SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Securing & Assuring eGovernance Services




               Prof. K. Subramanian
                Director & Professor
 Advanced Center for Informatics & Innovative Learning,
                              IGNOU

     Consulting IT Adviser to CAG of India
EX-DDG(NIC), Ministry of Communication & Information Technology
 26/02/2009           Prof. ks@2009 NPC Program securing & Assuring   1
Important Notable Quotes
    “Ever since men began to modify their lives by using

    technology they have found themselves in a series of
    technological traps.” Roger Revelle
     “The law is the last interpretation of the law given by

    the last judge.”- Anon.
    “Privacy is where technology and the law collide.”



                       --Richard Smith
     (who traced the ‘I Love You’ and ‘Melissa viruses’)



      26/02/2009          Prof. ks@2009 NPC Program securing & Assuring   2
NeGP related Policy Guidelines
     1.“Policy Guidelines on the use of e-Form Technology”

     2. Policy on :Identity and Access Management: An e-Governance

     standards initiative to make e-Government Programs and their
     services a reality
     Draft Document “e-Governance Information Security Standard”

     (Version 01 dated 12th October 2006)--has proposed additional
     security controls for E-Governance purposes Viz., Data security
     and privacy protection, Network security, and Application
     security;
     Draft Document “Base line security requirements & Selection of

     controls” (Version 01, 12th October 2 006).


                                             http://egovstandards.gov.in




    26/02/2009           Prof. ks@2009 NPC Program securing & Assuring     3
Strategy-Policy-Good Practice
  “Information Security Policy for Protection Critical Information

  Infrastructure” (No. CERT-In/NISAP/01, issued on 1st May 2006)
 Transition from IT Policy(covers only IT & ITeS Industry) to National
  Informatics Policy Cutting across Governments (central/state/Local)
  Departmental allocation of Business Rules.
 Information & Privacy Protection Policy, apart from IT ACT & RTI
  ACTS
 Stopping Spam Before It Stops You – SPAM Policy to be
  done
quot;Data disposal, anonymity, trust, privacy management, and systems
  development activities are just a few of the many privacy concerns
  organizations must address and need to thoughtfully create a privacy
  strategy that is clearly and consistently supported by the top business
  leaders.quot;




    26/02/2009           Prof. ks@2009 NPC Program securing & Assuring   4
“IT Regulations and Policies-Compliance &
              Management”
         Pre-requisites Physical Infrastructure and Mind-set

    PAST: We have inherited a past, for which we cannot be held

    responsible ;
    PRESENT: have fashioned the present on the basis of development

    models, which have undergone many mid-course corrections

    FUTURE: The path to the future -- a future in which India and Indians will

    play a dominant role in world affairs -- is replete with opportunities and
    challenges.
In a number of key areas, it is necessary Break from the past in order to
    achieve our Vision.
We have within ourselves the capacity to succeed

We have to embrace Integrated Security & Cyber Assurance
Framework
      26/02/2009               Prof. ks@2009 NPC Program securing & Assuring     5
e-Governance Promises
• Efficiency of Service Connotes                                 • Citizen-Centric Service involves
        Speed and timeliness of delivery of Service                 designing of services from user’s point of view
        elegance of the user-interface
                                                                       rather than agency
        quality close to the user expectation                       developing all user interfaces in local
        simplicity of user action required for obtaining
                                                                      language(s)
        the service.                                                 eliminating scope for ambiguity at the user end
                                                                     grouping of services around user’s requirements
• User-Convenience includes                                           and behavior patterns
     easy access to the request-fulfillment cycle
     User independence of time and place 24 x 7                  • Cost effectiveness of Service is
      available                                                       reduced direct cost compared to conventional
     Single- sign-on                                                  system
     Single Window access to several services                        reduced indirect cost involved in repeated visits
     Integrated services meaning access to several                   reduced cost to government agency in servicing the
      agencies through one request                                     request
                                                                      saving of user time and the cost and the
                                                                       consequent opportunity cost of user time.
    Reliability of the Service Means
●
                                                                      enhanced revenue/benefit to the Govt. agency
     High degree of availability – 99.99% through
      disaster recovery systems and alternative
      channels
     bug free system that returns no error message
      system that produces accurate results and
      response.


         26/02/2009                         Prof. ks@2009 NPC Program securing & Assuring                        6
eGovernance
          Benefits 
                    Reduce service time
                    Improved customer service through up-to-date, accurate data.
                    Business intelligence for fact based decision making
                    Increased Government revenue due to reduction in transmission and
                     distribution losses.


Risk                                                        Concerns
• Economic Risk                                             •Users
                                                                whether Government services will be available
   - Huge Investment
                                                               in a convenient way as promised
  – Cost of Technology and Knowledge is high
                                                            • Policy Makers and Administrators
• Technological Risk
                                                                – Whether objectives of eGovernance are being
  – High obsolence Rate                                           achieved (Transparency, availability of Service,
                                                                  compliance with Govt. Rules, procedures,
  – Dependability/Reliability of Technology
                                                                  decisions and Regulations)
   – Use of right technology
                                                            • Solution/Service Provider
• Social Risk and User acceptability Risks
                                                                – That system meets the requirements of RFP.
   – Solutions are citizen and business Centric and
     touch upon sensitive service oriented issues
   - High expectation
    26/02/2009                       Prof. ks@2009 NPC Program securing & Assuring                           7
eGovernance - Governance
                 Quality is differentiator




                                                                   Risks and
                                                                   Concerns
     Benefits




26/02/2009         Prof. ks@2009 NPC Program securing & Assuring               8
What is required

A Framework to ensure
       ■ Requirements are specified
       ■ Specifications are complied
       ■ Users are satisfied


     Context specific Processes should be in Place to achieve
     these and can be defined in framework known as Quality
     Assurance Framework



26/02/2009             Prof. ks@2009 NPC Program securing & Assuring   9
Quality in eGovernance

         The Service Quality can be achieved by
         ensuring that best practices (as defined
         in International Standards) are followed
         while Designing and implementing the
         processes & Products/Services.




26/02/2009           Prof. ks@2009 NPC Program securing & Assuring   10
Quality and Documentation

     A working group (WG-5) on Quality and

     Documentation was formed to bring out guidelines
     and best practices for Quality and Documentation




    26/02/2009         Prof. ks@2009 NPC Program securing & Assuring   11
Quality

    Quality Assurance Framework

    Framework which provides assurance by defining
    processes and services and by demonstrating
    conformity with these




26/02/2009       Prof. ks@2009 NPC Program securing & Assuring   12
Basic Principles

        Define
 
        – Quality policy, objectives and means of their achievement
        Assure Quality
 
        – execute Processes and implement best practices

        Generate confidence
 
        – Assess conformity and analyse impact




26/02/2009               Prof. ks@2009 NPC Program securing & Assuring   13
eGovernance Conformity Assessment - Goal


             Generating Confidence of Citizen and Business
                                 on
                           e-Government

                 By assuring quality of delivered services




26/02/2009                 Prof. ks@2009 NPC Program securing & Assuring   14
e GCA - Objective

             Generating Confidence of Citizen and Business
                                 on
                           e-Government

         Through conformity assessment to user- requirements,
         regulations and Best Practices by Independent Third
         Party

                                         Rather than

         Relying solely on the assertion of the developers and solution
         providers
26/02/2009               Prof. ks@2009 NPC Program securing & Assuring   15
e-Governance Evolution

Maturity of e-Governance
                                                                                Integration



                                                      Transaction


                                        Interaction


                            Information


                                                  Time

26/02/2009                      Prof. ks@2009 NPC Program securing & Assuring                 16
eGovernance Maturity Model




29th November 2005   IT Governance-->Corporate Governance   17
Up The Value Chain
Quality Assurance Framework for e-Governance


                     Assured Citizen
III Phase eGov
                             ITIL, BS15000
(Transformation)


                          Secure Citizen
                          IS) 27001, Q-Web
                              ISO 15408

                              Quality
                             Certified
                           eGov Products
                             ISO 9126, ISO14598
 I Phase eGov                                                       II Phase eGov
                               ISO 9001-2008
   (Information &                                                    (Transaction)
     Interaction)


    26/02/2009      Prof. ks@2009 NPC Program securing & Assuring                19
Confidence in e-Government


                                          Quality of Service to
             Assured Services
                                           Citizen & Business


                                                 Infrastructure
              Conformance
              Engineering
                                        Network                  Datacentre               CSC
Conformance to
standards & best
practices


                                                              Website
                                 Security of
                                                                                            IT Service Levels
   S/W Quality                                             Legal & Ethical
                                Information
                                                                                            IT Service Mgmt.
                                   System                     issues

           26/02/2009                     Prof. ks@2009 NPC Program securing & Assuring                   20
e-Governance Components which needs assurance
  Infrastructure
    • Network(SWAN&NICNET)
    • Data Centre
    • Common Service Centre
  Quality components
    • Information Security Assessments
    • Application Software Testing
                 (Quality & Security)
    • IT Services – Quality Evaluation
                 (Service Levels)
    • Web-Site
                 (Security, Quality, Ethical & Legal Issues)
    • Compliance with technical standards
    • IT Infrastructure
                 (Hardware & Software)
    • Non-IT Infrastructure
                 (Compliance to requirements)
    • Compliance with regulatory requirements
                 (RTI Act, IT Act, DOPT Rules and other applicable Govt. and State
                 Govt. Acts and Rules
    26/02/2009                          Prof. ks@2009 NPC Program securing & Assuring   21
Documentation (WG-5)

Documentation standards
        Particularly important - documents are the tangible manifestation

        of the software.
        Documentation process standards


          –      Concerned with how documents should be developed, validated
                 and maintained.
        Document standards


          –      Concerned with document contents, structure, and appearance.
        Document interchange standards


          –      Concerned with the compatibility of electronic documents.




    26/02/2009                   Prof. ks@2009 NPC Program securing & Assuring   22
Agenda

       Develop Procedure for Standards Formulation


       Provide guidelines on Best Practices wherever

       required ( e.g. RFP, SLA etc.)
       Develop framework for Quality Assurance


       Develop framework for Conformity Assessment


       Develop Standards for documentation.





    26/02/2009       Prof. ks@2009 NPC Program securing & Assuring   23
eSecurity Technologies
     Cryptography & Cryptology

     Steganography

     Digital water marking

     Digital Rights Management

     Cyber Defence technologies (Firewall, IDS/IPS,

     Perimeter and Self-Defence )
     Access Control &ID Management (Rule, Role,

     Demand Based)
     Signatures (Digital/Electronic)

     Cyber Forensics & Cyber Audit





    26/02/2009       Prof. ks@2009 NPC Program securing & Assuring   24
26/02/2009   Prof. ks@2009 NPC Program securing & Assuring   25
ACCIDENTAL
                                                                              DATA EMBARRASSMENT
LOSS OF                               DAMAGE
CREDIBILITY                                                                  DIDDLING
           INTERCEPTION

                                       AUTHORISATION
        SOCIAL
                                                                    PROGRAM CHANGE
   ENGINEERING           PASSWORDS
                                                                    DOCUMENTATION
        ATTACK                                                                                 SCAVENGING
                     AUDIT TRAILS                                                                     VIRUS
                                                                                                     ATTACK
                    INPUT                                                          BACKUPS
 NATURAL
                                                     IS
                    VALIDATIONS
 DISASTER
                                                                                  ANTI-VIRUS
                    ENCRYPTION
     TROJAN                                                                                    HARDWARE /
                                                                     HARDWARE
     HORSES              SECURITY                                    MAINTENANCE               SOFTWARE
                         GUARDS                                                                  FAILURE
                                            BUSINESS
FINANCIAL INCOMPLETE                                                                 FRAUD
                                            CONTINUITY
    LOSS PROGRAM                                                                    & THEFT
                                            PLAN
            CHANGES                 UNAUTHORISED
                                       ACCESS
     LOSS OF                                                                                  LOSING TO
   CUSTOMERS                                                                                  COMPETITION
       26/02/2009                 Prof. ks@2009 NPC Program securing & Assuring                       26
e-Security & eAudit
               Objectives and Certification Framework
                                                                                    Indian
Framework              Control               COBIT                       IT Act
                                                                                    IT Act
                       Theory
Attributes
                                                                                  reference
                                                                                  2(1)(zd)(c)
Effectiveness
Efficiency
                                                                                  2(1)(zd)(a)
Confidentiality
                                                                                  2(1)(zd)(b)
Integrity
Availability
                                                                                  2(1)(zd)(d)
Compliance
Reliability of
information

  26/02/2009             Prof. ks@2009 NPC Program securing & Assuring                    27
Transition :Audit to Assurance
             Cyber Management Assurances
               Layered Framework
    Management & Operational Assurance (Risk

    & ROI)
    Technical Assurance


    (Availability, Serviceability & Maintainability)
    Revenue Assurance


    (Leakage & Fraud)
    Legal Compliance & Assurance (Governance)





26/02/2009          Prof. ks@2009 NPC Program securing & Assuring   28
Standards, Standards, Standards
             Technical Vs Management

                                                          Technical Standards-
                                                    
    Security


                                                          Specifications-mainly for
    Audit


    Interoperability

                                                          interoperability,
    Interface


                                                          accessibility and
    (systems/devises/communications)
    Architecture/Building Blocks/reusable


                                                          Interactivity
    HCI (Human Computer Interface)


    Process (Quality & Work)

                                                          Management standards-
                                                    
    Environmental (Physical, Safety,

    Security)
                                                          Auditable & Verifiable-
    Data Interchange & mail messaging


                                                          Certification &
    (Information/Data Exchange)
    Layout/Imprint


                                                          Compliance


    26/02/2009                   Prof. ks@2009 NPC Program securing & Assuring   29
Cyber Assurance & IT Governance -
                  Final Message




“In Governance matters Past is no guarantee;
Present is imperfect and Future is uncertain“
“Failure is not when we fall down, but when we fail to get up”



       26/02/2009       Prof. ks@2009 NPC Program securing & Assuring   30
FOR FURTHER
                                                             

                                                             INFORMATION PLEASE
                                                             CONTACT :-
                                                                 E-MAIL: ksdir@nic.in
                                                             


                                                                 ksmanian@ignou.ac.in
                                                             


                                                                 91-11-23219857
                                                             


                                                                 Fax:91-11-23217004
                                                             


                                                                 Office of the CAG,
                                                             


                                                                 10, B.Z. Marg,
                                                             


                                                                 New Delhi-110002
                                                             




26/02/2009   Prof. ks@2009 NPC Program securing & Assuring                            31

Más contenido relacionado

La actualidad más candente

Next Generation Broadband In Asia: Strategies to Promote Investment
Next Generation Broadband In Asia: Strategies to Promote InvestmentNext Generation Broadband In Asia: Strategies to Promote Investment
Next Generation Broadband In Asia: Strategies to Promote InvestmentMartyn Taylor
 
Hc Country Wide Architecture Sanitized
Hc Country Wide Architecture SanitizedHc Country Wide Architecture Sanitized
Hc Country Wide Architecture Sanitizedssoliani
 
NetScout Northumbrian water case study
NetScout Northumbrian water case studyNetScout Northumbrian water case study
NetScout Northumbrian water case studyContent Rules, Inc.
 
Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3Green Packet
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochureldyson23
 
Ianywhere Ccip 041007
Ianywhere Ccip 041007Ianywhere Ccip 041007
Ianywhere Ccip 041007neleos
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelOpen Data Center Alliance
 
Sinoaccess Company Presentation
Sinoaccess Company PresentationSinoaccess Company Presentation
Sinoaccess Company PresentationEric Fang
 
The case for application specific qos
The case for application specific qosThe case for application specific qos
The case for application specific qosIPeak Networks
 
4 sheperd frost & sullivan
4 sheperd frost & sullivan4 sheperd frost & sullivan
4 sheperd frost & sullivansouthmos
 
Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...
Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...
Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...Sharpe Smith
 
Performance Measurement 02
Performance Measurement 02Performance Measurement 02
Performance Measurement 02masteryoda
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
Building Support For The Next Wave Of Smart Grid Projects 05 05 2011
Building Support For The Next Wave Of Smart Grid Projects   05 05 2011Building Support For The Next Wave Of Smart Grid Projects   05 05 2011
Building Support For The Next Wave Of Smart Grid Projects 05 05 2011forrestsmall
 
Managed Services: RFID's Newest Business Model?
Managed Services: RFID's Newest Business Model?Managed Services: RFID's Newest Business Model?
Managed Services: RFID's Newest Business Model?VDC Research Group
 

La actualidad más candente (18)

QoS in an LTE network
QoS in an LTE networkQoS in an LTE network
QoS in an LTE network
 
Next Generation Broadband In Asia: Strategies to Promote Investment
Next Generation Broadband In Asia: Strategies to Promote InvestmentNext Generation Broadband In Asia: Strategies to Promote Investment
Next Generation Broadband In Asia: Strategies to Promote Investment
 
Hc Country Wide Architecture Sanitized
Hc Country Wide Architecture SanitizedHc Country Wide Architecture Sanitized
Hc Country Wide Architecture Sanitized
 
Business Models for Interoperability
Business Models for InteroperabilityBusiness Models for Interoperability
Business Models for Interoperability
 
NetScout Northumbrian water case study
NetScout Northumbrian water case studyNetScout Northumbrian water case study
NetScout Northumbrian water case study
 
Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3Data Offload Survival Guide Part 3
Data Offload Survival Guide Part 3
 
Content Security Brochure
Content Security BrochureContent Security Brochure
Content Security Brochure
 
Ianywhere Ccip 041007
Ianywhere Ccip 041007Ianywhere Ccip 041007
Ianywhere Ccip 041007
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
Sinoaccess Company Presentation
Sinoaccess Company PresentationSinoaccess Company Presentation
Sinoaccess Company Presentation
 
The case for application specific qos
The case for application specific qosThe case for application specific qos
The case for application specific qos
 
Cellular qos
Cellular qosCellular qos
Cellular qos
 
4 sheperd frost & sullivan
4 sheperd frost & sullivan4 sheperd frost & sullivan
4 sheperd frost & sullivan
 
Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...
Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...
Presentation by Edward Parkinson, FirstNet, at AGL Conference, June 19, Washi...
 
Performance Measurement 02
Performance Measurement 02Performance Measurement 02
Performance Measurement 02
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Building Support For The Next Wave Of Smart Grid Projects 05 05 2011
Building Support For The Next Wave Of Smart Grid Projects   05 05 2011Building Support For The Next Wave Of Smart Grid Projects   05 05 2011
Building Support For The Next Wave Of Smart Grid Projects 05 05 2011
 
Managed Services: RFID's Newest Business Model?
Managed Services: RFID's Newest Business Model?Managed Services: RFID's Newest Business Model?
Managed Services: RFID's Newest Business Model?
 

Similar a Securing & Asuring E Governance Services

Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company ProfileWader Zhang
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?QualiQuali
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Ontario Cloud SIG
 
Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...Global Business Events
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Dialogic Inc.
 
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesPiloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesNitin Badjatia
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...Compuware APM
 
Higher education IAM-seminar Turku 10.12.2009
Higher education IAM-seminar Turku 10.12.2009Higher education IAM-seminar Turku 10.12.2009
Higher education IAM-seminar Turku 10.12.2009Kim Westerlund
 
Navigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationNavigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationPuppet
 
Mobile payments test automation
Mobile payments test automationMobile payments test automation
Mobile payments test automationThinksoft Global
 
Keys on improving effectiveness in m-payments with Test Automation
Keys on improving effectiveness in m-payments with Test AutomationKeys on improving effectiveness in m-payments with Test Automation
Keys on improving effectiveness in m-payments with Test AutomationBMI Healthcare
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...kalichargn70th171
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthIBM Danmark
 
2012 Global Awards for Excellence in BPM and Workflow
2012 Global Awards for Excellence in BPM and Workflow2012 Global Awards for Excellence in BPM and Workflow
2012 Global Awards for Excellence in BPM and WorkflowFuture Strategies Inc.
 
QBE Asia - Insurer Innovation Award 2022
QBE Asia - Insurer Innovation Award 2022QBE Asia - Insurer Innovation Award 2022
QBE Asia - Insurer Innovation Award 2022The Digital Insurer
 
20151022 sponsor introduction by nrb
20151022 sponsor introduction by nrb20151022 sponsor introduction by nrb
20151022 sponsor introduction by nrbitSMF Belgium
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC
 
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...Ameur BENTOUTA
 
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloudCloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloudCharles Bedard
 

Similar a Securing & Asuring E Governance Services (20)

Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company Profile
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloud
 
Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...Adam Eaton, Director at Equinix - Creating the right application architecture...
Adam Eaton, Director at Equinix - Creating the right application architecture...
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
 
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow TechnologiesPiloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
Piloting The Cloud: Acting on OMB's Mandate - RightNow Technologies
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
 
Higher education IAM-seminar Turku 10.12.2009
Higher education IAM-seminar Turku 10.12.2009Higher education IAM-seminar Turku 10.12.2009
Higher education IAM-seminar Turku 10.12.2009
 
Navigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationNavigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automation
 
Mobile payments test automation
Mobile payments test automationMobile payments test automation
Mobile payments test automation
 
Keys on improving effectiveness in m-payments with Test Automation
Keys on improving effectiveness in m-payments with Test AutomationKeys on improving effectiveness in m-payments with Test Automation
Keys on improving effectiveness in m-payments with Test Automation
 
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
Revolutionizing CX_ How Digital Testing Leads the Way in Digital Transformati...
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
 
2012 Global Awards for Excellence in BPM and Workflow
2012 Global Awards for Excellence in BPM and Workflow2012 Global Awards for Excellence in BPM and Workflow
2012 Global Awards for Excellence in BPM and Workflow
 
QBE Asia - Insurer Innovation Award 2022
QBE Asia - Insurer Innovation Award 2022QBE Asia - Insurer Innovation Award 2022
QBE Asia - Insurer Innovation Award 2022
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
20151022 sponsor introduction by nrb
20151022 sponsor introduction by nrb20151022 sponsor introduction by nrb
20151022 sponsor introduction by nrb
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
From ITIL to eTOM Gluing Together the eProcess Value Chain In Mixed CivilMili...
 
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloudCloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
Cloud financialsbenefitstheroi businesscaseandoptionsforfaooutsourcinginthecloud
 

Más de subramanian K

Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 
Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14subramanian K
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengessubramanian K
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013subramanian K
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14subramanian K
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in educationsubramanian K
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforcesubramanian K
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...subramanian K
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...subramanian K
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011subramanian K
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011subramanian K
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full reportsubramanian K
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011subramanian K
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Managementsubramanian K
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009subramanian K
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009subramanian K
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009subramanian K
 

Más de subramanian K (20)

Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
Innovation,knowledge management & productivity laxammal college,chennai jan 14
Innovation,knowledge management & productivity   laxammal college,chennai jan 14Innovation,knowledge management & productivity   laxammal college,chennai jan 14
Innovation,knowledge management & productivity laxammal college,chennai jan 14
 
Innovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challengesInnovations in ict for mitigating environmental challenges
Innovations in ict for mitigating environmental challenges
 
Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013Cyber forensics intro & requirement engineering cit dec 21,2013
Cyber forensics intro & requirement engineering cit dec 21,2013
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
 
Csi taramani lecture jan 14 quality assurance in education
Csi taramani lecture jan 14  quality assurance in educationCsi taramani lecture jan 14  quality assurance in education
Csi taramani lecture jan 14 quality assurance in education
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Ieee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforceIeee cs lecture sep 2013 digital economy and new generation workforce
Ieee cs lecture sep 2013 digital economy and new generation workforce
 
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
Renaissance of electronic engineering fuelling india’s growth ieee-te event k...
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
M86 security predictions 2011
M86 security predictions 2011M86 security predictions 2011
M86 security predictions 2011
 
Its report 050516
Its report 050516Its report 050516
Its report 050516
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011
 
Ict4 e india and south asia full report
Ict4 e india and south asia   full reportIct4 e india and south asia   full report
Ict4 e india and south asia full report
 
Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011Financial inclusion cbt presentation feb 2011
Financial inclusion cbt presentation feb 2011
 
Project Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge ManagementProject Management To Project Governance , Knowledge Management
Project Management To Project Governance , Knowledge Management
 
Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009Itz Lecture Bi & Web Tech Standards Feb 2009
Itz Lecture Bi & Web Tech Standards Feb 2009
 
Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009Empowering The Educators India R & D 2009 Jan 2009
Empowering The Educators India R & D 2009 Jan 2009
 
Education ~Skill Development Assocham Conf Feb 2009
Education ~Skill Development  Assocham Conf Feb 2009Education ~Skill Development  Assocham Conf Feb 2009
Education ~Skill Development Assocham Conf Feb 2009
 

Último

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Último (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Securing & Asuring E Governance Services

  • 1. Securing & Assuring eGovernance Services Prof. K. Subramanian Director & Professor Advanced Center for Informatics & Innovative Learning, IGNOU Consulting IT Adviser to CAG of India EX-DDG(NIC), Ministry of Communication & Information Technology 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 1
  • 2. Important Notable Quotes “Ever since men began to modify their lives by using  technology they have found themselves in a series of technological traps.” Roger Revelle “The law is the last interpretation of the law given by  the last judge.”- Anon. “Privacy is where technology and the law collide.”  --Richard Smith (who traced the ‘I Love You’ and ‘Melissa viruses’) 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 2
  • 3. NeGP related Policy Guidelines 1.“Policy Guidelines on the use of e-Form Technology”  2. Policy on :Identity and Access Management: An e-Governance  standards initiative to make e-Government Programs and their services a reality Draft Document “e-Governance Information Security Standard”  (Version 01 dated 12th October 2006)--has proposed additional security controls for E-Governance purposes Viz., Data security and privacy protection, Network security, and Application security; Draft Document “Base line security requirements & Selection of  controls” (Version 01, 12th October 2 006). http://egovstandards.gov.in 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 3
  • 4. Strategy-Policy-Good Practice “Information Security Policy for Protection Critical Information  Infrastructure” (No. CERT-In/NISAP/01, issued on 1st May 2006)  Transition from IT Policy(covers only IT & ITeS Industry) to National Informatics Policy Cutting across Governments (central/state/Local) Departmental allocation of Business Rules.  Information & Privacy Protection Policy, apart from IT ACT & RTI ACTS  Stopping Spam Before It Stops You – SPAM Policy to be done quot;Data disposal, anonymity, trust, privacy management, and systems development activities are just a few of the many privacy concerns organizations must address and need to thoughtfully create a privacy strategy that is clearly and consistently supported by the top business leaders.quot; 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 4
  • 5. “IT Regulations and Policies-Compliance & Management” Pre-requisites Physical Infrastructure and Mind-set PAST: We have inherited a past, for which we cannot be held  responsible ; PRESENT: have fashioned the present on the basis of development  models, which have undergone many mid-course corrections FUTURE: The path to the future -- a future in which India and Indians will  play a dominant role in world affairs -- is replete with opportunities and challenges. In a number of key areas, it is necessary Break from the past in order to achieve our Vision. We have within ourselves the capacity to succeed We have to embrace Integrated Security & Cyber Assurance Framework 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 5
  • 6. e-Governance Promises • Efficiency of Service Connotes • Citizen-Centric Service involves  Speed and timeliness of delivery of Service  designing of services from user’s point of view  elegance of the user-interface rather than agency  quality close to the user expectation  developing all user interfaces in local  simplicity of user action required for obtaining language(s) the service.  eliminating scope for ambiguity at the user end  grouping of services around user’s requirements • User-Convenience includes and behavior patterns  easy access to the request-fulfillment cycle  User independence of time and place 24 x 7 • Cost effectiveness of Service is available  reduced direct cost compared to conventional  Single- sign-on system  Single Window access to several services  reduced indirect cost involved in repeated visits  Integrated services meaning access to several  reduced cost to government agency in servicing the agencies through one request request  saving of user time and the cost and the consequent opportunity cost of user time. Reliability of the Service Means ●  enhanced revenue/benefit to the Govt. agency  High degree of availability – 99.99% through disaster recovery systems and alternative channels  bug free system that returns no error message system that produces accurate results and response. 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 6
  • 7. eGovernance Benefits   Reduce service time  Improved customer service through up-to-date, accurate data.  Business intelligence for fact based decision making  Increased Government revenue due to reduction in transmission and distribution losses. Risk Concerns • Economic Risk •Users whether Government services will be available - Huge Investment in a convenient way as promised – Cost of Technology and Knowledge is high • Policy Makers and Administrators • Technological Risk – Whether objectives of eGovernance are being – High obsolence Rate achieved (Transparency, availability of Service, compliance with Govt. Rules, procedures, – Dependability/Reliability of Technology decisions and Regulations) – Use of right technology • Solution/Service Provider • Social Risk and User acceptability Risks – That system meets the requirements of RFP. – Solutions are citizen and business Centric and touch upon sensitive service oriented issues - High expectation 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 7
  • 8. eGovernance - Governance Quality is differentiator Risks and Concerns Benefits 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 8
  • 9. What is required A Framework to ensure ■ Requirements are specified ■ Specifications are complied ■ Users are satisfied Context specific Processes should be in Place to achieve these and can be defined in framework known as Quality Assurance Framework 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 9
  • 10. Quality in eGovernance The Service Quality can be achieved by ensuring that best practices (as defined in International Standards) are followed while Designing and implementing the processes & Products/Services. 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 10
  • 11. Quality and Documentation A working group (WG-5) on Quality and  Documentation was formed to bring out guidelines and best practices for Quality and Documentation 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 11
  • 12. Quality Quality Assurance Framework Framework which provides assurance by defining processes and services and by demonstrating conformity with these 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 12
  • 13. Basic Principles Define  – Quality policy, objectives and means of their achievement Assure Quality  – execute Processes and implement best practices Generate confidence  – Assess conformity and analyse impact 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 13
  • 14. eGovernance Conformity Assessment - Goal Generating Confidence of Citizen and Business on e-Government By assuring quality of delivered services 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 14
  • 15. e GCA - Objective Generating Confidence of Citizen and Business on e-Government Through conformity assessment to user- requirements, regulations and Best Practices by Independent Third Party Rather than Relying solely on the assertion of the developers and solution providers 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 15
  • 16. e-Governance Evolution Maturity of e-Governance Integration Transaction Interaction Information Time 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 16
  • 17. eGovernance Maturity Model 29th November 2005 IT Governance-->Corporate Governance 17
  • 18. Up The Value Chain
  • 19. Quality Assurance Framework for e-Governance Assured Citizen III Phase eGov ITIL, BS15000 (Transformation) Secure Citizen IS) 27001, Q-Web ISO 15408 Quality Certified eGov Products ISO 9126, ISO14598 I Phase eGov II Phase eGov ISO 9001-2008 (Information & (Transaction) Interaction) 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 19
  • 20. Confidence in e-Government Quality of Service to Assured Services Citizen & Business Infrastructure Conformance Engineering Network Datacentre CSC Conformance to standards & best practices Website Security of IT Service Levels S/W Quality Legal & Ethical Information IT Service Mgmt. System issues 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 20
  • 21. e-Governance Components which needs assurance Infrastructure • Network(SWAN&NICNET) • Data Centre • Common Service Centre Quality components • Information Security Assessments • Application Software Testing (Quality & Security) • IT Services – Quality Evaluation (Service Levels) • Web-Site (Security, Quality, Ethical & Legal Issues) • Compliance with technical standards • IT Infrastructure (Hardware & Software) • Non-IT Infrastructure (Compliance to requirements) • Compliance with regulatory requirements (RTI Act, IT Act, DOPT Rules and other applicable Govt. and State Govt. Acts and Rules 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 21
  • 22. Documentation (WG-5) Documentation standards Particularly important - documents are the tangible manifestation  of the software. Documentation process standards  – Concerned with how documents should be developed, validated and maintained. Document standards  – Concerned with document contents, structure, and appearance. Document interchange standards  – Concerned with the compatibility of electronic documents. 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 22
  • 23. Agenda Develop Procedure for Standards Formulation  Provide guidelines on Best Practices wherever  required ( e.g. RFP, SLA etc.) Develop framework for Quality Assurance  Develop framework for Conformity Assessment  Develop Standards for documentation.  26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 23
  • 24. eSecurity Technologies Cryptography & Cryptology  Steganography  Digital water marking  Digital Rights Management  Cyber Defence technologies (Firewall, IDS/IPS,  Perimeter and Self-Defence ) Access Control &ID Management (Rule, Role,  Demand Based) Signatures (Digital/Electronic)  Cyber Forensics & Cyber Audit  26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 24
  • 25. 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 25
  • 26. ACCIDENTAL DATA EMBARRASSMENT LOSS OF DAMAGE CREDIBILITY DIDDLING INTERCEPTION AUTHORISATION SOCIAL PROGRAM CHANGE ENGINEERING PASSWORDS DOCUMENTATION ATTACK SCAVENGING AUDIT TRAILS VIRUS ATTACK INPUT BACKUPS NATURAL IS VALIDATIONS DISASTER ANTI-VIRUS ENCRYPTION TROJAN HARDWARE / HARDWARE HORSES SECURITY MAINTENANCE SOFTWARE GUARDS FAILURE BUSINESS FINANCIAL INCOMPLETE FRAUD CONTINUITY LOSS PROGRAM & THEFT PLAN CHANGES UNAUTHORISED ACCESS LOSS OF LOSING TO CUSTOMERS COMPETITION 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 26
  • 27. e-Security & eAudit Objectives and Certification Framework Indian Framework Control COBIT IT Act IT Act Theory Attributes reference 2(1)(zd)(c) Effectiveness Efficiency 2(1)(zd)(a) Confidentiality 2(1)(zd)(b) Integrity Availability 2(1)(zd)(d) Compliance Reliability of information 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 27
  • 28. Transition :Audit to Assurance Cyber Management Assurances Layered Framework Management & Operational Assurance (Risk  & ROI) Technical Assurance  (Availability, Serviceability & Maintainability) Revenue Assurance  (Leakage & Fraud) Legal Compliance & Assurance (Governance)  26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 28
  • 29. Standards, Standards, Standards Technical Vs Management Technical Standards-  Security  Specifications-mainly for Audit  Interoperability  interoperability, Interface  accessibility and (systems/devises/communications) Architecture/Building Blocks/reusable  Interactivity HCI (Human Computer Interface)  Process (Quality & Work)  Management standards-  Environmental (Physical, Safety,  Security) Auditable & Verifiable- Data Interchange & mail messaging  Certification & (Information/Data Exchange) Layout/Imprint  Compliance 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 29
  • 30. Cyber Assurance & IT Governance - Final Message “In Governance matters Past is no guarantee; Present is imperfect and Future is uncertain“ “Failure is not when we fall down, but when we fail to get up” 26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 30
  • 31. FOR FURTHER  INFORMATION PLEASE CONTACT :- E-MAIL: ksdir@nic.in  ksmanian@ignou.ac.in  91-11-23219857  Fax:91-11-23217004  Office of the CAG,  10, B.Z. Marg,  New Delhi-110002  26/02/2009 Prof. ks@2009 NPC Program securing & Assuring 31