Downloads: 142 | Views: 378 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014 | Popularity: 6.6 / 10
Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure
M Hari Haran
Abstract: E-governance has made massive inroads in the way the government delivers services to its citizens. To enhance and empower this electronic service delivery mechanism, the government of India established a strong IT Infrastructure at the state level to deliver the e-governance services. This e-governance IT Infrastructure comprises the following 3 core components: State Data Centre (SDC), State Wide Area Network (SWAN) and the Common Service Centres (CSC). The state governments have taken forward the mandate of delivering the e-governance services to the stakeholders through these cores IT Infrastructure components. Any IT Infrastructure environment is exposed to a certain degree of threats and vulnerabilities propagating from different sources in different forms. This paper focuses on one particular threat to the e-governance IT Infrastructure i. e. , The Insider Threat. This paper identifies key stakeholders who are the probable Insiders from an e-governance IT Infrastructure perspective and outlines the various threats and vulnerabilities that might arise out due to the activities of the Insider and finally, proposes a robust framework mechanism for early detection and mitigation of such Insider threats.
Keywords: e-governance, IT Infrastructure, Cyber Security, Insider Threats
Edition: Volume 3 Issue 4, April 2014
Pages: 5 - 10
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 357 | Views: 1000 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 301 | Views: 558 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, India, Volume 8 Issue 1, January 2019
Pages: 456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya, G. Renuka Devi
Downloads: 266 | Views: 407 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, China, Volume 9 Issue 1, January 2020
Pages: 107 - 112Network Optimization using Multi-Agent Genetic Algorithm
Sikandar Hanif
Downloads: 260 | Views: 471 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, Malaysia, Volume 8 Issue 1, January 2019
Pages: 64 - 70University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR
Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan
Downloads: 254 | Views: 418 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 477 - 479IoT Based Smart Street Light for Energy Efficiency and Safety
Tanmay Patil, Arjun Ramendra