International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 142 | Views: 378 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014 | Popularity: 6.6 / 10


     

Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure

M Hari Haran


Abstract: E-governance has made massive inroads in the way the government delivers services to its citizens. To enhance and empower this electronic service delivery mechanism, the government of India established a strong IT Infrastructure at the state level to deliver the e-governance services. This e-governance IT Infrastructure comprises the following 3 core components: State Data Centre (SDC), State Wide Area Network (SWAN) and the Common Service Centres (CSC). The state governments have taken forward the mandate of delivering the e-governance services to the stakeholders through these cores IT Infrastructure components. Any IT Infrastructure environment is exposed to a certain degree of threats and vulnerabilities propagating from different sources in different forms. This paper focuses on one particular threat to the e-governance IT Infrastructure i. e. , The Insider Threat. This paper identifies key stakeholders who are the probable Insiders from an e-governance IT Infrastructure perspective and outlines the various threats and vulnerabilities that might arise out due to the activities of the Insider and finally, proposes a robust framework mechanism for early detection and mitigation of such Insider threats.


Keywords: e-governance, IT Infrastructure, Cyber Security, Insider Threats


Edition: Volume 3 Issue 4, April 2014


Pages: 5 - 10



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
M Hari Haran, "Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 5-10, URL: https://www.ijsr.net/getabstract.php?paperid=20131337, DOI: https://www.doi.org/10.21275/20131337



Downloads: 357 | Views: 1000 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 558 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 407 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 471 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 418 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top