SlideShare a Scribd company logo
1 of 28
Download to read offline
E-Governance and Security
MINI SEMINAR
30TH JUNE2013
AVCC,NOIDA
India has taken significant steps in the area of e-
governance, with almost all states across the country
launching e-services in some form or the other.
* Source: india.gov.in/e-governance‎
We all know about the bright
future
The other
of the
side
story
Any ICT
infrastructure
must be
Secure
because
Citizen &
Business
transactions
contain
Significant
Confidential
Information
But who decides the Security QR’s…….
Sadly….till date the approach has been mostly
reactive since we have been traditional in
configuring SECURITY!!!!!!!
While anti-virus and firewalls are seen more as a
Reactive security mechanism,IDP solutions are more
Proactive and get activated as soon as any abnormal
behavior is detected.
With the information Technology(IT)
Act 2000 coming into effect from
October 18,2000,transactions on the
internet have got legal validity in India
And ever since……..
INDUSTRY APPLICATION AVERAGE COST PER
HOUR OF DOWN
TIME(US$)
Financial Brokerage Operations $15,840,000/-
Financial Credit Card Sales $7,000,000/-
Retail Home Shopping TV $750,000/-
Transportation Air Line reservations $350,000/-
Entertainment Tele-ticket sales $300,000/-
Shipping Package Shipping $250,000/-
Financial ATM $200,000/-
Lets try to
get familiar
with the
threat
vectors!!!
Domains of
security
Impersonati
on
Failure
False
Identity
Revoked Rights
Unauth
Disclosure
Theft of Access
Tokens
DoS
Breach of
Anonymity
Unknown
Outsider Attack
User Fraud
Insider Attack
Access
Threats
Probe is a class
of attacks where
an attacker scans
a network to
gather information
or find known
vulnerabilities
MALWARE : Malicious software
Microsoft b70
Internet Infrastructure attacks
These rare but serious attacks involve key components of the
Internet infrastructure rather than specific systems on the Internet.
Denial of Service Attacks
Remote to local attack
User to Root Attack
So
What
Should we not support E-Governance?
Apex Body
on Standards
in DIT
State Wide
Area Network
(S.W.A.N.)
National
E- Government
Intranet
And all this
along with
these two
Current
Giants make
a great
Attack
Surface
Stringent
Security
Policies
Monitoring
tools
Analysis
tools
Firewalls/UT
Ms
Cryptography
E-governance-and-Security
E-governance-and-Security

More Related Content

What's hot

What's hot (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
Information and communication technology:a class presentation
Information and communication technology:a class presentationInformation and communication technology:a class presentation
Information and communication technology:a class presentation
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
Government Digitalization.ppt
Government Digitalization.pptGovernment Digitalization.ppt
Government Digitalization.ppt
 
EDI
EDIEDI
EDI
 
e governance
e governancee governance
e governance
 
Evolution of study of e governance
Evolution of study of e governanceEvolution of study of e governance
Evolution of study of e governance
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
India's potential in e governance
India's potential in e governanceIndia's potential in e governance
India's potential in e governance
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
E governance
E governanceE governance
E governance
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
E-Government
E-GovernmentE-Government
E-Government
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Ict ppt on e governance
Ict ppt on e governanceIct ppt on e governance
Ict ppt on e governance
 
Internet security
Internet securityInternet security
Internet security
 
E governance
E   governanceE   governance
E governance
 

Viewers also liked

Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
Saif Ullah
 

Viewers also liked (16)

ERP & BI
ERP & BIERP & BI
ERP & BI
 
E-government Security Models
E-government Security ModelsE-government Security Models
E-government Security Models
 
Erp implementation ethics for successful projects
Erp implementation ethics for successful projectsErp implementation ethics for successful projects
Erp implementation ethics for successful projects
 
Biometric identification
Biometric identificationBiometric identification
Biometric identification
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
E-government architecture
E-government architectureE-government architecture
E-government architecture
 
e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce Technology
 
E governance presentation
E governance presentationE governance presentation
E governance presentation
 
E governance
E governanceE governance
E governance
 
e-Government introduction
e-Government introductione-Government introduction
e-Government introduction
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
COBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an IntroductionCOBIT 5 IT Governance Model: an Introduction
COBIT 5 IT Governance Model: an Introduction
 
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
Ramco ERP on Cloud - The Best Cloud Computing Solution Worldwide
 
Data mining
Data miningData mining
Data mining
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERP
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 

Similar to E-governance-and-Security

Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
Sam Ghosh
 
Cyber law
Cyber lawCyber law
Cyber law
abiabel
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
journalBEEI
 

Similar to E-governance-and-Security (20)

PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital India
 
Fintechs in india
Fintechs in indiaFintechs in india
Fintechs in india
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfCyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdf
 
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTTCYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
 
Cyber law
Cyber lawCyber law
Cyber law
 
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
A Comprehensive Analysis of Cybercrime, Data Protection, Privacy, and e comme...
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)Exploring the Opportunities of Internet of Things (IoT)
Exploring the Opportunities of Internet of Things (IoT)
 
Kgabo Ralebepa- Vice President of ISACA SA Chapter
Kgabo Ralebepa- Vice President of ISACA SA ChapterKgabo Ralebepa- Vice President of ISACA SA Chapter
Kgabo Ralebepa- Vice President of ISACA SA Chapter
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
Contribution of IoT & its Prospect in Bangladesh
Contribution of IoT & its Prospect in BangladeshContribution of IoT & its Prospect in Bangladesh
Contribution of IoT & its Prospect in Bangladesh
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 

More from anupriti

More from anupriti (20)

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 
Regin
ReginRegin
Regin
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 

Recently uploaded

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

E-governance-and-Security