International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 141

Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014


Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure

M Hari Haran


Abstract: E-governance has made massive inroads in the way the government delivers services to its citizens. To enhance and empower this electronic service delivery mechanism, the government of India established a strong IT Infrastructure at the state level to deliver the e-governance services. This e-governance IT Infrastructure comprises the following 3 core components: State Data Centre (SDC), State Wide Area Network (SWAN) and the Common Service Centres (CSC). The state governments have taken forward the mandate of delivering the e-governance services to the stakeholders through these cores IT Infrastructure components. Any IT Infrastructure environment is exposed to a certain degree of threats and vulnerabilities propagating from different sources in different forms. This paper focuses on one particular threat to the e-governance IT Infrastructure i. e. , The Insider Threat. This paper identifies key stakeholders who are the probable Insiders from an e-governance IT Infrastructure perspective and outlines the various threats and vulnerabilities that might arise out due to the activities of the Insider and finally, proposes a robust framework mechanism for early detection and mitigation of such Insider threats.


Keywords: e-governance, IT Infrastructure, Cyber Security, Insider Threats


Edition: Volume 3 Issue 4, April 2014,


Pages: 5 - 10


How to Cite this Article?

M Hari Haran, "Framework Based Approach for the Mitigation of Insider Threats in E-governance IT Infrastructure", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20131337, Volume 3 Issue 4, April 2014, 5 - 10

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'IT Infrastructure'

Downloads: 111

Research Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1281 - 1286

The Role of Network Layers in Supporting Knowledge Management Implementations

Ayad Shihan, Luay Kadhum, Norashikin Ali

Share this Article

Downloads: 117

Research Paper, Information Technology, Kenya, Volume 6 Issue 4, April 2017

Pages: 1676 - 1681

A Novel Approach for Combating Cyber-Security Issues in Cloud Based E-Learning in Kenyan Universities

Judith Chepkemoi Boit, Watson Musyoki Kanuku

Share this Article

Similar Articles with Keyword 'Cyber Security'

Downloads: 127

Research Paper, Information Technology, Malaysia, Volume 6 Issue 11, November 2017

Pages: 2062 - 2065

Framework for Improving Critical Infrastructure Cyber Security

Naby Nouhou Nassou Conde, Jamaludin Bin Abrahim

Share this Article

Downloads: 157

Research Paper, Information Technology, India, Volume 7 Issue 5, May 2018

Pages: 379 - 381

Cyber Security: Ransomware Infects the Cloud

Shanthi D.L., Rachana B

Share this Article
Top