Open Access Open Access  Restricted Access Subscription Access

Risk and Remedies of E-Governance Systems


Affiliations
1 Department of Computer Science, The University of Burdwan, W.B., India
 

With the advancement of Information and Communication Technology (ICT), Information has become the most easily accessible yet very valuable commodity. Since the successful implementation of various electronic mechanisms like E-Governance, E-Commerce, E-Learning, E-Health, MGovernance, M-Insurance, etc are totally dependable on the security and authenticity of the information, it is very much susceptible to interceptions and alterations caused by the hackers. In this paper the authors have done a through study of the various risk factors of the information security and their probable remedies using various cryptographic algorithms so that the above mentioned E-mechanisms can be implemented with utmost Privacy, Integrity, Non-Repudiation and Authentication (PINA).

Keywords

Authentication, Cryptography, Information Security, Interception, Integrity, Non-Repudiation, Privacy.
User
Notifications
Font Size

Abstract Views: 539

PDF Views: 1




  • Risk and Remedies of E-Governance Systems

Abstract Views: 539  |  PDF Views: 1

Authors

Abhishek Roy
Department of Computer Science, The University of Burdwan, W.B., India
Sunil Karforma
Department of Computer Science, The University of Burdwan, W.B., India

Abstract


With the advancement of Information and Communication Technology (ICT), Information has become the most easily accessible yet very valuable commodity. Since the successful implementation of various electronic mechanisms like E-Governance, E-Commerce, E-Learning, E-Health, MGovernance, M-Insurance, etc are totally dependable on the security and authenticity of the information, it is very much susceptible to interceptions and alterations caused by the hackers. In this paper the authors have done a through study of the various risk factors of the information security and their probable remedies using various cryptographic algorithms so that the above mentioned E-mechanisms can be implemented with utmost Privacy, Integrity, Non-Repudiation and Authentication (PINA).

Keywords


Authentication, Cryptography, Information Security, Interception, Integrity, Non-Repudiation, Privacy.