top of page
Admin

DEVELOPING A CYBER SECURITY FRAMEWORK FOR E-GOVERNANCE IN INDIA

By Archisha SIngh, Divyanshi and Niharika Choudhary


As new ideas emerge from research, the evolution of information systems has accelerated dramatically during the past ten years. The widespread desire to offer answers to challenging issues motivates new developments and creativity. As information systems become progressively more linked, cyber security is starting to take on more importance as an issue to be taken into account within the resulting paradigm. This paper offers a thorough examination of cyber security in relation to information systems. The study explores some of the most important cyber security issues from the standpoint of an Indian e-government initiative. Within the research framework, a comprehensive system is suggested to include numerous scientific principles. The goal of this paper is to create and construct a sophisticated and reliable framework that will enable an e-government system to flourish in the Indian setting. The physical setting in which the project will function is also taken into account, with an emphasis on security. An analysis of the cyber security landscape in India reveals considerable developments in the information system fields during the past few years and more suggestions which can be inculcated for further improvement.

Keywords: cybersecurity; information systems; information system infrastructure; egovernance


man holding tablet with screen hoevring above showing a lock

A virtual world with huge potential to support a wide range of activities with remarkable efficiency and flexibility has been created by cyberspace. Cyberspace transactions are cost- effective, profitable, time-efficient, and effectively handled. It has established itself as a reliable communication tool, as seen by the popularity and rising use of the medium.India has started working on large-scale digital initiatives like the UIDAI. It is pursuing plans that are just as ambitious for the training of cyber security experts. The National Cyber Security Policy (NCSP) and other recent initiatives can assist put India's cyber security environment on the correct track for the future. For instance, one of the major issues the GoI is dealing with is a lack of human resources. It would be a significant accomplishment if India were to generate even a small portion of the 500,000 competent cyber security workers by 2018 goal. Although A virtual world with huge potential to support a wide range of activities with remarkable efficiency and flexibility has been created by cyberspace. Cyberspace transactions are cost- effective, profitable, time-efficient, and effectively handled. It has established itself as a reliable communication tool, as seen by the popularity and rising use of the medium.India has started working on large-scale digital initiatives like the UIDAI. It is pursuing plans that are just as ambitious for the training of cyber security experts. The National Cyber Security Policy (NCSP) and other recent initiatives can assist put India's cyber security environment on the correct track for the future. For instance, one of the major issues the GoI is dealing with is a lack of human resources. It would be a significant accomplishment if India were to generate even a small portion of the 500,000 competent cyber security workers by 2018 goal. Although corruptions, a lack of transparency, and shoddy law enforcement have slowed down India's

progress, these impediments appear to have more detrimental consequences on cyber security. Additionally, compared to the West, cybercrime operations in India are also linked to a lower level of stigma. These issues contribute to India's overall lackluster cyber security orientation. Due to intense resource pressure to address issues associated to poverty and underdevelopment, the GoI now places a relatively low priority on cyber security.


CYBER SECURITY

The phenomenon of securing networks , computers, servers, mobile devices, electronic systems and data from random cyber attacks and data intrusions is termed as ‘Cyber-Security’. Casually, it is referred to as information technology security or electronic information security. Cyber-Security refers to the monitoring of access to data networks, its system and the information they behold. On a wider aspect, Cyber-Security can be elaborated by the application of three triads whose study in a combination reveals the methods of functioning of the Cyber-Security professionals:

  • Prevent, Detect, Respond

  • People, Process, Technology

  • Confidentiality, Integrity, Availability

These cater to showcase the objectives of Cyber-Security, the path towards achieving Cyber- Security, and the ideals through which Cyber-Security can be achieved.


E-GOVERNANCE

Governance basically means the use of electronic media, especially the web, for the delivery of public information and rendering public services. The E-Governance applications allow the citizens of a nation to perform most of their duties and empower them to function multiple tasks at a single point of time irrespective of the place of location of the user. The most successful business networks, chains and agencies emerge in the nations where E-Governance is prevalent due to reduced paperwork, improved databases and increased efficiencies.

There are four paramount pedestals on which the concept of e-governance revolves:

  • Connectivity: The utmost thing needed for an effective, efficient and progressive E- Governance to function properly is strong as well as stable connectivity so that the people of the nation have the easy, quick and reliable access to the existent E-Governance services.

  • Knowledge: Awareness and skillful Knowledge about the E-Governance services being provided needs to be there among both the citizens using these services and the IT professionals who are responsible for rendering these services. E-Governance requires employment of proficient engineers who can manage the E-Governance services efficiently and be ever ready for the resolution of the glitches and bugs occurring in such services.

  • Data Content and Web Portals: For providing any kind of e-services, there needs to be an elaborate and lucid web portal by means of which the users can have easy access to all options and different kinds of data content should be made available on the E-Governance services’ websites.

  • Capital: Each and every kind of service requires some amount of capital for its smooth functioning which can be public, private, or partnership of both. Such capital is very essential for the government to provide its E-Governance services and it contributes to the specific section of economy on which that E-Governance service is based.


CYBER SECURITY CONCEPT IN E-GOVERNANCE

The availability, confidentiality, and integrity of information are primarily the focus of cyber security. Services like user authentication, authorization, accountability, and reliability are supported by these attributes. In a broader sense, both people and technologies are involved in cyber and information security. The literature has just a few articles that discuss the organisational security culture, also referred to as the societal acceptance of security technologies. The open literature is well-represented in terms of information security standards. Instead, then making recommendations on how the policy should be structured, these principles try to outline the various procedures and safeguards required for properly executing an information security policy. These standards have generally been formed from the experiences of the world's top technological nations.

For IT infrastructure, especially Digital India, cyber security is crucial. Every electronic governance initiative needs a safety layer. Any e-governance venture should have the security component in place at the plan phase before project started. To keep an eye on the design phase, the government's cyber security unit must play a significant role.

Two of the Government of India's main initiatives, the National e-Governance Plan and Digital India, aim to deliver perfect citizen-concentric services as well as effective and clear solutions without security risks. In other words, the goal of Digital India's e-governance project is to provide real-time governance so that all of the country's residents can access government services quickly, easily, and with accountability.

The adoption of IT programme launched by Central and State governments nationwide has been pushed by Digital India. Given that the public supports digital conversion, it is crucial for the government to maintain their confidence by shielding IT infrastructure against cyber attacks.


ICT

ICT initiatives like e-Government fail in developing nations, with 35% of them being deemed complete failures and 50% being deemed partial failures. These numbers, reflect the disconnect between the ICT program's design and the realities of today (including physical, cultural, economic, and other factors); the larger the gap, the higher the likelihood of failure. One of the most crucial elements of an information system has long been identified as security. Modern information assurance management is aware of the necessity to include people and processes1

including traditional technology security risks in addition to them while assuring the accuracy of information in all modern businesses. For the bulk of security issues, technological solutions have already been created.

In Europe and other parts of the world, where the use of information and communication technologies (ICTs) to digitise transactions and provide public facilities is considered as a substantial leverage of public sector invention, e-Governance is at the forefront of contemporary public sector reform strategies. However, offering public sector information and services online also presents significant security risks and undermines individuals' trust in governance, as well as privacy and data system dangers. Therefore, protecting data and systems is crucial since it can affect users' and governances' willingness to accept the provided online services.


CYBER SECURITY INITIATIVES BY INDIA

CERT-In

Due to its enhancements in addressing the country's cybersecurity, National agency of India for cybersecurity, The Indian Computer Emergency Response Team (CERT-In), there has been decrease in cyberattacks on government systems. Government workers in India are better equipped to combat cybercrime by training them on cybersecurity awareness and anti-phishing. The CERT-In Group not only raises cognizance of the risks professed by phishing attempts but also updates the public on the most recent cyber vulnerabilities and remedies against them.

Cyber Surakshit Bharat

The Ministry of Electronics and Information Technology (MeitY) introduced the Cyber Surakshit Bharat programme with the goal of developing a strong cybersecurity bionetwork in India. This is consistent with the goal of government of creating a "Digital India." This programme was supported by the National E-Government Division (NeGD).

The need for sound governance has increased as a outcome of the Indian government initiatives on cybersecurity, which have caused the government structure to change quickly. The programme would urge CISOs and front-line IT personnel from all government agencies to educate themselves on cybercrime and develop their self-defence skills. A series of workshops are also included in this pioneering public-private cooperation to educate authorities on cybersecurity and provide them with toolkits for fending off cyberthreats.

National Critical Information Infrastructure Protection Centre (NCIIPC)

India has created the National Critical Information Infrastructure Protection Centre as part of its government's cybersecurity initiatives to protect sensitive data important to public safety, economic growth, and national security. The Information Technology (IT)  Act of 2000 amended this clause in Section 70A. This organisation does cybersecurity drills to ensure that the government and important areas are ready in relation of cybersecurity.

Cyber Swacchta Kendra

In order to eradicate cybercrime in the nation from 2018 to 2020, the MHA established the I4C Indian Cyber Crime Coordination Centre project.

Under the Ministry of Electronics and Information Technology, there is a facility Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Center) (MeitY). It seeks to:

  • By identifying botnet infestations and empowering end users to clear up and secure their computers thereafter to guard against new infections, we can help Indian users access a secure online environment.2

  • The National Cyber Security Policy's goal of strengthening the nation's cyber ecosystem.

  • The Information Technology Act of 2000's Section 70B grants CERT-In permission to run the centre.

National Cyber Security Strategy 2020

Office of the National Cyber Security Coordinator is currently working on a National Cyber Security Strategy 2020 within the National Security Council Secretariat of the Indian government. Information security pertains to guarding against cyberattacks, harm, abuse, and corporate espionage. The National Security Council (NSC) of India is a three-tiered institution that regulates matters pertaining to energy, the budget, politics, and security.

The goal is to promote cybersecurity awareness by raising the standard of audits. Organizations will be seized to a higher requirement of security than is presently mandated by law due to cyber auditors. The concept that hacks can happen frequently and can be reinforced through small-scale crisis management drills. Additionally, it focuses on cyber readiness, which ought to be indexed, and performance, which ought to be monitored. For IT infrastructure, especially Digital India, cyber security is crucial. Every electronic governance initiative needs a safety layer. Any e-governance venture should have the safety component in place at the plan phase before project started. To keep an eye on the design phase, the government's cyber security unit must play a significant role. According to this Indian Government Initiative on Cybersecurity, other departments with the required domain expertise should coordinate their duties and responsibilities, and cybersecurity deserves its own 3budget.


APPOINTING CIOs

Due to rising digitalization, globalisation has made the implementation of strict measures more and more necessary. The government might be completely destroyed and come to an end with the smallest crack in the system.4

Therefore, a Chief Information Security Officer (CISO) who can swiftly detect and document any new security necessities resulting from technological advancement should be in charge of each government agency. Indian authorities recently published a manual for CISOs of government organisations that highlights recommended practises for protecting infrastructure, apps, and compliance.


PLAN OF ACTION FOR CRISIS MANAGEMENT

In addition, crisis management plans are being developed and implemented by all government agencies and the aforementioned vital industries. Businesses and employees may suffer significant repercussions of a breach incident. These initiatives from the government of India on cybersecurity are made to establish a plan for educating staff members and executives about such a situation. Additionally, the federal government makes sure that cyber-attacks won't stop crucial operations in any crucial region. Organizations will be better able to handle cybersecurity crises and accurately identify roles and accountability at the personal level by putting measures into place behind the desk.


WEBSITE ANALYSIS

In light of the rise in harmful outbreaks such as email phishing, government website hacking the Government of India plans to audit all of its online programmes and websites. As part of this endeavour, the government has chosen about 90 security auditing companies to examine the information security best practises.


TRAINING AND DRILLS

Goveínment oíganizations have begun planning and conducting simulated cybeísecuíity exeícises as paít of coípoíate cybeísecuíity postuíe assessments. Accoíding to MeitY, CERľ-Inhas conducted 44 similaí simulation exeícises this yeaí. 265 oíganizations fíom diffeíent countíies and sectoís also paíticipated in these exeícises. ľhe main sectoís that could benefit fíom these initiatives aíe finance, defence, eneígy and telecommunications. Regulaíly oíganize tíaining sessions and woíkshops to píepaíe CISOs and system administíatoís foí cybeíattacks. 19 tíaining sessions have been maintained with a total of 515 paíticipants Since Octobeí 2019.


PREVENTION OF MALWARE

Cyber Swachhta Kendra is a clean-up robot with the ability to recognise malware and investigate its origin. Additionally, free tools are offered for eliminating harmful software. As part of the government's Cyber Swachhta strategy, a national cyber coordination centre (NCCC) has been established to help with better situational awareness regarding current and potential cyber threats.


CHALLENGES

In the absence of a well stated security policy, any e-governance endeavour will continue to be susceptible to breaches of security. The foundation of good information security is cybersecurity policies. The Cybersecurity aims to outline what is required of an organisation in terms of its information system security. The overarching goal is to regulate or direct behaviour in an effort to lower the chance that information assets will be harmed accidentally or purposefully. Cyber security policies support the safety and well-being of data sources. Data Protection will benefit the user to manage and protect sensitive information from accidental or unlawful additions, alterations, or improper disclosure. Data security consists of three components:

  • Confidentiality: refers to safeguarding of data against illegal disclosure, to those who are not allowed to access it.

  • Authenticity: refers to safeguarding data against unauthorised alteration and ensuring that data, such a recipient list, is precise and complete and can be trusted upon.

  • Accessibility: is to make sure that the data is available when needed.


CYBER SECURITY THREATS

There are a variety of incidents, they can originate from anywhere on the Internet. Although certain attacks must be performed from particular networks or systems and some require access to unique accounts. An intrusive person might be looking for financial gain, intellectual stimulation, a sense of dominance, or fun. Thus, a number of vulnerabilities, including packet sniffing and probing, continue to pose a threat to the networks that deliver data to the end users of the e-Government.

  • Packet analyzer: A packet analyzer, sometimes called a packet sniffer. Packet sniffing is the activity of gathering, collecting, and logging some or all of the packets that flow over a computer network. An administrator can identify incorrect packets using the data collected by the packet analyzer, use it to identify bottlenecks, and help maintain effective network data transfer. However, unauthorised packet analyzing can result in major security and electronic commerce breaches.

  • Malware: Malware is an invading software created specifically to harm and incapacitate devices and computer systems. Trojan horses, viruses, worms, spyware, adware, ransomware and other specialised sorts of attacks are all included in malicious software. Users of the network are typically unknown of the application until they notice the damage. Trojan horses and viruses are normally hidden in reliable software or files that attackers have altered to carry out unforeseen functions. A worm has the ability to duplicate itself without the assistance of a person. Although viruses are self- replicating programmes as well, they typically need user interaction to propagate unintentionally to other programmes or systems. These kinds of initiatives have the potential to cause significant data loss, outages, denials of service, and other security problems.

  • Probe: In a probe attack, a network is scanned by an attacker to obtain data or identify known weaknesses. An attacker who has a map of the machines and services present on a network can use this information to spot potential exploits, such as those produced by ipsweep, portsweep, nmap, and satan.

  • Network infrastructure attacks: These unusual yet dangerous attacks target important elements of the network infrastructure instead of attacking individual Internet systems. For example, several users rely on huge archive sites, network access providers, and network name servers. The infrastructure can potentially be threatened by widespread targeted attacks. Attacks on the infrastructure have a significant impact on the Internet as a whole and can substantially impair the daily operation of numerous websites.

  • Denial of Service (DOS) attack: A Denial-of-Service attack occurs when a malevolent cyber risk agent prevents authorised users from accessing computer systems, gadgets, or other network components. Services impacted might involve mails, webpages, login details or other applications depends on the afflicted system or device. A denial-of- service situation is created by bombarding the targeted server or system with traffic until it becomes unresponsive or fails, blocking access for authorised users. It many cases hackers want to damage the reputation or business of the intended organisation or person. They might seriously affect the network’s physical components or tamper with data that is being transmitted, including encrypted data. Exploitation of Trust Computers on networks often has trust relationships with one another, For instance, the computer may check a series of files that describe which other computers on the network are allowed to use particular commands before executing them. Attackers may be able to access other computers without authorization if they can fake their identity and pretend to be using a trusted machine.

  • Remote to Local (R2L) attack: A remote to local attack is well known to break into a victim workstation across the entire network. Remote hackers search for weak spots in internet security in order to effectively infiltrate systems, steal information, and cause a variety of other issues. Examples of such attacks include guss passwd, ftp write, multihop, imap, phf, spy, warezmaster, and warezclient. The unlawful use of a computer account by somebody other than the account holder without using system- level or root-level privileges is known as account compromise. A compromised account could put the victim at risk for significant information leakage, data theft, or service theft.


IMPROVING SECURITY IN E-GOVERNANCE

A strong defence primarily focusses on well-defined policies and procedures and the use of advanced tools in order to provide confidentiality, integrity, accessibility, and ongoing monitoring to those who need it and who can be trusted with it.

  • Security policy: If security is vital, then certainty also matters. Strong procedures are used to enforce every aspect of the security policy. To ensure that securitypolicies are comprehensive and well enforced, there are established techniques and risk assessment strategies. An organization-wide strong plan for computer and data security is called a policy. It serves as the foundation for creating high-end security principles and processes for users and server administrators to follow, and it gives a foundation for making strategic decision, such as which protection mechanisms to implement and how to setup services.

  • Security Protocols: The reality of networked communication today is the everyday deluge of spam, which is now rife with minimal cyber-attacks, in addition to the dangers of hostile insiders, corrupted laptops arriving and departing behind inspecting firewalls, and cyber-attack security systems. This demonstrates the necessity of taking efforts with appropriate caution and diligence toward government regulations that, if they are not still in place, must be implemented for efficient operations. Cybersecurity is greatly influenced by system administration techniques. There are widely available standards and general guidelines for sound security procedures. Below are some examples of frequently suggested practises:

  1. Make sure that each account has a password, and that those passwords are tough. It is better to use a one-time password method.

  2. Use instruments like MD5 checksums ( a powerful cryptographic method) to regularly guarantee the authenticity of system software.

  3. When creating a software, use secure coding skills. These are available on websites on the Internet that deal with cybersecurity.

  4. Be cautious when using and configuring networks, and make adjustments as new hazards are discovered.

  5. Constantly monitor with suppliers for the most recent fixes, and maintain systems up to date with repairs and upgrades. frequently monitor internet security archives, such as those kept up by emergency responders for known vulnerabilities and technical guidance.

  6. Monitor networks and systems, and routinely review records. Many websites that experience cyber security problems claim that inadequate audit data is gathered, making it challenging to identify and track cyberattacks.


SECURITY TECHNOLOGIES

Various technologies have been created to aid organisations in protecting their systems and data from intrusions. These technologies aid in the prevention of attacks, the detection of anomalous or suspicious activity, and respond to security-related incidents.

  • Operational Technology: Hackers actively look for ways to get access to hosts and networks. Hackers can frequently enter systems with unnerving ease if they are equipped with knowledge of potential vulnerabilities, media manipulation strategies, and tools to automate information gathering and system takeover. Network managers must balance making network service more accessible to legitimate users as possible with reducing the vulnerability of complicated communication networks to attack. However, programs rely mainly upon the same aspects of the network and system standards that expose them to hackers. Technologies have advanced in response to lessen the impact of such dangers. Currently no single technology can solve every issue. However, by properly planning and deploying staff and operational technology strategically, companies can substantially increase their resistance to attack.

  • One-Time Passwords: A One Time Password, or OTP, is a string of letters or numbers that is created by computer programme and is intended to be used only once for logging in. One Time Passwords will reduce the possibility of malicious login attempts and, consequently, the possibility of data theft. The basic idea behind a One Time Password is to give an extra layer of verification in order to combat cybercrime and shield your organisation from the devastating implications that could have on your company.

  • Cryptography: Cryptography is technique of protecting data in such a way that only the intended recipients can decipher and process them. Hence, access to information by unauthorised parties is prevented. The methods used in cryptography to protect data are derived from mathematical ideas and a set of rule-based calculations known as algorithms to transform messages in ways that make them difficult to decode. These algorithms are employed in the creation of cryptographic keys, digital signatures, data privacy protection, online browsing on the internet, and the security of private transactions like debit and credit card purchases. A side effect of such authentication is the concept of non-repudiation. A person who places their cryptographic digital signature on an electronic document cannot later claim that they did not sign it, because in theory they are the only one who could have created the correct signature.

  • Firewalls: Firewall is a cybersecurity device that monitors and filters incoming and outgoing network traffic based on an organization’s predetermined established security policies. A firewall is essentially the barrier that stands between a private internal network and the open Internet at its most basic level. The basic function of a firewall is to let safe traffic in while blocking harmful traffic. A simple firewall could be a filtering router set up to dismiss packets coming from unknown sources or attempts to connect to external service ports. More complex implementations may include bastion hosts, where proxy mechanisms work on behalf of services. These procedures authenticate requests, examine both their form and content, and forward those that have been accepted to the right service hosts. Before connections are made between internal networks and the Internet, firewall configuration must be carefully implemented and tested because they are frequently the first line of defence against intruders.

  • Analysis tools: Due to the growing sophistication of hacker techniques and the vulnerabilities found in frequently used apps, it is crucial to regularly evaluate the vulnerability of the network to compromise. There are numerous tools for identifying vulnerabilities, and they have drawn both praise and criticism. These tools are helpful to system administrators in locating weak points in their systems. Critics claim that these resources, particularly those that are publicly accessible to Internet users, constitute a risk if acquired and utilised improperly by intruders.

 

CONCLUSION

The discussion above makes clear that cybersecurity is a crucial component of any e- governance endeavour. However, the security concerns are not treated with the same seriousness in the Indian e-governance scenario. When it comes to the development, installation, and upkeep of high-end technology, it is often clear that government decision- makers prefer to make concessions. Initiatives involving e-governance must prioritise cybersecurity. Any transaction or piece of information that is accessible over the network must be kept confidential. In the case of e-governance projects, important documents and other materials must be safeguarded from unauthorised users. Security is therefore essential for the effective implementation of such programs. E-governance is a must for every system engineering in order to overcome inertia, along with cybersecurity technologies that offer required protection.



The authors of this article are Archisha Singh, Divyanshi and Niharika Choudhary, of Banasthali Vidyapeeth, Rajasthan.

 

This article contains the view of the author and the publisher in no way associates with the views or ideologies of the author. All the moral rights vests with the Author(s).






0 comments

Comments


bottom of page