ...
Inspector General of Registration and   Superintendent of Stamps (IGRS) Property   Administration System (PAS) – An Exampl...
Data Elements Stored in the IGRS system         Property Details         Scanned Copy of Registry         Buyer Details   ...
Likely Misuse Scenario - 1         Query the system to show the Top 10 transactions by         value in last 10-days      ...
Likely Misuse Scenario - 2         Query the system to show list of people         with highest number of properties      ...
IT Act of India         Section 43A                 Where a body corporate, possessing, dealing or handling any sensitive ...
e-Gov Security – The way to go         Understand the Security Aspects                 Integrity of Data (No One shall be ...
Public Key Cryptography for Message Encryption                                             Message Encryption             ...
Public Key Cryptography for Digital Signature                                               Message Signature             ...
Communication ProtectionIdentity Protection -                 Transaction and Identity    Data Encryption and             ...
Communication Protection – Identity Protection -                     Transaction and Identity   Data Encryption and Contro...
Communication Protection – Identity Protection -                     Transaction and Identity   Data Encryption and Contro...
SafeNet Fact Sheet  The largest company exclusively focused on the protection  of high-value information assets.   Founded...
Thank YouRuchin KumarPrincipal Solution ArchitectSafeNet Inc.+91-9999555503Ruchin.kumar@safenet-inc.com                   ...
Upcoming SlideShare
Loading in...5
×

ICT Infrastructure, Data Centre and Applications - Ruchin Kumar, SafeNet India Pvt. Ltd.

2,845

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,845
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "ICT Infrastructure, Data Centre and Applications - Ruchin Kumar, SafeNet India Pvt. Ltd."

  1. 1. Security and Compliance in E-GovernanceRuchin KumarPrincipal Solution Architect – India & SAARCSafeNet Inc.Ruchin.kumar@safenet-inc.com eindia.eletsonline.com © SafeNet Confidential and Proprietary
  2. 2. Governance to eGovernance > Visibility From scattered information on files TO a consolidated dashboard that can be accessed from anywhere > Efficiency From manual work processes with lost bandwidth in finding the files as well as status of a particular work item TO a central system that allows for tracking of work status of a particular item without having to ask anyone > Analytics From missing information to delays in getting the information TO real time analytics eindia.eletsonline.com© SafeNet Confidential and Proprietary 2
  3. 3. Made Possible through implementation of IT for Workflow Automation eindia.eletsonline.com© SafeNet Confidential and Proprietary 3
  4. 4. Governance – False sense of security What can’t be found can’t stolen or manipulated Employees not sure where the file is Strong rooms full of files that no one knows how to search the information for> What can’t be accessed can’t be under threat You can ask for your own file only Even getting access to your own file is difficult enough let alone having to get access to someone else’ file > What can’t be found can’t be under threat Making a general query (like give me the list of all properties sold in last 10-days) is quite a challenge in a manual environment eindia.eletsonline.com© SafeNet Confidential and Proprietary 4
  5. 5. Use Case - Crime and Criminal Tracking Network And System eindia.eletsonline.com© SafeNet Confidential and Proprietary 5
  6. 6. Data Elements Stored in the CCTNS system Criminal Details Lost or unauthorized property details Passport Verification details Ongoing cases details Pictures, Biometric prints etc Citizen information Arms possession details eindia.eletsonline.com© SafeNet Confidential and Proprietary 6
  7. 7. Integrated Financial Management System (IFMS) and Integrated Workflow and Document Management System (IWDMS) ……….The Treasury Projects eindia.eletsonline.com© SafeNet Confidential and Proprietary 7
  8. 8. Data Elements Stored in the Treasury System Financial Data in terms of Debt Management Loan Management Treasury Data Pension Details (confidential for an individual) Budgeting Details Accounting Details State Revenue Details Revenue Disbursement Details eindia.eletsonline.com© SafeNet Confidential and Proprietary 8
  9. 9. Inspector General of Registration and Superintendent of Stamps (IGRS) Property Administration System (PAS) – An Example eindia.eletsonline.com© SafeNet Confidential and Proprietary 9
  10. 10. Data Elements Stored in the IGRS system Property Details Scanned Copy of Registry Buyer Details Seller Details Fingerprints Picture Signatures eindia.eletsonline.com© SafeNet Confidential and Proprietary 10
  11. 11. Likely Misuse Scenario - 1 Query the system to show the Top 10 transactions by value in last 10-days > Once done, does it facilitate someone with criminal mindset to make demands on the parties involved? > Does the information published on a Website or any other public media lead to uncomfortable situation for the parties involved? eindia.eletsonline.com© SafeNet Confidential and Proprietary 11
  12. 12. Likely Misuse Scenario - 2 Query the system to show list of people with highest number of properties > Once done, does it facilitate someone with criminal mindset to misuse the information. > Does the information published on a Website or any other public media lead to uncomfortable situation for the parties involved? eindia.eletsonline.com© SafeNet Confidential and Proprietary 12
  13. 13. IT Act of India Section 43A Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person to affected So What? Financial Penalties to the Organization Loss of Reputation for the Department eindia.eletsonline.com© SafeNet Confidential and Proprietary 13
  14. 14. e-Gov Security – The way to go Understand the Security Aspects Integrity of Data (No One shall be able to modify it) Non-repudiation of Transaction (No one shall be able to deny the transaction) Encryption of Data (Data shall be visible to only the ones who are authorized) Identify the Sensitive Data Elements and corresponding Security Needs Not every data elements need same level of protection Control the access to Data. Not every piece of data is needed by everyone Control the Type of Queries that can be run by a particular role Control the amount of information that can be fetched Add the Security Aspects to bring ―adequate‖ level of Security for the identified Data Elements Add the Audit Trail eindia.eletsonline.com© SafeNet Confidential and Proprietary 14
  15. 15. Public Key Cryptography for Message Encryption Message Encryption Encrypt Message with Session Key Encrypt Session Key with Recipient Public Key Send Encrypted Message and Encrypted Session Key OverMessage DecryptionDecrypt Session Key with Recipient PrivateKeyDecrypt Message with Session Key eindia.eletsonline.com© SafeNet Confidential and Proprietary 15
  16. 16. Public Key Cryptography for Digital Signature Message Signature Hash Message Encrypt Message with Sender Private Key to generate Digital Signature Send Message and Digital Signature overSignature VerificationDecrypt Digital Signature with Sender PublicKey to derive Hash MessageHash Original Message to get another HashMatch both Hash Messages eindia.eletsonline.com © SafeNet Confidential and Proprietary 16
  17. 17. Communication ProtectionIdentity Protection - Transaction and Identity Data Encryption and – High-Speed Network Authentication Protection - HSM Control – Data Secure Encryptoion Token Management System USB Authenticators > Secure enterprise access > Simplify remote password management Smart Cards > Enable new online services > Ensure Compliance Hybrid (OTP/SC/Flash) Authenticators OTP AuthenticatorsOffering the broadest range of authenticators, fromsmart cards and tokens to mobile phone auth—allmanaged from a single platform Software / Mobile Authenticators eindia.eletsonline.com © SafeNet Confidential and Proprietary 17
  18. 18. Communication Protection – Identity Protection - Transaction and Identity Data Encryption and Control High-Speed Network Authentication Protection - HSM – Data Secure Encryptoion Luna SA / SP > Securely store encryption Luna EFT material > Hardware based identity verification Luna XML > Secure execution of digital transactions > Ensure Compliance CA4 Luna PCMRanked #1 in the market worldwide, SafeNet HSMsprovide the highest-performing, most-secure, and ProtectServer Goldeasiest-to-integrate application and transactionsecurity solution for enterprise and governmentorganizations. Robust FIPS and Common Criteria Luna PCIvalidation makes SafeNet HSMs tamper-resistant. eindia.eletsonline.com © SafeNet Confidential and Proprietary 18
  19. 19. Communication Protection – Identity Protection - Transaction and Identity Data Encryption and Control High-Speed Network Authentication Protection - HSM – Data Secure Encryptoion DataSecure > Centrally encrypt and control access to sensitive EdgeSecure information > Enable secure Data Center Suite ProtectDB collaboration and information exchange with ProtectApp persistent protection and control ProtectZ > Ensure compliance across Datacenter and endpoints Tokenization and into the cloud Manager eSafe SmartSuiteDataSecure is the market’s only unified platformfor data encryption, key management, and Endpoint Suite ProtectFilegranular access controls persistently protectinginformation from the data center to the broadest ProtectDrivearray of endpoint devices and into the cloud. eindia.eletsonline.com © SafeNet Confidential and Proprietary 19
  20. 20. SafeNet Fact Sheet The largest company exclusively focused on the protection of high-value information assets. Founded: 1983 Global Footprint with more than 25,000 customers in 100 countries Employees: Over 1,500 in 25 countries Recognized Security technology leadership, over 550 security engineers strong Accredited with products certified to the highest security standards eindia.eletsonline.com© SafeNet Confidential and Proprietary 20
  21. 21. Thank YouRuchin KumarPrincipal Solution ArchitectSafeNet Inc.+91-9999555503Ruchin.kumar@safenet-inc.com eindia.eletsonline.com © SafeNet Confidential and Proprietary 21

×