Certificate in E-Governance and Cyber Security Fundamentals of Information Security (PGDCS-01)

Total Page:16

File Type:pdf, Size:1020Kb

Certificate in E-Governance and Cyber Security Fundamentals of Information Security (PGDCS-01) Certificate in e-Governance and Cyber Security Fundamentals of Information Security (PGDCS-01) Title Fundamentals of Information Security Advisors Mr. R.Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer(Education), CEMCA Prof. Durgesh Pant, Director- SCS&IT, UOU Editor Er. Saurav Joshi, Assistant Professor, Birla Insitute of Applied Sciences, Bhimtal Authors Block I> Unit I, Unit II, Unit III & Unit IV Ms. Priyanka Tewari, Technical Analyst, Infosys Technologies Ltd., Chandigarh Block II> Unit I, Unit II, & Unit III Ms. Priyanka Tewari, Technical Analyst, Infosys Technologies Ltd., Chandigarh Block II> Unit IV Er. Ashutosh Bahuguna, Scientist, CERT-In Block III> Unit I, Unit II, Unit III & Unit IV Group Captain Ashok Katariya, Ministry of Defense, New Delhi ISBN: 978-93-84813-88-8 Acknowledgement The University acknowledges with thanks the expertixe and financial support provided by Commonwealth Educational Media Centre for Asia(CEMCA), New Delhi, for the preparation of this study material. Uttarakhand Open University, 2016 © Uttarakhand Open University, 2016. Fundamentals of Information Security is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by-sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published by: Uttarakhand Open University, Haldwani Expert Panel S. No. Name 1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open University, Haldwani 2 Prof. Ashok Panjwani, Professor, MDI, Gurgoan 3 Group Captain Ashok Katariya, Ministry of Defense, New Delhi 4 Mr. Ashutosh Bahuguna, Scientist- CERT-In, Department Of Electronics & Information Technology, Government Of India 5 Mr. Sani Abhilash, Scientist- CERT-In, Department Of Electronics & Information Technology, Government Of India 6 Wing Commander C.S. Chawla, Ministry of Defense, new Delhi 7 Mr. Mukesh Kumar Verma, IT Consultant, Chandigarh 8 Mr. Pritam Dutt Gautam, IT Consultant, New Delhi INDEX 1.1 LEARNING OBJECTIVES...................................................................................................... 1 1.2 HISTORY OF INTERNET....................................................................................................... 1 1.3 HOW INTERNET WORKS? ................................................................................................... 6 1.3.1 Hosts and Domain Names .................................................................................................. 7 1.3.2 Path Name and File Name ................................................................................................. 8 1.4 ADDRESSING SCHEME IN THE INTERNET ..................................................................... 8 1.4.1 IP versions .......................................................................................................................... 8 1.4.2 IPv4 Addresses................................................................................................................... 9 1.4.2.1 Subnetting ................................................................................................................... 9 1.4.2.2 Private Addresses ...................................................................................................... 10 1.4.2.3 IPv4 address exhaustion ............................................................................................ 11 1.4.3 IPv6 Addresses................................................................................................................. 11 1.4.3.1 Private addresses ....................................................................................................... 12 1.4.4 IP Subnetworks ................................................................................................................ 12 1.4.5 IP address assignment ...................................................................................................... 13 1.4.5.1 Methods..................................................................................................................... 13 1.4.5.2 Uses of dynamic address assignment ........................................................................ 13 1.4.5.3 Address autoconfiguration ........................................................................................ 14 1.4.5.4 Uses of static addressing ........................................................................................... 14 1.4.5.5 Conflict ..................................................................................................................... 14 1.4.6 Routing ............................................................................................................................. 14 1.4.6.1 Unicast addressing .................................................................................................... 15 1.4.6.2 Broadcast addressing ................................................................................................ 15 1.4.6.3 Multicast addressing ................................................................................................. 15 1.4.6.4 Anycast addressing ................................................................................................... 15 1.4.7 Public addresses ............................................................................................................... 15 1.4.8 Modifications to IP addressing ........................................................................................ 15 1.4.8.1 IP blocking and firewalls .......................................................................................... 15 1.4.8.2 IP address translation ................................................................................................ 16 1.5 INTERNET SERVICE PROVIDER ...................................................................................... 16 1.5.1 Classification of ISP ........................................................................................................ 16 1.5.1.1 Access providers ISP ................................................................................................ 17 1.5.1.2 Mailbox providers ..................................................................................................... 17 1.5.1.3 Hosting ISPs.............................................................................................................. 17 1.5.1.4 Transit ISP ................................................................................................................ 17 1.5.1.5 Virtual ISPs ............................................................................................................... 18 1.5.1.6 Free ISPs ................................................................................................................... 18 1.5.1.7 Wireless ISP .............................................................................................................. 18 1.6 DOMAIN NAME SYSTEM(DNS) ........................................................................................ 18 1.6.1 How does it work? ........................................................................................................... 18 1.6.1.1Top-Level Domain(TLD) .......................................................................................... 19 1.6.1.2 Second-Level Domain .............................................................................................. 19 1.7 WORLD WIDE WEB(WWW) ............................................................................................... 20 1.7.1 Is Intenet and www similler? ........................................................................................... 21 1.7.1.1 The www ................................................................................................................... 21 1.7.1.2 The Internet ............................................................................................................... 21 1.8 APPLICATION OF INTERNET ............................................................................................ 22 1.9 SUMMARY ............................................................................................................................ 23 1.10 CHECK YOUR PROGRESS ............................................................................................... 24 1.11 ANSWERS TO CHECK YOUR PROGRESS ..................................................................... 24 1.12 MODEL QUESTIONS ......................................................................................................... 24 2.1 LEARNING OBJECTIVES.................................................................................................... 26 2.2 E-GOVERNANCE ................................................................................................................. 26 2.2.1 Benefits of e-governance ................................................................................................. 26 2.2.2 Evlolution of e-governance in India ................................................................................ 28 2.3AIM OF E-GOVERNANCE ................................................................................................... 30 2.4 STAGES OF E-GOVERNANCE ........................................................................................... 30 2.5 MODELS OF E-GOVERNANCE .........................................................................................
Recommended publications
  • Or Based on Where You Live, One of Its Affiliates) and You
    MICROSOFT SOFTWA RE LICENSE TERMS WINDOWS VISTA BUSINESS These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the software named above, which includes the media on which you received it, if any. The terms also apply to any Microsoft · updates, · supplements, · Internet-based services, and · support services for this software, unless other terms accompany those items. If so, those terms apply. By using the software, you accept these terms. If you do not accept them, do not use the software. Instead, return it to the retailer for a refund or credit. If you cannot obtain a refund there, contact Microsoft or the Microsoft affiliate serving your country for information about Microsoft’s refund policies. See www.microsoft.com/worldwide. In the United States and Canada, call (800) MICROSOFT or see www.microsoft.com/info/nareturns.htm. As described below, using the software also operates as your consent to the transmission of certain computer information during activation, validation and for Internet-based services. If you comply with these license terms, you have the rights below for each license you acquire. 1. OVERVIEW. a. Software. The software includes desktop operating system software. This software d oes not include Windows Live services. Windows Live is a service available from Microsoft under a separate agreement. b. License Model. The software is licensed on a per copy per device basis. 2. INSTALLATION A ND USE RIGHTS. Before you use the software under a license, you must assign that license to one device (physical hardware system).
    [Show full text]
  • Microsoft Windows Server 2012 R2 Benchmark
    CIS Microsoft Windows Server 2012 R2 Benchmark v2.2.0 - 04-28-2016 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security. 1 | P a g e Table of Contents Overview ............................................................................................................................................................... 22 Intended Audience ........................................................................................................................................ 22 Consensus Guidance ..................................................................................................................................... 22 Typographical Conventions .....................................................................................................................
    [Show full text]
  • Six Months with Windows® 8 Six Months with Windows® 8
    Six Months with Windows® 8 Six Months with Windows® 8 Contents 1.Introduction Microsoft® Windows 8 has just reached its six-month anniversary 1, 1. Introduction 2 and we at ESET® thought now would be a good time to review where 2. A picture is worth a thousand words 3 things stand with the latest incarnation of Microsoft’s flagship 2.1. Some start-ling behavior 4 operating system. 2.2. Rise of the start menus 4 Today, all of ESET’s software for Windows desktops is compatible 3. The three faces of Windows 8 5 with Windows 8. That is nothing unusual for ESET or other anti- 3.1. The personal computer 5 malware developers, as Microsoft works closely with all anti-malware 3.2. The tablet 6 companies to ensure that their products are ready the same day a new 3.3. The smartphone 7 version of Windows is on stores’ shelves. At ESET, we were actually able to finish compatibility plans early and announced it on our blog before 4. Of tablets and tiles 7 Windows 8 was released.2 4.1. Deep in the heart of Windows 8 8 4.2. Developers take heed 9 Half a year later, most—if not all—other anti-malware companies have their own Windows 8 compatible versions, too. There is nothing 4.3. A small surprise for tablet security 10 unusual or otherwise remarkable about this, but it shows the 5. The Windows 8 threatscape 10 industry’s commitment to keeping computers secure. 5.1. Holding the line 11 5.2.
    [Show full text]
  • Market Overview: Digital Commerce Solutions 2011 by Peter Sheldon for Ebusiness & Channel Strategy Professionals
    November 7, 2011 | Updated: December 5, 2011 Market Overview: Digital Commerce Solutions 2011 by Peter Sheldon for eBusiness & Channel Strategy Professionals Making Leaders Successful Every Day For eBusiness & Channel Strategy Professionals November 7, 2011 | Updated: December 5, 2011 Market Overview: Digital Commerce Solutions 2011 by Peter Sheldon with Zia Daniell Wigder, Brian K. Walker, and Lily Varon EXECUTIVE SUMMARY In the past, online transactions for digital product purchases differed little from physical product purchases, with the exception of the delivery method. However, today’s digitally connected consumer is eschewing the traditional ownership model of buy, download, install, and use. Consumers want access to digital content and services across their connected devices, anytime, anywhere — and are increasingly embracing virtual ownership models that provide access to vast libraries of content, services, and products under subscription, usage, and other ownership models. eBusiness leaders charged with monetizing their firms’ catalog of digital content, software, or online services must find digital commerce solutions that allow flexibility to trial alternative business models while supporting fulfillment across multiple consumer touchpoints. This research provides tactics for selecting digital eCommerce solutions and looks at some of the key solutions available in the market today. TABLE OF CONTENTS NOTES & RESOURCES 2 New Business Models Disrupt The Status Quo Forrester interviewed 10 vendor companies: 4 Demand For Digital
    [Show full text]
  • UNIT-1 E-Governance
    UNIT-1 E-Governance Definition: E-governance, expands to electronic governance, is the integration of Information and Communication Technology (ICT) in all the processes, with the aim of enhancing government ability to address the needs of the general public. The basic purpose of e-governance is to simplify processes for all, i.e. government, citizens, businesses, etc. at National, State and local levels. In short, it is the use of electronic means, to promote good governance. It connotes the implementation of information technology in the government processes and functions so as to cause simple, moral, accountable and transparent governance. It entails the access and delivery of government services, dissemination of information, communication in a quick and efficient manner. Benefits of E-governance:- Reduced corruption High transparency Increased convenience Growth in GDP Direct participation of constituents Reduction in overall cost. Expanded reach of government Through e-governance, the government plans to raise the coverage and quality of information and services provided to the general public, by the use of ICT in an easy, economical and effective manner. The process is extremely complicated which requires, the proper arrangement of hardware, software, networking and indeed re- engineering of all the processes to facilitate better delivery of services. Types of Interactions in E-Governance:- G2G (Government to Government): When the exchange of information and services is within the periphery of the government, is termed as G2G interaction. This can be both horizontal, i.e. among various government entities and vertical, i.e. between national, state and local government entities and within different levels of the entity.
    [Show full text]
  • Windows Vista Ultimate Service Pack 1
    MICROSOFT SOFTWARE LICENSE TERMS WINDOWS VISTA HOME BASIC SERVICE PACK 1 WINDOWS VISTA HOME PREMIUM SERVICE PACK 1 WINDOWS VISTA ULTIMATE SERVICE PACK 1 These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the software named above, which includes the media on which you received it, if any. Printed-paper license terms, which may come with the software, may replace or modify any on-screen license terms. The terms also apply to any Microsoft • updates, • supplements, • Internet-based services, and • support services for this software, unless other terms accompany those items. If so, those terms apply. Some of the terms have changed since the initial release of Windows Vista. The changes include: • details about the number of service connections available • additional information about the activation and validation functions of the software, which determine whether the software is counterfeit, improperly licensed or a non-genuine Windows product • additional privacy disclosures about Internet-based services • description of rights for academic and specific-geographic software • availability of a digital proof of license This list highlights some of those changes. The terms below govern your use of the software. By using the software, you accept these terms. If you do not accept them, do not use the software. Instead, return it to the retailer for a refund or credit. If you cannot obtain a refund there, contact Microsoft or the Microsoft affiliate serving your country for information about Microsoft’s refund policies. See www.microsoft.com/worldwide .
    [Show full text]
  • Mp History, Art & Culture
    MPPSCADDA INFROMATION AND COMMUNICATION TECHNOLOGY CONTENTS ❖ Chapter 1 BASIC COMPUTER AND IT TERMS ❖ Chapter 2 COMPUTERS AND INFORMATION TECHNOLOGY ❖ Chapter 3 COMMUNICATION AND MOBILE TECHNOLOGIES ❖ Chapter 4 ROBOTICS, ARTIFICIAL INTELLIGENCE and CYBER SECURITY ❖ Chapter 5 E-GOVERNANCE ❖ Chapter 6 INTERNET AND SOCIAL NETWORKING SITES ❖ Chapter 7 E-COMMERCE MPPSCADDA 1. BASIC COMPUTER AND IT TERMS INTRODUCTION There are three different types of computers and computer applications that we encounter in daily life. • One, those machines which are dedicated to a limited set of tasks. Familiar domestic appliances like washing machines or microwave oven are operated by an electronic device embedded inside these gadgets. • Two, those that are used for specific and limited number of activities, like playing games and other forms of entertainment. • Third category includes versatile machines capable of doing a multitude of tasks, including surfing the Internet. • In our day-to-day life, we use various electrical and electronic devices such as computers, digital watches, audio systems, CD and DVD players, washing machines and so on. • Outside home we use lifts, metro trains, coin collection systems in public telephone booths, coffee and tea vending machines and so on. These are mostly computer controlled devices. We do not see the ‘computers’; they are embedded inside these devices. • Computers have brought in changes in art and music, photography and animation, editing and publishing. • Digital home theatre systems, DVD players, digital music devices of which the computer forms an integral part, makes entertainment low cost and of high quality. • The Internet has emerged as a convenient means of global communication, information sharing and services.
    [Show full text]