View
218
Download
0
Category
Preview:
Citation preview
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
1/53
C: I M
G
D 1
2: I I
G
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
2/53
A
N I
E I
A I
I O ,
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
3/53
What is Information?
BS ISO 27002:2005 defines
Information as :
'Information is an asset which, likeother important business assets,has value to an organization andconsequently needs to be suitablyprotected
3
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
4/53
What is Information?
D /
I
4
Whatever form the information takes, or means by which it is
shared or stored, it should always be appropriately protected
(BS ISO 27002:2005)
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
5/53
I G G G , ,
B , , , ,
.
.
I , G .
O , , G I (..
, , )
5
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
6/53
I G
, .
A .
A , ,
.
I G.
6
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
7/53
I G M G F , G
( IC) :
(1) G G
,
(2) G ,G G
7
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
8/53
I
G
I
I,
CI,
CD,
F O,
B
I,
I.
8
B , ,
G .
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
9/53
I G I :
E , .
( , , ) ,
, , D
N N , L , .
O , , , , C
9
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
10/53
C N: D N
G .
G I: G.
B : D B II
10
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
11/53
F I Information available at end user levelwhich could be trusted , un-trusted , ThirdParty etc .
Service Layer Information is availableat the applications , databases etc level
Network Layer Information resides atthe network level which encompasses
the entire business functions of theGovernments.
Service Delivery platforms have a hugeasset in terms of government data
InternetThird-PartyApplication
A
Service Delivery Platform
Common Framework
Backbone Network
D
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
12/53
&
, ,
I
G , G
G , ,
12
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
13/53
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
14/53
N I
G (..) G
, , , , .
M ,
.
A , , , , , ,
14
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
15/53
N I
G (..) E
A /
..
A
A
: O ??
, !!
15
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
16/53
M
&
( , , & )
16
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
17/53
C I
C I
H
D
D
M
17
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
18/53
C & I
D & A
( )
L
L K
E
C G
H &
H
M L E
I
I
F
18
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
19/53
G L
A
.
F ,
. A , .
19
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
20/53
.
.
.
I , 80%
.
I ,
.
,
, ,
.
I , 40% I
!!!!
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
21/53
Defining the risks , threats and
vulnerabilities A
, I .
A , I ,
21
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
22/53
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
23/53
G
23
Critical Information Assets
DisclosureModificationLoss, DestructionInterruption
DisclosureModificationLoss, DestructionInterruption
DisclosureModificationLoss, DestructionInterruption
DisclosureModificationLoss, DestructionInterruption
A
A
D
D
I
O
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
24/53
I
,
. C H M L (HML),
.
.
A C J , A , J,
B
.
E G
.
M .
24
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
25/53
I
C , H
. .
M .
F , I , .
I () G .
M I .
I I
, , .
25
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
26/53
I
C
. I
.
, ,
. I
.
I
G G.
.
26
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
27/53
I
,
. , () .
G , , H C G I (CGI) .
. E .
B G ,
.
/ .
I , .
27
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
28/53
I
A C G I (CGI)
,
. B CGI ,
.
G , , .
I , .
28
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
29/53
Threat Sources
29
Source Motivation Threat
External HackersChallengeEgo
Game Playing
System hacking
Internal HackersDeadlineFinancial problems
BackdoorsFraudPoor documentation
External AgentsRevengePolitical
System attacksLetter bombsVirusesDenial of service
Poorly trainedemployees
Unintentional errors
Programming errorsData entry errors
Corruption of data
Malicious code introductionSystem bugsUnauthorized access
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
30/53
Threat Sources
30
,
,
/
/
/ /
, ,
, , ,
/
, ,
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
31/53
Threat Sources
31
High UserKnowledge of IT
Systems
Theft,Sabotage,
Misuse
Virus Attacks
Systems &NetworkFailure
Lack OfDocumentation
NaturalCalamities &
Fire
Lack of security
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
32/53
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
33/53
I
, , , ,
.
I O
(I) , ,
, CIIEN.
,
.
, , , .
33
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
34/53
I
I
.
I .
I
, , , ,
I , , . .. , .
34
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
35/53
O :
, .
.
,
, , .
,
.
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
36/53
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
37/53
I
I
C D
D & A
O
L
D
A
K I
L F GI
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
38/53
Technology which ourBusiness use
Elements of Information
Security
38
OrganizationStaff
Our Business
Process
Elements of Security People
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
39/53
Elements of Security.. People
& Processes M
E
B
C
C
I
39
H /
I
M
C
A
I L /
M
I ...
"" .
Technology what we use to
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
40/53
Technology what we use to
improve what we do C, D/ N
(AB), I , IDN , C
O C .
I I
N
F , A, I , H ,A
.
40
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
41/53
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
42/53
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
43/53
A A
D F
I .
, , , .
D .
B .
.
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
44/53
E L C
44
Security requirement
Security Policy
Security InfrastructureSpecification
Security InfrastructureImplementation
Security Testing
RequirementValidation
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
45/53
E L C
E L C , ,
, ,
,
.
A G .
, .
45
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
46/53
E L C
.
I .
, , , , .
46
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
47/53
E L C
I , , ,
, .
G
.
C , , ,
E L C.
47
G A
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
48/53
G A
F (AFE)
48
C I
BC
I
ME
C
B C
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
49/53
B C
49
B L B
B M B
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
50/53
A I
A I
A
50
&
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
51/53
D
E D
I
51
M E C
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
52/53
M E C
M
E H
M
52
8/14/2019 D1 - 2 Introduction to Information Security in e-Governance (60min).pdf
53/53
...
..
53
Recommended