SECURITY OPTIMIZATION of E-GOVERNANCE WEBPAGES

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 6

Abstract

ICT is being applied in various fields nowadays. Affected fields in this category include education, commerce, health and governance. Due to this effect day by day a number of websites and portals are taking birth. No doubt it is for the benefit of the society and its and its people. But as the number of websites and web application are growing exponentially, security of these is becoming main issue. As soon as more and more services are going to be online the risk of losing that information is increasing due to various security concerns. Not only loosing the information, unauthorized changes made in that information may be more dangerous than loss of the data. In electronic form of providing information, the medium is website or combination of websites named portal. In this paper various issues regarding website and portal security have been discussed and various security related suggestions have been provided for the stakeholders.

Authors and Affiliations

Subhash Chander, Ashwani Kush and Sharmila

Keywords

Related Articles

Variatonal Iteration Method for Solution of One-Dimensional Heat Equation with Nonlocal Conditions

The present paper discusses the closed-form solution of the one dimensional Heat equation with Nonlocal condition by Variational Iteration Method (VIM). The advantage of this method is to overcome the difficulty of cal...

Hostile Takeovers and Defensive Tactics: A Case study of Arcelor Mittal

Hostile Take-overs become the site of battlefields as it is witnessed in Arcelor Mittal takeover case. Five month long fierce takeover battle occurred between Arcelor and Mittal Steel which brought a lot of excitement...

PERFORMANCE OF VARIOUS ALGORITHMS USED IN CRYPTOGRAPHY

Performance of cryptosystems is a very important process in measuring the performance of Cryptosystems. Communication is the basic process of exchanging information. The effectiveness of computer communication is mainl...

slugAn efficient implementation of Triple DES (Data Encryption Standard) through Hash function

Cryptography, being one of the techniques that is handed out for securing a network. It is utilized by implementing many different algorithms. DES (Data Encryption Standard) is one of the most popular algorithms. But a...

ECONOMIC ANALYSIS OF NUTRITIONAL AND HEALTH STATUS OF DALIT WOMEN AGRICULTURAL LABOUR IN CUDDALORE DISTRICT, TAMIL NADU

The purpose of this paper is to study the nutritional and health status of Dalit women Agricultural Labour in Cuddalore District, Tamil Nadu. The sample of the study consists of 300 respondents, which were selected by...

Download PDF file
  • EP ID EP18374
  • DOI -
  • Views 300
  • Downloads 10

How To Cite

Subhash Chander, Ashwani Kush and Sharmila (2012). SECURITY OPTIMIZATION of E-GOVERNANCE WEBPAGES. International Journal of Management, IT and Engineering, 2(6), -. https://europub.co.uk/articles/-A-18374