Guest Lecture on Information warfare in E-governance scenario

The IIS University

Department of Physics

Report: Guest Lecture

Date: 12th March 2015                                                                                 

Time: 11.00AM

Topic:  “Information warfare in E-governance scenario”

Guest speaker: Lt. Col. V.S. Tanwar, Director Technical, Janhit Telecom PVT. LTD., Jaipur

Lt. Col. V.S. Tanwar started his lecture with the example killing of Osama. U.S defence network ARPA-NET was successfully invaded through a virus by a graduate student. Limitation of present administrative systems are-complex procedures which takes lot of time, rigidhierarchy, insulated and isolated departments and lack of accountability. Major issues in E-governance are architecture, languages, security policy, finance and acceptability. Today, wars have to be short. Aim of wars is to cause maximum attrition and causality. There are certain steps for the defence of any attack-delay, resist the attack, limit the time, weaken the enemy and then destroy. Also there are some surprising factors that involves-surprise, security and momentum.

 They also talked about media which can be used for information transfer through optical fibre, infrared wave, co-axial, satellite etc. Information transfer works on the following factors-Confidentiality- information should be top secret and restricted, Integrity-it is assured that a source is not destroyed or modified during transfer, Availability-both channel capacity and storage capacity should be available.

There are many strategic C4I systems like railways, civil aviation, meteorological department, space and satellite system, disaster relief networks and many more, that are active nowadays. On the other hand, there are certain threats that affect the information transfer-forgery which results in the change in the matter of information, active and passive wire tapping which results in the leakage of information, delay of information etc. But there are measures to ensure information security like physical security, personal security, hardware security, software security and media security. Physical security includes intrusion prevention, information destruction, power protection and fire protection. Similarity, hardware security includes identity verification, biometric access control, lightning and ESD protection and tapping protection. Hence it is concluded that information is vital and it has to be protected.

Notice

Gallery