E-Governance Security Model Analysis
E-Governance Security Model Analysis
Abstract:- Online working of a government or providing its services online to its citizens at their access is known as E-Governance. E-
Governance is E-Commerce tool means online accessibility of government services. The technology and the methods used in E-Governance plan
provide a roadmap for well-organized delivery of services at the door step. In today’s time the development of any country depends on the uses
of E-Governance and also their dispersion Development of any country can be reviewed by the extent of E-Governance in that country.
Moreover, today’s government has also full confidence in E-Governance and its widespread network across the world proves it.
E-government security is a key problem to confine the structure and development of E-government systems in any country over the world. E-
Government security models are broadly used in the implementation and development of e-government systems. Due to the deference situation
of the countries over the world there are diverse security models applied in each country. . Based on this analysis, the security requirements of
the data and the applications have been formulated in the form of security parameters like confidentiality, integrity and availability as well the
access requirements of the roles.
The overall aim of this research is to review the available existing E-governance security models, find out their merits and demerits and analysis
of the available models with respect of security in E-Governance. This paper discusses about the possible threats and vulnerabilities for different
data locations separately for different models. Here data are considered for four states: data in store, data in process, data in transit and data in
destination.
Keywords: e-governance, ICT, e-government, information, security, etc.
__________________________________________________*****_________________________________________________
No Password
Encryption cracking
Using the same key for a prolonged period of time
System failure
Data in Store Inadequate back up facility
Corruption / loss or
Non adherence to back up policy
damage of back up media
Minimum length of the password has not been
Brute force attack
enforced
Loss of decryption keys Using the wrong algorithm or a key size that is too
Theft of credentials small
Cross-site scripting Password is guessable
Data in Process
Query string Using application-only filters for malicious input
manipulation Using non-validated input used to generate SQL
queries Relying on client side validation
Encryption cracking Using the same key for a prolonged period of time
Data in Transit Brute force attack Distributing keys in an insecure manner
Passing sensitive data in clear text over network
Denial of service attacks
Data in Destination Lack of monitoring of services and activities
Misuse of privileges
102
IJFRCSCE | May 2019, Available @ [Link]
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 5 Issue: 5 101 –108
_______________________________________________________________________________________________
2. Comparative Analysis Model To evaluate the effectiveness of the current policies
Comparative Analysis Model is one of the least-used but a and identify key learnings in terms of strengths and
high potential e-governance model for developing countries. flaws in the policies.
The model can be used to empower people by comparing To effectively establish conditions of Precedence,
cases of bad governance with those of good governance and especially in the case of Judicial or legal decision-
identifying specific aspects of bad governance, the reasons making (example for resolving patent-related
and people behind them, and how the situation can be disputes, public goods ownership rights), and use it
improved. to influence/ advocate future decision-making.
To enable informed decision-making at all levels
The model is based on using immense capacity of by enhancing the background knowledge and also
ICT and social media tools to explore given providing a rationale for action.
information sets with comparable information To evaluate the performance and track-record of a
available in the public or private domain. particular decision-maker/ decision-making body.
Demerits
103
IJFRCSCE | May 2019, Available @ [Link]
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 5 Issue: 5 101 –108
_______________________________________________________________________________________________
Table2. Threats&Vulnerabilities of Critical Flow Model.
Those who would divulge such information could Making available corruption related data about a
include upright officials and workers, particular Ministry / Division/ Officials online to its
whistleblowers, affected parties and those who electoral constituency or to the concerned
were themselves involved in bad governance regulatory body.
practices but have now changed their minds or may
Making available Research studies, Enquiry
wish to trade such information for lenient
reports, Impact studies commissioned by the
punishments.
Government or Independent commissions to the
affected parties.
104
IJFRCSCE | May 2019, Available @ [Link]
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 5 Issue: 5 101 –108
_______________________________________________________________________________________________
Making Human Rights Violations cases violations interest and opinion of the masses in decision-
freely available to Judiciary, NGOs and concerned making processes.
citizens.
Demerits
Merits
This model is more directed and evolved. The model may not work in cases where the
governance mechanism does not allow public
Different organizations can use it differently debates and opinions, and censures all information
depending on the aspect of governance they of critical nature. This model unlike the
situation they want to address. Broadcasting/ Wider-Dissemination model would
be more effective in situations of Optimal
The model corrects information failure, raising Ignorance of the Government.
awareness about the bad governance practices. In this model, the analysis is done based
on old records. So existing data
The model exerts indirect pressure on the validation is the main issue. All possible
concerned governance institution / policy-making security aspects, threats and
body to move away from optimal ignorance vulnerabilities have been discussed in
attitude to reform, and take into cognizance the Table 3.
DATA
THREATS VULNERABILITIES
LOCATION
Data in Encrypti Failing to secure encryption keys
Store on Using the wrong algorithm or a key size that is too small
cracking Using the same key for a prolonged period of time
System Absence of back up policy
failure No back up copy kept off-site
Corruption / Use of weak cipher or
loss or hash to make password non readable
damage of
back up media
Theft
of
credent
ials
Data in Brute force Inadequate back up facility
Process attack Non adherence to back up policy
Form field Using input file names, URLs or user names for security decisions
manipulation
Data in Network Passing sensitive data in clear text to network
Transit Eavesdropping
Data in Encrypti Password is guessable
Destinat on Minimum length of the password has not been enforced
ion cracking
Brute force
attack
105
IJFRCSCE | May 2019, Available @ [Link]
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 5 Issue: 5 101 –108
_______________________________________________________________________________________________
4. E-Advocacy Model Applications
E-Advocacy / Mobilization and Lobbying Model is This model could be applied in the following possible
one of the most frequently used Digital Governance ways:
model and has often come to the aid of the global Fostering public debates on issue of larger
civil society to impact on global decision-making concerns, namely on the themes of upcoming
processes. conferences, treaties etc.
Formation of pressure groups on key issues to force
The model is based on setting-up a planned, decision-makers to take their concerns into
directed flow of information to build strong virtual cognizance.
allies to complement actions in the real world. Making available opinions of suppressed groups
who are not involved in the decision-making
Virtual communities are formed which share process into wider public domain.
similar values and concerns, and these communities Catalyzing wider participation in decision-making
in turn link up with or support real-life groups/ processes.
activities for concerted action. Building up global expertise on a particular theme
in absence of localised information to aid
The model builds the momentum of real-world decision-making.
processes by adding the opinions and concerns Merits
expressed by virtual communities. The model enhances the scope of participation of
individuals and communities in debates which affect them
The strength of this model is in its diversity of the and help them build a global alliance.
virtual community, and the ideas, expertise and A community may no longer find itself isolated but
resources accumulated through this virtual form of may find an ally for mobilizing effective action
networking. through this model. It also creates an effective
deterrent for governments and decision-making
bodies who are responsive to people's opinion to
The model is able to mobilize and leverage human
provide better governance.
resources and information beyond geographical,
institutional and bureaucratic barriers, and use it for
concerted action. The model could also be used favorably by the
government in a positive manner to encourage
public debates on issues where the opinion and
expertise of civil society is of great importance and
therefore could become a tool to enhance
democratic practices and improve governance
practices (especially in Developing Countries).
Demerits
This model require a transition period before being
adopted on a wider scale.
It require familiarity of ICT among all the citizens
benefited from this model.
E-advocacy model has come to the aid of the global civil
society to impact on global decision making process.
Security aspects, threats and possible vulnerabilities for this
model have been discussed in Table 4.
106
IJFRCSCE | May 2019, Available @ [Link]
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 5 Issue: 5 101 –108
_______________________________________________________________________________________________
DATA
THREATS VULNERABILITIES
LOCATION
Data in Encryption cracking Failing to secure encryption keys
Store System failure Complexity of the password is not enforced
Corruption / loss or damage of back up media Using the wrong algorithm or a key size that is too small
Brute force attack Using the same key for a prolonged period of time
Inability to identify actual user Absence of back up policy
No back up copy kept off-site
Use of weak cipher or
hash to make password non readable
Data in Http header manipulation Failing to validate input from all sources including
Process Cookie manipulation cookies, query string parameters, http headers, database
and network resources
Data in Information disclosure Storing secrets when it is not needed
Transition Network eavesdropping Storing secrets in clear text
Passing sensitive data in clear text over network
Data in Theft of credentials Distributing keys in an insecure manner
Destination Inability to identify to actual user Complexity of the password is not enforced
Use of weak cipher or hash to make password non
readable
Demerits
The model firmly relies on the interactive
Applications applications of ICT and therefore is a technology
This model could be applied in the following possible ways: and cost - intensive model
107
IJFRCSCE | May 2019, Available @ [Link]
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 5 Issue: 5 101 –108
_______________________________________________________________________________________________
It would also require elemental familiarity of ICT concern is much higher than all other models. All possible
among the citizens to fully benefit from this model. threats and vulnerabilities for this model have been
discussed in Table 5.
In this model, information flows in two ways. So security
DATA
LOCATION THREATS VULNERABILITIES
Failing to secure encryption keys
Encryption cracking
Complexity of the password is not enforced
Loss of decryption keys
Using the wrong algorithm or a key size that is too
System failure
small
Data in Store Corruption / loss or damage of back up media
Using the same key for a prolonged period of time
Impersonation
Absence of back up policy
Denial of service attack
No back up copy kept off-site
Inability to identify actual user
Distributed keys in an insecure manner
Theft of credentials Use of weak cipher or hash to make password non-
Data in Process Brute force attack readable
Misuse of privileges Lack
Storing secrets when it is not needed
Data in Information disclosure Storing secrets in clear text
Transition Network eavesdropping Passing sensitive data in clear text over network
No password
Theft of credentials Distributing keys in an insecure manner
Data in
Inability to identify to actual user Complexity of the password is not enforced
Destination