SlideShare a Scribd company logo
1 of 45
Security Architecture Prof. K Subramanian SM(IEEE, USA), SMACM(USA), FIETE, SMCSI,MAIMA,MAIS(USA),MCFE(USA) Director & Professor, Advanced Center for Informatics & Innovative Learning (ACIIL), IGNOU Honorary  IT Adviser to CAG of India Ex-DDG(NIC), Ministry of Comm. & IT Emeritus President, eInformation Systems, Security, Audit Association(eISSA) President, Cyber Society of India(Cysi)
Global issues with governance of cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru
Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
09/27/10
09/27/10 Prof ks@2010 Software architecture series
Fiver tier Architecture for Cyber Space ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emerging Technologies -Competitive Environments &  Integration Catering through ICE Technologies 1.  IT 2. BT 3. CT 4. ET 5. NT 6. ST 1.  Operational Integration 2. Professional Integration (HR) 3. Emotional/Cultural Integration ICE is the sole integrator & IT/Cyber  Governance is Important ,[object Object],[object Object],[object Object],[object Object],[object Object]
Creating Trust in an Enterprise ,[object Object],[object Object]
Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India
Transition: Insurance    Assurance  &  Assurance Layered Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transition: Insurance   Assurance  &  Assurance Layered Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India
Why Assurance? Competitive Threats &  Way Forward ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Areas of Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What and Why of Business Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Assurance Stakeholders Stakeholders for business assurance Board of Directors Management Staff/Employees Organisation Customers Public Suppliers Enforcement & regulatory authorities Owner Creditors Shareholders Insurers Business partners
Benefits of Assurance  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Integration Professional Integration (HR) ‏ Emotional/Cultural Integration ICT &  Government Business & Services Integration Multi Technology coexistence and seamless integration Information Assurance Quality, Currency, Customization/Personalization ICE is the sole integrator IT Governance is Important
Managing Interdependencies Critical  Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Towards Information Assurance ,[object Object],[object Object],[object Object]
Up The Value Chain
Enabling to rapidly move up the  Governance Evolution Staircase Strategy/Policy People Process Technology 3. Transaction Competition Confidentiality/privacy Fee for transaction E-authentication Self-services Skill set changes Portfolio mgmt. Sourcing  Inc. business staff BPR Relationship mgmt. Online interfaces Channel mgmt. Legacy sys. links Security Information access 24x7 infrastructure Sourcing Funding stream allocations Agency identity “ Big Browser” Job structures Relocation/telecommuting Organization Performance accountability  Multiple-programs skills Privacy reduces Integrated services Change value chain New processes/services Change relationships (G2G, G2B, G2C, G2E) ‏ New applications New data structures Time 2. Interaction Searchable Database Public response/  email Content mgmt. Increased  support staff Governance Knowledge mgmt. E-mail best prac. Content mgmt. Metadata Data synch. Search engine E-mail 1. Presence Publish  Existing Streamline processes Web site Markup Trigger 4. Transformation Cost/ Complexity Define policy and  outsource execution Retain monitoring and control Outsource service delivery staff Outsource process execution staff Outsource customer  facing processes Outsource backend processes Applications Infrastructure Value 5. Outsourcing Constituent Evolve PPP model
Why information security Governance is important ,[object Object],[object Object]
Threat & Vulnerability Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Identification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
9 Rules of Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Insider – Who are They? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru
Solutions Based on Study Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru
General Solution Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru
Insider Threat Modeling ,[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru
Information-Centric Modeling  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],24/7/2010 Prof. KS@2010 isaca conference July 2010 Bengaluru Practical Considerations
Calder- Moir IT Governance Framework 3/7/2009 IMT Ghaziabad Lecture Prof. KS@2009 March 2009
Measurement of IT  Projects Value and Effectiveness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5th December 2007 Cyber assurance for Financial services IT Services Objectives and Certification Framework 2(1)(zd)(d) 2(1)(zd)(b) 2(1)(zd)(a) 2(1)(zd)(c) Indian IT Act reference Reliability of information Compliance Availability Integrity Confidentiality Efficiency Effectiveness IT Act COBIT Control Theory Framework Attributes
Standards, Standards, Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Importance of Group Standards -no one standard meets all requirements ISO 27001/BS7799 Vs COBIT Vs CMM & PCMM Vs ITIL Mission Business Objectives Business Risks Applicable Risks Internal Controls Review
Gouvernance & Assurance Maturity Model
[object Object],“ To derive a  powerful logic  for implementing or not implementing a security measure”  Security/Risk  Assurance - Expectations
IT Security predictions 2010-2011  1. Pirated software * ,[object Object],[object Object],Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India
   IT Security predictions 2010-11  2. social networks and ups the ante  ,[object Object],Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India
IT Security predictions 2010-2011  3.0  Criminals take to the cloud ,[object Object],Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India
IT Security predictions 2010 ,[object Object],[object Object],[object Object],Oct 27,2010 Future egovIndia  forum Oct 2010 Delhi India
3/7/2009 IMT Ghaziabad Lecture Prof. KS@2009 March 2009 Assurance in the PPP Environment
THANK YOU For  Interaction: Prof. K. Subramanian [email_address] [email_address] [email_address] Tele:011-29533068;23219857 Let us Assure Good Cyber Governance & Business Assurance in Cyber Era

More Related Content

What's hot

GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organization
Thieu Nguyen Bao Chau
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 

What's hot (20)

Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
Microsoft Core Infratructure
Microsoft Core InfratructureMicrosoft Core Infratructure
Microsoft Core Infratructure
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organization
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Efma-Accenture Innovation in Insurance Awards 2019
Efma-Accenture Innovation in Insurance Awards 2019Efma-Accenture Innovation in Insurance Awards 2019
Efma-Accenture Innovation in Insurance Awards 2019
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
COBIT and IT Policy Presentation
COBIT and IT Policy PresentationCOBIT and IT Policy Presentation
COBIT and IT Policy Presentation
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 

Viewers also liked (6)

Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 

Similar to Security architecture rajagiri talk march 2011

Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
subramanian K
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
KGanzy
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
baselsss
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
webhostingguy
 

Similar to Security architecture rajagiri talk march 2011 (20)

Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Essay It
Essay ItEssay It
Essay It
 
IT Governances
IT GovernancesIT Governances
IT Governances
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Evolution of it management
Evolution of it managementEvolution of it management
Evolution of it management
 
AI IN INFORMATION TECHNOLOGY: REDEFINING OPERATIONS AND RESHAPING STRATEGIES.pdf
AI IN INFORMATION TECHNOLOGY: REDEFINING OPERATIONS AND RESHAPING STRATEGIES.pdfAI IN INFORMATION TECHNOLOGY: REDEFINING OPERATIONS AND RESHAPING STRATEGIES.pdf
AI IN INFORMATION TECHNOLOGY: REDEFINING OPERATIONS AND RESHAPING STRATEGIES.pdf
 
PowerPoint presentation
PowerPoint presentationPowerPoint presentation
PowerPoint presentation
 
The state of it complexity in apj whitepaper final
The state of it complexity in apj whitepaper finalThe state of it complexity in apj whitepaper final
The state of it complexity in apj whitepaper final
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
Alberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control FrameworkAlberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control Framework
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0
 
G-CISO
G-CISOG-CISO
G-CISO
 

More from subramanian K

Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforce
subramanian K
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
subramanian K
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...
subramanian K
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
subramanian K
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full report
subramanian K
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011
subramanian K
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Management
subramanian K
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009
subramanian K
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009
subramanian K
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009
subramanian K
 
Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009
subramanian K
 
Securing & Asuring E Governance Services
Securing & Asuring E Governance ServicesSecuring & Asuring E Governance Services
Securing & Asuring E Governance Services
subramanian K
 
Introspection Of India Egov Npc Feb 2009
Introspection Of India Egov Npc Feb 2009Introspection Of India Egov Npc Feb 2009
Introspection Of India Egov Npc Feb 2009
subramanian K
 

More from subramanian K (20)

Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challenges
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in education
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforce
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full report
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Management
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009
 
Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009Architecting E Governance Space Npc Lecture Feb 2009
Architecting E Governance Space Npc Lecture Feb 2009
 
Securing & Asuring E Governance Services
Securing & Asuring E Governance ServicesSecuring & Asuring E Governance Services
Securing & Asuring E Governance Services
 
Introspection Of India Egov Npc Feb 2009
Introspection Of India Egov Npc Feb 2009Introspection Of India Egov Npc Feb 2009
Introspection Of India Egov Npc Feb 2009
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Security architecture rajagiri talk march 2011

  • 1. Security Architecture Prof. K Subramanian SM(IEEE, USA), SMACM(USA), FIETE, SMCSI,MAIMA,MAIS(USA),MCFE(USA) Director & Professor, Advanced Center for Informatics & Innovative Learning (ACIIL), IGNOU Honorary IT Adviser to CAG of India Ex-DDG(NIC), Ministry of Comm. & IT Emeritus President, eInformation Systems, Security, Audit Association(eISSA) President, Cyber Society of India(Cysi)
  • 2.
  • 3.
  • 5. 09/27/10 Prof ks@2010 Software architecture series
  • 6.
  • 7.
  • 8.
  • 9. Oct 27,2010 Future egovIndia forum Oct 2010 Delhi India
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Assurance Stakeholders Stakeholders for business assurance Board of Directors Management Staff/Employees Organisation Customers Public Suppliers Enforcement & regulatory authorities Owner Creditors Shareholders Insurers Business partners
  • 16.
  • 17.
  • 18. Operational Integration Professional Integration (HR) ‏ Emotional/Cultural Integration ICT & Government Business & Services Integration Multi Technology coexistence and seamless integration Information Assurance Quality, Currency, Customization/Personalization ICE is the sole integrator IT Governance is Important
  • 19.
  • 20.
  • 21. Up The Value Chain
  • 22. Enabling to rapidly move up the Governance Evolution Staircase Strategy/Policy People Process Technology 3. Transaction Competition Confidentiality/privacy Fee for transaction E-authentication Self-services Skill set changes Portfolio mgmt. Sourcing Inc. business staff BPR Relationship mgmt. Online interfaces Channel mgmt. Legacy sys. links Security Information access 24x7 infrastructure Sourcing Funding stream allocations Agency identity “ Big Browser” Job structures Relocation/telecommuting Organization Performance accountability Multiple-programs skills Privacy reduces Integrated services Change value chain New processes/services Change relationships (G2G, G2B, G2C, G2E) ‏ New applications New data structures Time 2. Interaction Searchable Database Public response/ email Content mgmt. Increased support staff Governance Knowledge mgmt. E-mail best prac. Content mgmt. Metadata Data synch. Search engine E-mail 1. Presence Publish Existing Streamline processes Web site Markup Trigger 4. Transformation Cost/ Complexity Define policy and outsource execution Retain monitoring and control Outsource service delivery staff Outsource process execution staff Outsource customer facing processes Outsource backend processes Applications Infrastructure Value 5. Outsourcing Constituent Evolve PPP model
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Calder- Moir IT Governance Framework 3/7/2009 IMT Ghaziabad Lecture Prof. KS@2009 March 2009
  • 34.
  • 35. 5th December 2007 Cyber assurance for Financial services IT Services Objectives and Certification Framework 2(1)(zd)(d) 2(1)(zd)(b) 2(1)(zd)(a) 2(1)(zd)(c) Indian IT Act reference Reliability of information Compliance Availability Integrity Confidentiality Efficiency Effectiveness IT Act COBIT Control Theory Framework Attributes
  • 36.
  • 37. Importance of Group Standards -no one standard meets all requirements ISO 27001/BS7799 Vs COBIT Vs CMM & PCMM Vs ITIL Mission Business Objectives Business Risks Applicable Risks Internal Controls Review
  • 38. Gouvernance & Assurance Maturity Model
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. 3/7/2009 IMT Ghaziabad Lecture Prof. KS@2009 March 2009 Assurance in the PPP Environment
  • 45. THANK YOU For Interaction: Prof. K. Subramanian [email_address] [email_address] [email_address] Tele:011-29533068;23219857 Let us Assure Good Cyber Governance & Business Assurance in Cyber Era

Editor's Notes

  1. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  2. CXOs & Business Assurance Focus Prof. K. Subramanian 22nd Feb 2006 Security to Assurance ISO 27001 Launch Delhi 04/11/09 Prof. KS@2009, IOD Lecture, March 22, 2009 esecurity Governance~Corporate Governance
  3. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  4. CXOs & Business Assurance Focus Prof. K. Subramanian 22nd Feb 2006 Security to Assurance ISO 27001 Launch Delhi
  5. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Corporate Governance & Assurance 29th November 2007 Prof. K. Subramanian @October 2007
  6. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  7. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  8. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  9. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  10. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 IT-Governanc e--> Corporate Governance 29th November 2005 Prof. K. Subramanian @2005 06/29/06 Prof. KS@may 2006--NPC Sikkim Program eGOV Project Management
  11. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 IT-Governanc e--> Corporate Governance 29th November 2005 Prof. K. Subramanian @2005 06/29/06 Prof. KS@may 2006--NPC Sikkim Program eGOV Project Management
  12. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Corporate Goverance & Assurance 29th November 2007 Prof. K. Subramanian @October 2007
  13. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 IT-Governanc e--> Corporate Governance 29th November 2005 Prof. K. Subramanian @2005
  14. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 IT-Governanc e--> Corporate Governance 29th November 2005 Prof. K. Subramanian @2005
  15. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 eGOV Project Governance Panel 08/04/11 Prof. KS@ sept 2007 ICISA New delhi
  16. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  17. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  18. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  19. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 IT-Governanc e--> Corporate Governance 29th November 2005 Prof. K. Subramanian @2005
  20. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  21. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  22. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  23. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  24. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  25. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 By defining the scope of the threat one can identify the various attacks that can happen such as vulnerability exploitation, privilege abuse, social engineering, reaching for a jewel, etc.
  26. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007
  27. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007
  28. eGOV Project Governance Panel 08/04/11 Prof. KS@ sept 2007 ICISA New delhi
  29. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007
  30. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007
  31. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007 The development was guided by the Software Engineering Institute’s efforts in the late 80’s in building maturity models for software development. By using such a scale, an organization can determine where it is, define where it wants to go and, if it identifies a gap, it can do an analysis to translate the findings into projects. Reference points can be added to the scale. Comparisons can be performed with what others are doing, if that data is available, and the organization can determine where emerging international standards and industry best practices are pointing for the effective management of security and control.
  32. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009
  33. Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007
  34. Cyber Governance & AssuranceCyber Governance & Business Assurance may 14,20103/7/2009 Prof. KS@2010 U21G webminarProf. KS@2009 IMT Ghaziabad Lecture march 7 2009 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007