SlideShare una empresa de Scribd logo
1 de 92
Descargar para leer sin conexión
 Electronic Governance means using Information and
e-Governance is understood as the use of Information
and Communication Technology (ICT) at all the level
of the Government in order to provide services to the
citizens, interaction with business enterprises and
communication and exchange of information between
different agencies of the Government in a speedy,
convenient efficient and transparent manner.
 Users can find detailed information about e-
Governance, National Conference on e-Governance,
GATI e-services, awards scheme, etc.
 E-governance therefore means the application of ICT
to transform the efficiency, effectiveness, transparency
and accountability of exchange of information and
transaction:
 Between Governments,
 Between Government agencies,
 Between Government and Citizens
 Between Government and businesses
 Scope of E-Governance
 Governance is all about flow of information between
the Government and Citizens, Government and
Businesses and Government and Government.
 E-Governance also covers all these relationships as
follows:
A. Government to Citizen (G2C)
B. Citizen to Government (C2G)
C. Government to Government (G2G)
D. Government to Business (G2B)
 Goals of e-Governance
 Better service delivery to citizens
 Ushering in transparency and accountability
 Empowering people through information
 Improved efficiency within Governments
 Improve interface with business and industry.
 Four Stage e-Governance Model
 India is moving towards achieving e-Governance
which can usually be attained in four steps:
 Information or Cataloguing:- initial efforts of state
governments are focused on establishing an on-line
presence for the government.
 Transaction:- e-Government initiatives will focus on
connecting the internal government system to on-line
interfaces and allowing citizens to transact with
government electronically.
 Vertical Integration:- Vertical integration refers to
local, state and federal governments connected for
different functions or services of government.
 Horizontal integration:- Horizontal integration is
defined as integration across different functions and
services.
 In defining the stages of e-Government development,
the vertical integration across different levels within
similar functionality is posited to precede the
horizontal integration across different functions.
 3 Phases of e-Government :-
 To assist policymakers in devising their own plans and
initiatives, Center for Democracy and Technology
(2002) divides the process of e-Government
implementation into three phases.
 Publish: Publish sites seek to broadcast information
about government and information compiled by
government to as wide an audience as possible. In
doing so, publish sites serve as the leading edge of e-
Government.
 Interact: Interactive e-Government involves two-way
communications, starting with basic functions like
email contact information for government officials or
feedback forms that allow users to submit comments
on legislative or policy proposals.
 Transact: Allowing citizens to obtain government
services or transact business with the government
online. A transact website offers a direct link to
government services, available at any time. Transact
sites can enhance productivity in both the public and
private sector by making processes that require
government assistance or approval simpler, faster, and
cheaper.
 Stages of E-Governance
1. Emerging Presence -
 Emerging presence considers online availability of
limited and basic information.
 A basic online presence of an e-government involves
an official website and few WebPages.
2. Enhanced presence -
 At this stage the Government provides more public
information resources such as policies of the
Government, laws, regulations, reports, newsletters.
 This may also be downloadable at this stage.
3. Interactive presence -
 Interactive presence considers Governments to
initiate interactivity in their websites.
 It involves availability of online services of the
government to enhance convenience of the consumer.
 This will include downloadable forms and applications
for payment of bills, taxes and renewal of licenses.
4. Transactional presence-
 Transactional presence allows two-way interaction
between the citizens and Government.
 It includes options such as paying taxes, applying for
ID cards, birth certificates, passports, license renewals
and other similar C2G interactions by allowing the
citizen to submit forms and applications online 24/7.
 5. Networked presence -
 ‘Networked Presence’ which represents the most
sophisticated level in the online e-government
initiatives.
 It can be characterized by an integration of G2G, G2C
and C2G interactions.
 The government at this stage encourages citizen
participation, online participatory decision-making
and is willing and able to involve the society in a two-
way open dialogue.
 Advantages of E-Governance
 Following are the advantages of E-Governance-
1. Speed – Technology makes communication speedier.
Internet, Phones, Cell Phones have reduced the time taken
in normal communication.
2. Cost Reduction – Most of the Government expenditure is
appropriated towards the cost of stationary.
 Paper-based communication needs lots of stationary,
printers, computers, etc. which calls for continuous heavy
expenditure.
 Internet and Phones makes communication cheaper saving
valuable money for the Government.
3. Transparency – Use of ICT makes governing profess
transparent.
 All the information of the Government would be made
available on the internet.
 The citizens can see the information whenever they want to
see.
4. Accountability – Once the governing process is made
transparent the Government is automatically made
accountable.
 Accountability is answerability of the Government to the
people
Issues & Challenges in E-Governance:-
 Technical Issues
 IT infrastructure is the backbone of E-governance.
 Interoperability with existing software and hardware
platforms is a key success factor.
 Finally, some legal aspect, like security and privacy,
must be considered, as personal data are processed
and stored, and financial transitions must be executed.
 Privacy Issues
 Citizens’ concern on privacy of their life and
confidentiality of the personal data need to be
technically supported
 Privacy and confidentiality has to be highly valued in
establishing and maintaining websites.
 An ideal Cyber policy and strict appliance of it is the
backbone for citizen’s support.
 Securities
 The financial transaction demands for transactional
security. All support for full security is necessarily
needed to maintain.
 An ideal Cyber Security Policy will ensure the
existence of a sound and secure e-governance and
critical infrastructure base in India.
 Social Issues
 Acceptance and usability by a large variety of people
make e-governance successful.
 The interface must be usable by rich or poor, disabled
or elderly people, understandable by low literacy or
non-native language people, etc.
 Infrastructure
 Social, geographical and economical disparity issues
have to be removed and proper infrastructure is
required to establish e-governance.
 The ICT facilities need to be developed and should be
available to one and all citizens.
 Internet connection through satellite, phone lines or
through cable or Television should be accessible for all
especially to the people in rural areas.
 Accessibility
 Any service should be accessible by anybody from
anywhere at anytime.
 Even if Internet population is exponentially growing in
India, still there is a significant portion of the people
who may not be able to access services for various
reasons like limited access to ICT technologies and
devices, low literacy, or phobia for Computer etc.
Therefore, universal access is still a mirage.
 Usability & Acceptance
 People especially in rural areas are often not expert
users and need guidance and support for their
transaction.
 Governmental websites must be user friendly, to be
effective.
 A reconceptualization of government services is
mandatory for successful implementation and to get
social acceptance.
 Political will power & Economic issues
 E-governance means less interaction with government
servants, it will be helpful in reducing bribery issues.
 Economical issues are mainly concerned with return
of investment and safeguard of the previous ones. Cost
of implementation, operational and evolutionary
maintenance must be low enough to guarantee a good
cost/benefit ratio.
 Legal issues
 Strong and effective rules related with IT has to be
formulated and strongly implemented.
 This presupposes the adoption and use of security
measures more particularly empowering and training
judiciary and law enforcement manpower with the
knowledge and use of cyber forensics and
digital evidencing.
 Other issues
 Underutilization of existing ICT infrastructure.
 Attitude of Government Departments and government
officers need a proper counseling. Many officers perceive
their department as most important and disregard other
department’s needs.
 Lack of coordination between Govt. Department and
Solution developers.
 Resistance to re-engineering of departmental processes is
also a challenge, but this approach is changing now.
 Need of the Hour:-
 Database of citizens
 It should contain all the personal details i.e. name,
address, citizen Id, etc. and financial information.
 Every citizen should have a unique Id number and
password.
 The citizens can access their information and
transactions through this but at the same time the
other people won’t be able to access their record
 Just by going through his/her file the individual will
come to know about their electricity bill, bank
statements, next due LIC premium, phone bill etc. and
can transact with all or any of the department at the
same time.
 Biometrics
 The strong database needed for a successful e-governance
is vulnerable to fraud. There are attempts being made to
come up with “Biometric” techniques, which are more
secure.
 The password can be replaced as an individual’s mark
of identity, fingerprints or facial characteristics to verify the
identity. Instead of having card readers, there should be
devices like fingerprint readers or eye scanners.
 It is one of the important evolving technologies, which will
ensure the security and privacy issues as well. But
underutilization of these techniques is one of the barriers.
 Smart Cards
 One smart card with complete detail of the citizens is
the smartest solution. A smart card with citizens
name, address, financial information, personal
information etc. fully supported and secured by
Biometrics may be the key solution.
 A fully secured card with easy operability can be used
for all transactions and information. One such project
was pilot run at IIT Bombay campus few years back.
 The National e-Governance Plan (NeGP) is an
initiative of the Government of India to make all
government services available to the citizens
of India via electronic media.
 NeGP was formulated by the Department
of Electronics and Information Technology (DeitY)
and Department of Administrative Reforms and Public
Grievances (DARPG).
 NeGP comprises 31 mission mode projects (MMPs),
which are further classified as state, central or
integrated projects. Each state government can also
define five MMPs specific to its individual needs.
 Vision of NeGP:-
 “Make all government services accessible to the
common man in his locality, through common service
delivery outlets and ensure efficiency, transparency &
reliability of such services at affordable costs to realise
the basic needs of the common man”.
 Strategy to realize vision:-
 Centralized Initiative, Decentralized Implementation.
 Focus on services & Service levels.
 Ownership & Central Role of Line Ministries/ State
Governments.
 Emphasis on Public Private Partnership (PPP)
 Components of NeGP:-
 Implementation Framework.
 E-Infrastructure.
 Web Enabled Delivery of Public Services.
 Capacity building , awareness, communication.
 Standard, quality & security.
 E-Infrasture:-
 State Wide Area Networks (SWAN)
 Secured network for Government work.
 Connecting state HQs, District HQs, Blocks HQs
 Minimum 2Mbps Broadband connectivity.
 State Data Centers (SDC)
 State of art Data centers at each of 35States/Uts
 Housing all applications and databases.
 E-delivery of G2G, G2C & G2B services.
 State Portals, State Service Delivery Gateways
 Common Service Centres (CSC)
 More than 100,00 tele-centers in 600,000 villages.
 Broad band internet enabled connectivity.
 Implementation through PPP.
 Web Enabled Public Services
 Mission Mode Projects
 Identified on the basis of high citizen / business
interface
 Central 11 (MCA21, e-Passprot...)
 State 13 (Land records, e-didtricts...)
 Integrated 07 (e-biz, e-courts...)
 Key MMPs
 MCA21
 Availability of information.
 Company registration
 Issuance of certifies copies of documents
 E-filing
 Tracking of applications.
 Land records
 Issue of copy of records of rights
 Crop, irrigation & soil details
 Filing & tracking of status of mutation cases
 Availability & submission of forms electronically.
 Capacity Building & Awareness
 Support to state e-mission teams(SeMTs)
 Support to central project e-mission Teams (Cpemts)
 Support to state administrative training institutes.
 Training/ Orientation of stakeholders
 Creating awareness regarding NeGP.
 Standards, Quality & Security
 Nation policy on open standards.
 Localization & Language technology standard
 Encouragement to open source technology
 Quality assurance & conformance
 Network & information security.
 Challenges in implementation of NeGP
 Accelerating the implementation of MMPs
 Involving the State governmnets proactively in delivery
of G2C services.
 Positioning of Professional resources instate & central
government critical for success of NeGP projects.
 Operationalzing of national e-governance division
(NeGD)
 Suggestions for meeting the challenges
 Need for a chief e-governance advisor to PM
 Need for chief e-governance officiers (CeGOs) &
information officers in line ministries.
 Rolling out of e-District project on priority or delivery
of G2Cservices.
 Posting professional resources for state governments
under capacity building scheme.
 World Wide Web Consortium:-
 The World Wide Web Consortium (W3C) is the
main international standards organization for
the World Wide Web.
 The W3C mission is to lead the World Wide Web to its
full potential by developing protocols and guidelines
that ensure the long-term growth of the Web.
 Design Principles
 The following design principles guide W3C's work.
1) Web for All
 The social value of the Web is that it enables human
communication, commerce, and opportunities to
share knowledge.
 One of W3C's primary goals is to make these benefits
available to all people, whatever their hardware,
software, network infrastructure, native language,
culture, geographical location, or physical or mental
ability.
2)Web on Everything
 The number of different kinds of devices that can
access the Web has grown immensely.
 Mobile phones, smart phones, personal digital
assistants, interactive television systems, voice
response systems, kiosks and even certain domestic
appliances can all access the Web.
3)Web for Rich Interaction
 The Web was invented as a communications tool
intended to allow anyone, anywhere to share
information.
 For many years, the Web was a "read-only" tool for
many.
 Blogs and wikis brought more authors to the Web, and
social networking emerged from the flourishing
market for content and personalized Web experiences.
 W3C standards have supported this evolution thanks
to strong architecture and design principles
4)Web of Data and Services
 Some people view the Web as a giant repository of
linked data while others as a giant set of services that
exchange messages.
 The two views are complementary, and which to use
often depends on the application.
5)Web of Trust
 W3C recognizes that trust is a social phenomenon, but
technology design can foster trust and confidence.
 Comparison between web 2.0 and web 3.0
standards
 What is Cyber Security?
 Cyber security – defined as the protection of systems,
networks and data in cyberspace – is a critical issue for
all businesses.
 Cyber security will only become more important as
more devices, ‘the internet of things’, become
connected to the internet.
 Introduction to cyber risks:-
 Cyber risks can be divided into three distinct areas:
 Cyber crime:-
 Conducted by individuals working alone, or in
organised groups, intent on extracting money, data or
causing disruption.
 Cyber crime can take many forms, including the
acquisition of credit/debit card data and intellectual
property, and impairing the operations of a website or
service.
 Cyber war
A nation state conducting sabotage and espionage
against another nation in order to cause disruption or
to extract data.
 Cyber terror
An organisation, working independently of a nation
state, conducting terrorist activities through the
medium of cyberspace.
 Types of malware
 Cyber criminals operate remotely, in what is called
‘automation at a distance’, using numerous means of
attack available, which broadly fall under the umbrella
term of malware (malicious software). These include:
 Viruses
Aim: Gain access to, steal, modify and/or corrupt
information and files from a targeted computer
system.
Technique: A small piece of software program that
can replicate itself and s
 Worms

Aim: By exploiting weaknesses in operating systems,
worms seek to damage networks and often deliver
payloads which allow remote control of the infected
computer.

Technique: Worms are self-replicating and do not
require a program to attach themselves to. Worms
continually look for vulnerabilities and report back to
the worm author when weaknesses are discovered.
 Spyware/Adware
Aim: To take control of your computer and/or to
collect personal information without your knowledge.

Technique: By opening attachments, clicking links or
downloading infected software, spyware/adware is
installed on your computer.
 Trojans
Aim: To create a ‘backdoor’ on your computer by
which information can be stolen and damage caused.

Technique: A software program appears to perform
one function (for example, virus removal) but actually
acts as something else.
 Attack vectors
 There are also a number of attack vectors available to
cyber criminals which allow them to infect computers
with malware or to harvest stolen data:
 Phishing
An attempt to acquire users’ information by
masquerading as a legitimate entity. Examples include
spoof emails and websites. See ‘social engineering’
below.
 Pharming
An attack to redirect a website’s traffic to a different,
fake website, where the individuals’ information is
then compromised. See ‘social engineering’ below.
 Drive-by
Opportunistic attacks against specific weaknesses
within a system.
 Social engineering
Exploiting the weakness of the individual by making
them click malicious links, or by physically gaining
access to a computer through deception. Pharming
and phishing are examples of social engineering.

Más contenido relacionado

La actualidad más candente

define government and state and functions
define government and state and functionsdefine government and state and functions
define government and state and functionsfida hussain
 
Advantage of E - Governance
Advantage of E - Governance Advantage of E - Governance
Advantage of E - Governance ssuseree5190
 
Introduction to Policy Evaluation
Introduction to Policy EvaluationIntroduction to Policy Evaluation
Introduction to Policy EvaluationpasicUganda
 
Participatory Governance
Participatory GovernanceParticipatory Governance
Participatory GovernanceRavikant Joshi
 
PUBLIC ACCOUNTABILITY
PUBLIC ACCOUNTABILITYPUBLIC ACCOUNTABILITY
PUBLIC ACCOUNTABILITYJaypeeRojas
 
Reinventing Government
Reinventing GovernmentReinventing Government
Reinventing GovernmentWaswa Balunywa
 
POLICY IMPLEMENTATION.pptx
POLICY IMPLEMENTATION.pptxPOLICY IMPLEMENTATION.pptx
POLICY IMPLEMENTATION.pptxVINNYMARIA
 
Nature and Scope of PA.pptx
Nature and Scope of PA.pptxNature and Scope of PA.pptx
Nature and Scope of PA.pptxSaliMTowardz
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 
Anti defection law
Anti defection lawAnti defection law
Anti defection lawamanbishla1
 
Good Governance : Origin, concepts and components
Good Governance : Origin, concepts and componentsGood Governance : Origin, concepts and components
Good Governance : Origin, concepts and componentsNayana Renukumar
 
Paradigms of public administration
Paradigms of public administrationParadigms of public administration
Paradigms of public administrationASM Nazmul Hasan
 
New public management
New public managementNew public management
New public managementTareq Ahmed
 

La actualidad más candente (20)

define government and state and functions
define government and state and functionsdefine government and state and functions
define government and state and functions
 
E governance`
E governance`E governance`
E governance`
 
Advantage of E - Governance
Advantage of E - Governance Advantage of E - Governance
Advantage of E - Governance
 
E - governance
E - governanceE - governance
E - governance
 
Introduction to Policy Evaluation
Introduction to Policy EvaluationIntroduction to Policy Evaluation
Introduction to Policy Evaluation
 
THE THEORY OF PUBLIC ADMINISTRATION
THE THEORY OF PUBLIC ADMINISTRATIONTHE THEORY OF PUBLIC ADMINISTRATION
THE THEORY OF PUBLIC ADMINISTRATION
 
Participatory Governance
Participatory GovernanceParticipatory Governance
Participatory Governance
 
E governance
E governanceE governance
E governance
 
Nature of public administration
Nature of public administrationNature of public administration
Nature of public administration
 
PUBLIC ACCOUNTABILITY
PUBLIC ACCOUNTABILITYPUBLIC ACCOUNTABILITY
PUBLIC ACCOUNTABILITY
 
Reinventing Government
Reinventing GovernmentReinventing Government
Reinventing Government
 
POLICY IMPLEMENTATION.pptx
POLICY IMPLEMENTATION.pptxPOLICY IMPLEMENTATION.pptx
POLICY IMPLEMENTATION.pptx
 
Strategies in Public Administration
Strategies in Public AdministrationStrategies in Public Administration
Strategies in Public Administration
 
Nature and Scope of PA.pptx
Nature and Scope of PA.pptxNature and Scope of PA.pptx
Nature and Scope of PA.pptx
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 
Anti defection law
Anti defection lawAnti defection law
Anti defection law
 
People's Participation in Governance
People's Participation in Governance People's Participation in Governance
People's Participation in Governance
 
Good Governance : Origin, concepts and components
Good Governance : Origin, concepts and componentsGood Governance : Origin, concepts and components
Good Governance : Origin, concepts and components
 
Paradigms of public administration
Paradigms of public administrationParadigms of public administration
Paradigms of public administration
 
New public management
New public managementNew public management
New public management
 

Similar a E-Governance.pdf

E-Governance.pptx
E-Governance.pptxE-Governance.pptx
E-Governance.pptxNishaRohit6
 
Presentation on e-governance
Presentation on e-governancePresentation on e-governance
Presentation on e-governanceSAURABH KUMAR
 
Unit-1 Introduction to E-Governament and E-Governance.pptx
Unit-1 Introduction to E-Governament and E-Governance.pptxUnit-1 Introduction to E-Governament and E-Governance.pptx
Unit-1 Introduction to E-Governament and E-Governance.pptxRajkumarrawal2
 
Presentation on the e government services
Presentation on the e government servicesPresentation on the e government services
Presentation on the e government serviceszahr9315
 
A DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCEA DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCEijcsity
 
Role of computers in E governance
Role of computers in E governanceRole of computers in E governance
Role of computers in E governanceShreshth Malhotra
 
E government
E  governmentE  government
E governmentlordmwesh
 
E com iii unit-16-8-13
E com iii unit-16-8-13E com iii unit-16-8-13
E com iii unit-16-8-13naaaaz
 
E Gov Wiki Slides
E Gov Wiki SlidesE Gov Wiki Slides
E Gov Wiki Slidesmismba
 
unit 1_introduction to_egovernment and egovernance.pptx
unit 1_introduction to_egovernment and egovernance.pptxunit 1_introduction to_egovernment and egovernance.pptx
unit 1_introduction to_egovernment and egovernance.pptxsumitadhikari0409
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
e-Government in the Philippines: Benchmarking against global best practices (...
e-Government in the Philippines: Benchmarking against global best practices (...e-Government in the Philippines: Benchmarking against global best practices (...
e-Government in the Philippines: Benchmarking against global best practices (...Coach Edwin Soriano
 
Electronic governance JOURNAL BY BHAWNA BHARDWAJ
Electronic governance  JOURNAL BY BHAWNA BHARDWAJElectronic governance  JOURNAL BY BHAWNA BHARDWAJ
Electronic governance JOURNAL BY BHAWNA BHARDWAJG.V.M.GIRLS COLLEGE SONEPAT
 
Application of Technology in Philippine Governance
Application of Technology in Philippine GovernanceApplication of Technology in Philippine Governance
Application of Technology in Philippine GovernanceMechelle Tumanda
 
Intro to e gov
Intro to e gov Intro to e gov
Intro to e gov Hardini_HD
 

Similar a E-Governance.pdf (20)

E-Governance.pptx
E-Governance.pptxE-Governance.pptx
E-Governance.pptx
 
Presentation on e-governance
Presentation on e-governancePresentation on e-governance
Presentation on e-governance
 
E government by lito
E government by litoE government by lito
E government by lito
 
Unit-1 Introduction to E-Governament and E-Governance.pptx
Unit-1 Introduction to E-Governament and E-Governance.pptxUnit-1 Introduction to E-Governament and E-Governance.pptx
Unit-1 Introduction to E-Governament and E-Governance.pptx
 
Presentation on the e government services
Presentation on the e government servicesPresentation on the e government services
Presentation on the e government services
 
A DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCEA DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCE
 
Role of computers in E governance
Role of computers in E governanceRole of computers in E governance
Role of computers in E governance
 
E government
E  governmentE  government
E government
 
E com iii unit-16-8-13
E com iii unit-16-8-13E com iii unit-16-8-13
E com iii unit-16-8-13
 
E Gov Wiki Slides
E Gov Wiki SlidesE Gov Wiki Slides
E Gov Wiki Slides
 
unit 1_introduction to_egovernment and egovernance.pptx
unit 1_introduction to_egovernment and egovernance.pptxunit 1_introduction to_egovernment and egovernance.pptx
unit 1_introduction to_egovernment and egovernance.pptx
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
e-Government in the Philippines: Benchmarking against global best practices (...
e-Government in the Philippines: Benchmarking against global best practices (...e-Government in the Philippines: Benchmarking against global best practices (...
e-Government in the Philippines: Benchmarking against global best practices (...
 
E-governance.pptx
E-governance.pptxE-governance.pptx
E-governance.pptx
 
Babdi
BabdiBabdi
Babdi
 
Electronic governance
Electronic governance Electronic governance
Electronic governance
 
Electronic governance JOURNAL BY BHAWNA BHARDWAJ
Electronic governance  JOURNAL BY BHAWNA BHARDWAJElectronic governance  JOURNAL BY BHAWNA BHARDWAJ
Electronic governance JOURNAL BY BHAWNA BHARDWAJ
 
It ppt 3
It ppt 3It ppt 3
It ppt 3
 
Application of Technology in Philippine Governance
Application of Technology in Philippine GovernanceApplication of Technology in Philippine Governance
Application of Technology in Philippine Governance
 
Intro to e gov
Intro to e gov Intro to e gov
Intro to e gov
 

Último

O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsSocioCosmos
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhidelhiescort
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch17mos052
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesNetqom Solutions
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxReaper61
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 

Último (20)

O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing Services
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptx
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 

E-Governance.pdf

  • 1.
  • 2.  Electronic Governance means using Information and e-Governance is understood as the use of Information and Communication Technology (ICT) at all the level of the Government in order to provide services to the citizens, interaction with business enterprises and communication and exchange of information between different agencies of the Government in a speedy, convenient efficient and transparent manner.  Users can find detailed information about e- Governance, National Conference on e-Governance, GATI e-services, awards scheme, etc.
  • 3.
  • 4.  E-governance therefore means the application of ICT to transform the efficiency, effectiveness, transparency and accountability of exchange of information and transaction:  Between Governments,  Between Government agencies,  Between Government and Citizens  Between Government and businesses
  • 5.  Scope of E-Governance  Governance is all about flow of information between the Government and Citizens, Government and Businesses and Government and Government.  E-Governance also covers all these relationships as follows: A. Government to Citizen (G2C) B. Citizen to Government (C2G) C. Government to Government (G2G) D. Government to Business (G2B)
  • 6.
  • 7.  Goals of e-Governance  Better service delivery to citizens  Ushering in transparency and accountability  Empowering people through information  Improved efficiency within Governments  Improve interface with business and industry.
  • 8.
  • 9.  Four Stage e-Governance Model  India is moving towards achieving e-Governance which can usually be attained in four steps:  Information or Cataloguing:- initial efforts of state governments are focused on establishing an on-line presence for the government.  Transaction:- e-Government initiatives will focus on connecting the internal government system to on-line interfaces and allowing citizens to transact with government electronically.
  • 10.  Vertical Integration:- Vertical integration refers to local, state and federal governments connected for different functions or services of government.  Horizontal integration:- Horizontal integration is defined as integration across different functions and services.  In defining the stages of e-Government development, the vertical integration across different levels within similar functionality is posited to precede the horizontal integration across different functions.
  • 11.
  • 12.  3 Phases of e-Government :-  To assist policymakers in devising their own plans and initiatives, Center for Democracy and Technology (2002) divides the process of e-Government implementation into three phases.
  • 13.  Publish: Publish sites seek to broadcast information about government and information compiled by government to as wide an audience as possible. In doing so, publish sites serve as the leading edge of e- Government.  Interact: Interactive e-Government involves two-way communications, starting with basic functions like email contact information for government officials or feedback forms that allow users to submit comments on legislative or policy proposals.
  • 14.  Transact: Allowing citizens to obtain government services or transact business with the government online. A transact website offers a direct link to government services, available at any time. Transact sites can enhance productivity in both the public and private sector by making processes that require government assistance or approval simpler, faster, and cheaper.
  • 15.  Stages of E-Governance 1. Emerging Presence -  Emerging presence considers online availability of limited and basic information.  A basic online presence of an e-government involves an official website and few WebPages. 2. Enhanced presence -  At this stage the Government provides more public information resources such as policies of the Government, laws, regulations, reports, newsletters.  This may also be downloadable at this stage.
  • 16. 3. Interactive presence -  Interactive presence considers Governments to initiate interactivity in their websites.  It involves availability of online services of the government to enhance convenience of the consumer.  This will include downloadable forms and applications for payment of bills, taxes and renewal of licenses.
  • 17. 4. Transactional presence-  Transactional presence allows two-way interaction between the citizens and Government.  It includes options such as paying taxes, applying for ID cards, birth certificates, passports, license renewals and other similar C2G interactions by allowing the citizen to submit forms and applications online 24/7.
  • 18.  5. Networked presence -  ‘Networked Presence’ which represents the most sophisticated level in the online e-government initiatives.  It can be characterized by an integration of G2G, G2C and C2G interactions.  The government at this stage encourages citizen participation, online participatory decision-making and is willing and able to involve the society in a two- way open dialogue.
  • 19.  Advantages of E-Governance  Following are the advantages of E-Governance- 1. Speed – Technology makes communication speedier. Internet, Phones, Cell Phones have reduced the time taken in normal communication. 2. Cost Reduction – Most of the Government expenditure is appropriated towards the cost of stationary.  Paper-based communication needs lots of stationary, printers, computers, etc. which calls for continuous heavy expenditure.  Internet and Phones makes communication cheaper saving valuable money for the Government.
  • 20. 3. Transparency – Use of ICT makes governing profess transparent.  All the information of the Government would be made available on the internet.  The citizens can see the information whenever they want to see. 4. Accountability – Once the governing process is made transparent the Government is automatically made accountable.  Accountability is answerability of the Government to the people
  • 21. Issues & Challenges in E-Governance:-
  • 22.  Technical Issues  IT infrastructure is the backbone of E-governance.  Interoperability with existing software and hardware platforms is a key success factor.  Finally, some legal aspect, like security and privacy, must be considered, as personal data are processed and stored, and financial transitions must be executed.
  • 23.  Privacy Issues  Citizens’ concern on privacy of their life and confidentiality of the personal data need to be technically supported  Privacy and confidentiality has to be highly valued in establishing and maintaining websites.  An ideal Cyber policy and strict appliance of it is the backbone for citizen’s support.
  • 24.  Securities  The financial transaction demands for transactional security. All support for full security is necessarily needed to maintain.  An ideal Cyber Security Policy will ensure the existence of a sound and secure e-governance and critical infrastructure base in India.
  • 25.  Social Issues  Acceptance and usability by a large variety of people make e-governance successful.  The interface must be usable by rich or poor, disabled or elderly people, understandable by low literacy or non-native language people, etc.
  • 26.  Infrastructure  Social, geographical and economical disparity issues have to be removed and proper infrastructure is required to establish e-governance.  The ICT facilities need to be developed and should be available to one and all citizens.  Internet connection through satellite, phone lines or through cable or Television should be accessible for all especially to the people in rural areas.
  • 27.  Accessibility  Any service should be accessible by anybody from anywhere at anytime.  Even if Internet population is exponentially growing in India, still there is a significant portion of the people who may not be able to access services for various reasons like limited access to ICT technologies and devices, low literacy, or phobia for Computer etc. Therefore, universal access is still a mirage.
  • 28.  Usability & Acceptance  People especially in rural areas are often not expert users and need guidance and support for their transaction.  Governmental websites must be user friendly, to be effective.  A reconceptualization of government services is mandatory for successful implementation and to get social acceptance.
  • 29.  Political will power & Economic issues  E-governance means less interaction with government servants, it will be helpful in reducing bribery issues.  Economical issues are mainly concerned with return of investment and safeguard of the previous ones. Cost of implementation, operational and evolutionary maintenance must be low enough to guarantee a good cost/benefit ratio.
  • 30.  Legal issues  Strong and effective rules related with IT has to be formulated and strongly implemented.  This presupposes the adoption and use of security measures more particularly empowering and training judiciary and law enforcement manpower with the knowledge and use of cyber forensics and digital evidencing.
  • 31.  Other issues  Underutilization of existing ICT infrastructure.  Attitude of Government Departments and government officers need a proper counseling. Many officers perceive their department as most important and disregard other department’s needs.  Lack of coordination between Govt. Department and Solution developers.  Resistance to re-engineering of departmental processes is also a challenge, but this approach is changing now.
  • 32.
  • 33.  Need of the Hour:-  Database of citizens  It should contain all the personal details i.e. name, address, citizen Id, etc. and financial information.  Every citizen should have a unique Id number and password.  The citizens can access their information and transactions through this but at the same time the other people won’t be able to access their record
  • 34.  Just by going through his/her file the individual will come to know about their electricity bill, bank statements, next due LIC premium, phone bill etc. and can transact with all or any of the department at the same time.
  • 35.  Biometrics  The strong database needed for a successful e-governance is vulnerable to fraud. There are attempts being made to come up with “Biometric” techniques, which are more secure.  The password can be replaced as an individual’s mark of identity, fingerprints or facial characteristics to verify the identity. Instead of having card readers, there should be devices like fingerprint readers or eye scanners.  It is one of the important evolving technologies, which will ensure the security and privacy issues as well. But underutilization of these techniques is one of the barriers.
  • 36.  Smart Cards  One smart card with complete detail of the citizens is the smartest solution. A smart card with citizens name, address, financial information, personal information etc. fully supported and secured by Biometrics may be the key solution.  A fully secured card with easy operability can be used for all transactions and information. One such project was pilot run at IIT Bombay campus few years back.
  • 37.
  • 38.  The National e-Governance Plan (NeGP) is an initiative of the Government of India to make all government services available to the citizens of India via electronic media.  NeGP was formulated by the Department of Electronics and Information Technology (DeitY) and Department of Administrative Reforms and Public Grievances (DARPG).  NeGP comprises 31 mission mode projects (MMPs), which are further classified as state, central or integrated projects. Each state government can also define five MMPs specific to its individual needs.
  • 39.
  • 40.  Vision of NeGP:-  “Make all government services accessible to the common man in his locality, through common service delivery outlets and ensure efficiency, transparency & reliability of such services at affordable costs to realise the basic needs of the common man”.
  • 41.  Strategy to realize vision:-  Centralized Initiative, Decentralized Implementation.  Focus on services & Service levels.  Ownership & Central Role of Line Ministries/ State Governments.  Emphasis on Public Private Partnership (PPP)
  • 42.  Components of NeGP:-  Implementation Framework.  E-Infrastructure.  Web Enabled Delivery of Public Services.  Capacity building , awareness, communication.  Standard, quality & security.
  • 43.
  • 44.  E-Infrasture:-  State Wide Area Networks (SWAN)  Secured network for Government work.  Connecting state HQs, District HQs, Blocks HQs  Minimum 2Mbps Broadband connectivity.  State Data Centers (SDC)  State of art Data centers at each of 35States/Uts  Housing all applications and databases.  E-delivery of G2G, G2C & G2B services.  State Portals, State Service Delivery Gateways
  • 45.  Common Service Centres (CSC)  More than 100,00 tele-centers in 600,000 villages.  Broad band internet enabled connectivity.  Implementation through PPP.
  • 46.
  • 47.
  • 48.  Web Enabled Public Services  Mission Mode Projects  Identified on the basis of high citizen / business interface  Central 11 (MCA21, e-Passprot...)  State 13 (Land records, e-didtricts...)  Integrated 07 (e-biz, e-courts...)
  • 49.  Key MMPs  MCA21  Availability of information.  Company registration  Issuance of certifies copies of documents  E-filing  Tracking of applications.
  • 50.  Land records  Issue of copy of records of rights  Crop, irrigation & soil details  Filing & tracking of status of mutation cases  Availability & submission of forms electronically.
  • 51.  Capacity Building & Awareness  Support to state e-mission teams(SeMTs)  Support to central project e-mission Teams (Cpemts)  Support to state administrative training institutes.  Training/ Orientation of stakeholders  Creating awareness regarding NeGP.
  • 52.  Standards, Quality & Security  Nation policy on open standards.  Localization & Language technology standard  Encouragement to open source technology  Quality assurance & conformance  Network & information security.
  • 53.  Challenges in implementation of NeGP  Accelerating the implementation of MMPs  Involving the State governmnets proactively in delivery of G2C services.  Positioning of Professional resources instate & central government critical for success of NeGP projects.  Operationalzing of national e-governance division (NeGD)
  • 54.  Suggestions for meeting the challenges  Need for a chief e-governance advisor to PM  Need for chief e-governance officiers (CeGOs) & information officers in line ministries.  Rolling out of e-District project on priority or delivery of G2Cservices.  Posting professional resources for state governments under capacity building scheme.
  • 55.  World Wide Web Consortium:-  The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web.  The W3C mission is to lead the World Wide Web to its full potential by developing protocols and guidelines that ensure the long-term growth of the Web.
  • 56.  Design Principles  The following design principles guide W3C's work. 1) Web for All  The social value of the Web is that it enables human communication, commerce, and opportunities to share knowledge.  One of W3C's primary goals is to make these benefits available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability.
  • 57. 2)Web on Everything  The number of different kinds of devices that can access the Web has grown immensely.  Mobile phones, smart phones, personal digital assistants, interactive television systems, voice response systems, kiosks and even certain domestic appliances can all access the Web.
  • 58. 3)Web for Rich Interaction  The Web was invented as a communications tool intended to allow anyone, anywhere to share information.  For many years, the Web was a "read-only" tool for many.  Blogs and wikis brought more authors to the Web, and social networking emerged from the flourishing market for content and personalized Web experiences.  W3C standards have supported this evolution thanks to strong architecture and design principles
  • 59. 4)Web of Data and Services  Some people view the Web as a giant repository of linked data while others as a giant set of services that exchange messages.  The two views are complementary, and which to use often depends on the application. 5)Web of Trust  W3C recognizes that trust is a social phenomenon, but technology design can foster trust and confidence.
  • 60.  Comparison between web 2.0 and web 3.0 standards
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.  What is Cyber Security?  Cyber security – defined as the protection of systems, networks and data in cyberspace – is a critical issue for all businesses.  Cyber security will only become more important as more devices, ‘the internet of things’, become connected to the internet.
  • 86.  Introduction to cyber risks:-  Cyber risks can be divided into three distinct areas:  Cyber crime:-  Conducted by individuals working alone, or in organised groups, intent on extracting money, data or causing disruption.  Cyber crime can take many forms, including the acquisition of credit/debit card data and intellectual property, and impairing the operations of a website or service.
  • 87.  Cyber war A nation state conducting sabotage and espionage against another nation in order to cause disruption or to extract data.  Cyber terror An organisation, working independently of a nation state, conducting terrorist activities through the medium of cyberspace.
  • 88.  Types of malware  Cyber criminals operate remotely, in what is called ‘automation at a distance’, using numerous means of attack available, which broadly fall under the umbrella term of malware (malicious software). These include:  Viruses Aim: Gain access to, steal, modify and/or corrupt information and files from a targeted computer system. Technique: A small piece of software program that can replicate itself and s
  • 89.  Worms  Aim: By exploiting weaknesses in operating systems, worms seek to damage networks and often deliver payloads which allow remote control of the infected computer.  Technique: Worms are self-replicating and do not require a program to attach themselves to. Worms continually look for vulnerabilities and report back to the worm author when weaknesses are discovered.
  • 90.  Spyware/Adware Aim: To take control of your computer and/or to collect personal information without your knowledge.  Technique: By opening attachments, clicking links or downloading infected software, spyware/adware is installed on your computer.  Trojans Aim: To create a ‘backdoor’ on your computer by which information can be stolen and damage caused.  Technique: A software program appears to perform one function (for example, virus removal) but actually acts as something else.
  • 91.  Attack vectors  There are also a number of attack vectors available to cyber criminals which allow them to infect computers with malware or to harvest stolen data:  Phishing An attempt to acquire users’ information by masquerading as a legitimate entity. Examples include spoof emails and websites. See ‘social engineering’ below.  Pharming An attack to redirect a website’s traffic to a different, fake website, where the individuals’ information is then compromised. See ‘social engineering’ below.
  • 92.  Drive-by Opportunistic attacks against specific weaknesses within a system.  Social engineering Exploiting the weakness of the individual by making them click malicious links, or by physically gaining access to a computer through deception. Pharming and phishing are examples of social engineering.