Analysing security checkpoints for an integrated utility-based information systemSunil K. Muttoo
, Rajan Gupta
, Saibal K. Pal
, 2016, published scientific conference contribution
Abstract: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels.
Found in: ključnih besedah
Summary of found: ...paper. These are related to database security, network security, cryptography, and the user authentication process....
Keywords: information systems, integrated utility system, database security, network security, data security, information system security, e-governance
Published: 15.07.2021; Views: 785; Downloads: 2
Fulltext (0,00 KB)
This document has many files! More...