Monthly Archives: December 2012
Cyber Demonstration
The incidents in Delhi over the past one week have indicated how the power of the voice of the people can make even the most adamant Government to sit up and take notice. Initially the Government tried to ignore the … Continue reading
e-authentication framework for Government projects
The Department of Electronics and Information Technology, GOI (DeitY) has released a document called “e-Pramaan: Framework for e-Authentication”. This is intended to serve as the guiding document for all Central and State Ministries, departments and government agencies for implementing an … Continue reading
Government is on a holiday
The Lieutenant Governor of Delhi who was enjoying a holiday in US while the city was burning has now come back to India. Many hope that there will be some accountability for what happens in Delhi now. People have criticized … Continue reading
Stealing Credit Card information from POS
Stealing of Credit card information when used on the Internet is a known vulnerability. It had also been observed that certain criminals had bought credit card information by bribing the employees of merchant establishments or by stealing the POS swiping … Continue reading
Vulnerabilities in human space
According to NIST (National Institute of Standards and Technology), a “Vulnerability” in Risk Analysis context is defined as a”flaw or weakness in system security procedures, design,implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result … Continue reading
Starting an Information Assurance Program
Information Assurance (IA) is a management initiative to ensure Confidentiality, Integrity, Availability, Authentication and Non Repudiation of information in an organization. Taking the practical difficulties involved in achieving a satisfactory level of IA, Naavi has suggested a “Total Information Assurance”(TIA) … Continue reading