SlideShare a Scribd company logo
1 of 23
AADHAAR
brand name of UIDAI




   KU COLLEGE OF ENGINEERING AND
            TECHNOLOGY


               TEAM:
             D.SAIPRIYA
             B.SNIGDHA
CONTENTS
What is AADHAAR??
Goals and missions of UIDAI
Projected benefits of AADHAAR
Practical risks involved in this
 project
SOLUTIONS to overcome these
 threats
CONCLUSION
What is AADHAAR??
Aadhaar is a 12-digit unique number which
  the Unique Identification Authority of
  India (UIDAI) will issue for all residents
  in India. The number will be stored in a
  centralized database and linked to the
  basic demographics and biometric
  information
UIDAI launched AADHAAR on 29 th
  September 2010.The first person to receive
  an AADHAAR was Rajana Sawane of
  Tembhli village.
Number schema of AADHAAR
 As shown in the picture above, the India Aadhaar
 number schema will actually have not even 12
 digits but only 11 digits. The 1st number will be
 the Implicit Version Number while the second, be
 the Check digit. So, that means that the Aadhaar
 number will only have 11 digits which really
 matter.
 The numbers in UID will be non repeating and
 non traceable or predictable and will be generated
Collection of
BIOMETRIC
information
Pictorial perspective:
UIDAI will provide AADHAAR
to residentsand missions of
Goals of India that                      UIDAI
       can be verified easily,
quickly and in cost effective way
           can eliminate duplicate
and fake identities




The UIDAI intends to cover all
residents of the country, but the
focus will be on enrolling the India's
Continued… .

The UIDAI will offer a strong form of
authentication where agencies can compare
demographic and biometric information of the
resident with record stored in central data base


This central data base is stored in a computer
which will be linked to all government and
private agencies like banks
Projected benefits
Aadhaar will become the single source of identity
verification. Residents would be spared the hassle
of repeatedly providing supporting identity
documents each time they wish to access services
such as obtaining a bank account, passport, driving
license and so on.

Financial inclusion with deeper penetration of
banks, insurance and easy distribution of benefits
of government schemes.
Continued….

 By providing a clear proof of identity,
  Aadhaar will also facilitate entry for
  poor and underprivileged residents into
  the formal banking system and the
  opportunity to avail services provided by
  the government and the private sector.

 Giving migrants mobility of identity.
UIDAI ECOSYSTEM
Practical risks of
 AADHAAR
  1. India has been facing various
   hacking problems from inside and
   abroad. Many times our government
   sites were also being hacked by
   hackers .This is very clear that our
   cyber security is not safe.
2. We are having a lot of corrupted
   people in India especially in
   government department. Everyone
   know that for money, maximum of
   government official leak any kind of
   information. Then what will be surely
Continued…
 3.It is proposed that UIN will
 be used as PAN for income tax
  purpose. If this happen than
 PAN will be available easily
 to any body and one may use
 other UIN or say PAN for any
 transaction. Today at least
 one can't find easily others
 PAN no.
 4.Village people will be
 offered Rs.100 for getting
 their Unique Identity Number.
 Every one know very well how
Proposed solutions
 Information classification:
 Information associated with the UID shall be
  classified in the minimum into two categories
  namely “Primary” and “Secondary”.
 Out of the “Primary” category a part would be
  considered “Public” information and other would be
  treated as “Private-Primary Information”
  Public information may consist of name, sex, age,
  registered address.
 Private-Primary information would be available to
  the data holder for query on a synchronized data
  server to ensure that the information is accurate at
  all times.
 Secondary Information would be kept in paper format in
multiple locations. One copy would also be kept in digital format
with strong encryption in an offline media with DRP support.
This would be available to authorized UID employees only for
grievance redressal and under appropriate audit trail recordings.

 Within UIDAI no employee would be provided access to all
aspects of the data base.

The elements of the data base would be broken into multiple
parts and scattered with an algorithm across the data base. They
would be assembled only by authorized employees.
Information storage security:
Information under storage is kept in encrypted.
Access shall be backed up by data integrity control, audit trail
monitoring and archival.

Information transmission security:
Transmission of Information into and out of the systems
would be monitored by a suitable Firewall and appropriate
polices and procedures shall be implemented to ensure that
viruses and other malicious codes are filtered.
Al l transmissions of data including confidential mails in
the name of UIDAI should be encrypted and digitally signed.
Logical access security:
Policies and Procedures shall be implemented for
ensuring that access to any IT device is made
available only with appropriate access authentication
such as Passwords.

Appropriate measures shall be initiated for
ensuring that a strong password policy is maintained
across the organization.

Use of hardware tokens with biometric and RFID
tags shall be used where considered necessary.
Employee consent:
 “ Agents” of UIDAI must be subjected to a
 very strict selection criteria including
 background checks, privacy declarations,
 indemnity etc should be obtained from every
 individual who is involved in this  activity.
 Any mistake observed and corrected will also
 be recorded as a “Security Breach” and the
 responsibility for the same would be fixed on
 the concerned person.
Employee awareness
Employee cyber usage
  policy:
• Employees would be subject to appropriate
  restrictions in use of Computers so that UID
  information is not subject to risk elements
  from Cyber space.
•  All access would be based on multi factor
  authentication of the employee and with
  archival of audit trail with a trusted third
  party with adequate security.
•  In particular, no computer which has access
  to secondary data will have access to Internet
Continued…
In particular, no storage media (such as cell
phones)would be allowed to be used by the
employees  in the ordinary course. All computers
would work on the network with dumb terminals.

 UIDAI shall retain all Policy documents related
 to information security for a period of a minimum
 of 3 years either in print or electronic form.    Data
 which is part of a security breach incident, is kept
 permanently.
CONCLUSION

“… Theconscious and intelligent
 manipulation of the organized habits
 and opinions of the masses is an
 important element in democratic
 society. Those who manipulate this
 unseen mechanism of society
 constitute an invisible government
 which is the true ruling power of our
THANK YOU
Print master
    QUERIES??
• Your Text here

• Lorem ipsum dolor sit amet, consectetuer
  adipiscing elit, sed diam nonummy nibh euismod
  tincidunt ut laoreet dolore magna aliquam erat
  volutpat. Ut wisi enim ad minim veniam, quis
  nostrud exerci tation ullamcorper suscipit lobortis
  nisl ut aliquip ex ea commodo consequat.

• Duis autem vel eum iriure dolor in hendrerit in
  vulputate velit esse molestie consequat, vel illum
  dolore eu feugiat nulla facilisis at vero eros et
  accumsan et iusto odio dignissim qui blandit
  praesent luptatum zzril delenit augue duis dolore
  te feugait nulla facilisi.

More Related Content

What's hot

Unique Identification Number: Implications and Challenges
Unique Identification Number: Implications and ChallengesUnique Identification Number: Implications and Challenges
Unique Identification Number: Implications and ChallengesNikesh Narayanan
 
Unified payment interface
Unified payment interfaceUnified payment interface
Unified payment interfacepranoy_seenu
 
Unified payment interface
Unified payment interfaceUnified payment interface
Unified payment interfaceRavi Raj Kamal
 
Unified payment interface and its security
Unified payment interface and its security Unified payment interface and its security
Unified payment interface and its security Akshay Dixit
 
UPI Technology
UPI TechnologyUPI Technology
UPI Technologyindiastack
 
ppt on aadhar card project
ppt on aadhar card projectppt on aadhar card project
ppt on aadhar card projectPooja Verma
 
Utk upi 15je001127
Utk upi  15je001127Utk upi  15je001127
Utk upi 15je001127Utkarsh Sinh
 
India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)Aravind Krishnaswamy
 
Digital Lending in India
Digital Lending in IndiaDigital Lending in India
Digital Lending in IndiaSam Ghosh
 
Overview of digital payments in india
Overview of digital payments in india Overview of digital payments in india
Overview of digital payments in india Mathew Chacko
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
Unified Payments Interface (UPI) - Introduction
Unified Payments Interface (UPI) - Introduction Unified Payments Interface (UPI) - Introduction
Unified Payments Interface (UPI) - Introduction indiastack
 
Unified payments interface (upi)
Unified payments interface (upi)Unified payments interface (upi)
Unified payments interface (upi)Naina Singh
 

What's hot (20)

Unique Identification Number: Implications and Challenges
Unique Identification Number: Implications and ChallengesUnique Identification Number: Implications and Challenges
Unique Identification Number: Implications and Challenges
 
Unified payment interface
Unified payment interfaceUnified payment interface
Unified payment interface
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
 
Unified payment interface
Unified payment interfaceUnified payment interface
Unified payment interface
 
Aadhaar ppt
Aadhaar ppt Aadhaar ppt
Aadhaar ppt
 
Unified payment interface and its security
Unified payment interface and its security Unified payment interface and its security
Unified payment interface and its security
 
UPI Technology
UPI TechnologyUPI Technology
UPI Technology
 
Digital payments
Digital paymentsDigital payments
Digital payments
 
ppt on aadhar card project
ppt on aadhar card projectppt on aadhar card project
ppt on aadhar card project
 
Utk upi 15je001127
Utk upi  15je001127Utk upi  15je001127
Utk upi 15je001127
 
Ppt paytm
Ppt paytmPpt paytm
Ppt paytm
 
India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)
 
Bhim app
Bhim appBhim app
Bhim app
 
Digital Lending in India
Digital Lending in IndiaDigital Lending in India
Digital Lending in India
 
Overview of digital payments in india
Overview of digital payments in india Overview of digital payments in india
Overview of digital payments in india
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Unified Payments Interface (UPI) - Introduction
Unified Payments Interface (UPI) - Introduction Unified Payments Interface (UPI) - Introduction
Unified Payments Interface (UPI) - Introduction
 
Unified payments interface (upi)
Unified payments interface (upi)Unified payments interface (upi)
Unified payments interface (upi)
 
Digital locker
Digital lockerDigital locker
Digital locker
 

Viewers also liked

Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsRegunath B
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Regunath B
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres Regunath B
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsRegunath B
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagationRegunath B
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantomRegunath B
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaarRegunath B
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantageRegunath B
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 

Viewers also liked (13)

Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systems
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3
 
What database
What databaseWhat database
What database
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streams
 
Srikanth Nadhamuni
Srikanth NadhamuniSrikanth Nadhamuni
Srikanth Nadhamuni
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Uid
UidUid
Uid
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagation
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantom
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaar
 
Oss as a competitive advantage
Oss as a competitive advantageOss as a competitive advantage
Oss as a competitive advantage
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 

Similar to practical risks in aadhaar project and measures to overcome them

Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...National Management Olympiad
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsHp kushal
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...rpacpc
 
Big data and UID
Big data and UIDBig data and UID
Big data and UIDshalin2005
 
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfRole of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Aadhaar Project A Critical Analysis
Aadhaar Project  A Critical AnalysisAadhaar Project  A Critical Analysis
Aadhaar Project A Critical AnalysisSandra Valenzuela
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project reportRachit Mishra
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative sadique_ghitm
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionSuhas Kelkar
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBahaa Abdulhadi
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 

Similar to practical risks in aadhaar project and measures to overcome them (20)

Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...Future of Aadhaar is "a secure and robust system ensuring complete security a...
Future of Aadhaar is "a secure and robust system ensuring complete security a...
 
Aadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millionsAadhaar: Providing proof of identity to millions
Aadhaar: Providing proof of identity to millions
 
Aadhaar- National Identity proof
Aadhaar- National Identity proofAadhaar- National Identity proof
Aadhaar- National Identity proof
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Big data and UID
Big data and UIDBig data and UID
Big data and UID
 
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfRole of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
 
Aadhaar Project A Critical Analysis
Aadhaar Project  A Critical AnalysisAadhaar Project  A Critical Analysis
Aadhaar Project A Critical Analysis
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project report
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud Connection
 
uid
uiduid
uid
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
IoT and security
IoT and securityIoT and security
IoT and security
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

practical risks in aadhaar project and measures to overcome them

  • 1. AADHAAR brand name of UIDAI KU COLLEGE OF ENGINEERING AND TECHNOLOGY TEAM: D.SAIPRIYA B.SNIGDHA
  • 2. CONTENTS What is AADHAAR?? Goals and missions of UIDAI Projected benefits of AADHAAR Practical risks involved in this project SOLUTIONS to overcome these threats CONCLUSION
  • 3. What is AADHAAR?? Aadhaar is a 12-digit unique number which the Unique Identification Authority of India (UIDAI) will issue for all residents in India. The number will be stored in a centralized database and linked to the basic demographics and biometric information UIDAI launched AADHAAR on 29 th September 2010.The first person to receive an AADHAAR was Rajana Sawane of Tembhli village.
  • 4. Number schema of AADHAAR  As shown in the picture above, the India Aadhaar number schema will actually have not even 12 digits but only 11 digits. The 1st number will be the Implicit Version Number while the second, be the Check digit. So, that means that the Aadhaar number will only have 11 digits which really matter.  The numbers in UID will be non repeating and non traceable or predictable and will be generated
  • 7. UIDAI will provide AADHAAR to residentsand missions of Goals of India that UIDAI  can be verified easily, quickly and in cost effective way  can eliminate duplicate and fake identities The UIDAI intends to cover all residents of the country, but the focus will be on enrolling the India's
  • 8. Continued… . The UIDAI will offer a strong form of authentication where agencies can compare demographic and biometric information of the resident with record stored in central data base This central data base is stored in a computer which will be linked to all government and private agencies like banks
  • 9. Projected benefits Aadhaar will become the single source of identity verification. Residents would be spared the hassle of repeatedly providing supporting identity documents each time they wish to access services such as obtaining a bank account, passport, driving license and so on. Financial inclusion with deeper penetration of banks, insurance and easy distribution of benefits of government schemes.
  • 10. Continued….  By providing a clear proof of identity, Aadhaar will also facilitate entry for poor and underprivileged residents into the formal banking system and the opportunity to avail services provided by the government and the private sector.  Giving migrants mobility of identity.
  • 12. Practical risks of AADHAAR 1. India has been facing various hacking problems from inside and abroad. Many times our government sites were also being hacked by hackers .This is very clear that our cyber security is not safe. 2. We are having a lot of corrupted people in India especially in government department. Everyone know that for money, maximum of government official leak any kind of information. Then what will be surely
  • 13. Continued… 3.It is proposed that UIN will be used as PAN for income tax purpose. If this happen than PAN will be available easily to any body and one may use other UIN or say PAN for any transaction. Today at least one can't find easily others PAN no. 4.Village people will be offered Rs.100 for getting their Unique Identity Number. Every one know very well how
  • 14. Proposed solutions  Information classification:  Information associated with the UID shall be classified in the minimum into two categories namely “Primary” and “Secondary”.  Out of the “Primary” category a part would be considered “Public” information and other would be treated as “Private-Primary Information”   Public information may consist of name, sex, age, registered address.  Private-Primary information would be available to the data holder for query on a synchronized data server to ensure that the information is accurate at all times.
  • 15.  Secondary Information would be kept in paper format in multiple locations. One copy would also be kept in digital format with strong encryption in an offline media with DRP support. This would be available to authorized UID employees only for grievance redressal and under appropriate audit trail recordings.  Within UIDAI no employee would be provided access to all aspects of the data base. The elements of the data base would be broken into multiple parts and scattered with an algorithm across the data base. They would be assembled only by authorized employees.
  • 16. Information storage security: Information under storage is kept in encrypted. Access shall be backed up by data integrity control, audit trail monitoring and archival. Information transmission security: Transmission of Information into and out of the systems would be monitored by a suitable Firewall and appropriate polices and procedures shall be implemented to ensure that viruses and other malicious codes are filtered. Al l transmissions of data including confidential mails in the name of UIDAI should be encrypted and digitally signed.
  • 17. Logical access security: Policies and Procedures shall be implemented for ensuring that access to any IT device is made available only with appropriate access authentication such as Passwords. Appropriate measures shall be initiated for ensuring that a strong password policy is maintained across the organization. Use of hardware tokens with biometric and RFID tags shall be used where considered necessary.
  • 18. Employee consent:  “ Agents” of UIDAI must be subjected to a very strict selection criteria including background checks, privacy declarations, indemnity etc should be obtained from every individual who is involved in this  activity.  Any mistake observed and corrected will also be recorded as a “Security Breach” and the responsibility for the same would be fixed on the concerned person. Employee awareness
  • 19. Employee cyber usage policy: • Employees would be subject to appropriate restrictions in use of Computers so that UID information is not subject to risk elements from Cyber space. •  All access would be based on multi factor authentication of the employee and with archival of audit trail with a trusted third party with adequate security. •  In particular, no computer which has access to secondary data will have access to Internet
  • 20. Continued… In particular, no storage media (such as cell phones)would be allowed to be used by the employees  in the ordinary course. All computers would work on the network with dumb terminals. UIDAI shall retain all Policy documents related to information security for a period of a minimum of 3 years either in print or electronic form.    Data which is part of a security breach incident, is kept permanently.
  • 21. CONCLUSION “… Theconscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our
  • 23. Print master QUERIES?? • Your Text here • Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. • Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.