d1 - 2 introduction to information security in e-governance (60min).pdf

Upload: rajeshwarideb

Post on 04-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    1/53

    C: I M

    G

    D 1

    2: I I

    G

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    2/53

    A

    N I

    E I

    A I

    I O ,

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    3/53

    What is Information?

    BS ISO 27002:2005 defines

    Information as :

    'Information is an asset which, likeother important business assets,has value to an organization andconsequently needs to be suitablyprotected

    3

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    4/53

    What is Information?

    D /

    I

    4

    Whatever form the information takes, or means by which it is

    shared or stored, it should always be appropriately protected

    (BS ISO 27002:2005)

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    5/53

    I G G G , ,

    B , , , ,

    .

    .

    I , G .

    O , , G I (..

    , , )

    5

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    6/53

    I G

    , .

    A .

    A , ,

    .

    I G.

    6

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    7/53

    I G M G F , G

    ( IC) :

    (1) G G

    ,

    (2) G ,G G

    7

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    8/53

    I

    G

    I

    I,

    CI,

    CD,

    F O,

    B

    I,

    I.

    8

    B , ,

    G .

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    9/53

    I G I :

    E , .

    ( , , ) ,

    , , D

    N N , L , .

    O , , , , C

    9

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    10/53

    C N: D N

    G .

    G I: G.

    B : D B II

    10

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    11/53

    F I Information available at end user levelwhich could be trusted , un-trusted , ThirdParty etc .

    Service Layer Information is availableat the applications , databases etc level

    Network Layer Information resides atthe network level which encompasses

    the entire business functions of theGovernments.

    Service Delivery platforms have a hugeasset in terms of government data

    InternetThird-PartyApplication

    A

    Service Delivery Platform

    Common Framework

    Backbone Network

    D

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    12/53

    &

    , ,

    I

    G , G

    G , ,

    12

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    13/53

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    14/53

    N I

    G (..) G

    , , , , .

    M ,

    .

    A , , , , , ,

    14

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    15/53

    N I

    G (..) E

    A /

    ..

    A

    A

    : O ??

    , !!

    15

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    16/53

    M

    &

    ( , , & )

    16

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    17/53

    C I

    C I

    H

    D

    D

    M

    17

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    18/53

    C & I

    D & A

    ( )

    L

    L K

    E

    C G

    H &

    H

    M L E

    I

    I

    F

    18

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    19/53

    G L

    A

    .

    F ,

    . A , .

    19

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    20/53

    .

    .

    .

    I , 80%

    .

    I ,

    .

    ,

    , ,

    .

    I , 40% I

    !!!!

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    21/53

    Defining the risks , threats and

    vulnerabilities A

    , I .

    A , I ,

    21

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    22/53

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    23/53

    G

    23

    Critical Information Assets

    DisclosureModificationLoss, DestructionInterruption

    DisclosureModificationLoss, DestructionInterruption

    DisclosureModificationLoss, DestructionInterruption

    DisclosureModificationLoss, DestructionInterruption

    A

    A

    D

    D

    I

    O

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    24/53

    I

    ,

    . C H M L (HML),

    .

    .

    A C J , A , J,

    B

    .

    E G

    .

    M .

    24

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    25/53

    I

    C , H

    . .

    M .

    F , I , .

    I () G .

    M I .

    I I

    , , .

    25

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    26/53

    I

    C

    . I

    .

    , ,

    . I

    .

    I

    G G.

    .

    26

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    27/53

    I

    ,

    . , () .

    G , , H C G I (CGI) .

    . E .

    B G ,

    .

    / .

    I , .

    27

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    28/53

    I

    A C G I (CGI)

    ,

    . B CGI ,

    .

    G , , .

    I , .

    28

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    29/53

    Threat Sources

    29

    Source Motivation Threat

    External HackersChallengeEgo

    Game Playing

    System hacking

    Internal HackersDeadlineFinancial problems

    BackdoorsFraudPoor documentation

    External AgentsRevengePolitical

    System attacksLetter bombsVirusesDenial of service

    Poorly trainedemployees

    Unintentional errors

    Programming errorsData entry errors

    Corruption of data

    Malicious code introductionSystem bugsUnauthorized access

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    30/53

    Threat Sources

    30

    ,

    ,

    /

    /

    / /

    , ,

    , , ,

    /

    , ,

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    31/53

    Threat Sources

    31

    High UserKnowledge of IT

    Systems

    Theft,Sabotage,

    Misuse

    Virus Attacks

    Systems &NetworkFailure

    Lack OfDocumentation

    NaturalCalamities &

    Fire

    Lack of security

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    32/53

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    33/53

    I

    , , , ,

    .

    I O

    (I) , ,

    , CIIEN.

    ,

    .

    , , , .

    33

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    34/53

    I

    I

    .

    I .

    I

    , , , ,

    I , , . .. , .

    34

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    35/53

    O :

    , .

    .

    ,

    , , .

    ,

    .

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    36/53

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    37/53

    I

    I

    C D

    D & A

    O

    L

    D

    A

    K I

    L F GI

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    38/53

    Technology which ourBusiness use

    Elements of Information

    Security

    38

    OrganizationStaff

    Our Business

    Process

    Elements of Security People

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    39/53

    Elements of Security.. People

    & Processes M

    E

    B

    C

    C

    I

    39

    H /

    I

    M

    C

    A

    I L /

    M

    I ...

    "" .

    Technology what we use to

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    40/53

    Technology what we use to

    improve what we do C, D/ N

    (AB), I , IDN , C

    O C .

    I I

    N

    F , A, I , H ,A

    .

    40

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    41/53

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    42/53

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    43/53

    A A

    D F

    I .

    , , , .

    D .

    B .

    .

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    44/53

    E L C

    44

    Security requirement

    Security Policy

    Security InfrastructureSpecification

    Security InfrastructureImplementation

    Security Testing

    RequirementValidation

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    45/53

    E L C

    E L C , ,

    , ,

    ,

    .

    A G .

    , .

    45

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    46/53

    E L C

    .

    I .

    , , , , .

    46

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    47/53

    E L C

    I , , ,

    , .

    G

    .

    C , , ,

    E L C.

    47

    G A

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    48/53

    G A

    F (AFE)

    48

    C I

    BC

    I

    ME

    C

    B C

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    49/53

    B C

    49

    B L B

    B M B

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    50/53

    A I

    A I

    A

    50

    &

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    51/53

    D

    E D

    I

    51

    M E C

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    52/53

    M E C

    M

    E H

    M

    52

  • 8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf

    53/53

    ...

    ..

    53