The Development Of The Egovernment

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

1.0 Introduction

Nowadays the area of internet was begun more expanded and popularity, cause everyone would using computer to process their requirement on the internet. Therefore, the Multimedia Super Corridor (MSC) has been launched and providing an ideal communication or service environment for the citizens, which purpose to improve more efficiency for our nation and government. But it also included some disadvantage within this development, so in this assignment we would discuss about the E-Government.

In this assignment, it has been recognized in four sections, which are introduction, content conclusion and references, each section would go in to details. First of all, in first question we would talk about some security issues of information and communication technology (ICT). During this section, we would discuss how it affected the public sector and private sector in our country. After that, in second question, we will explain the integration framework and four main components as well.

As a conclusion, although most of the resources of this assignment are taken from internet and reference book, the purpose of this assignment is to present as clearly and completely as possible, the characteristics and nature of today government.

2.0 Definition of question 1

In October 2000, the "Government Information and Communications Technology (ICT) Security Framework" was published to complement the earlier documents, such as the "Security directive Manual". The framework elaborates on the security measurement to encompass the technology networked nature of today’s world. Indeed, the framework is a key contribution towards the development of the public sector ICT security initiative.

The document addresses issue of confidentiality, integrity, availability, non-repudiation and authenticity as well. Recognizing the importance of the data and data ownership and providing the coverage on security measures as well as the role and responsibilities of members within the agency, the framework goes as far as to mandate the appointment of ICT Security Officers in ministries and departments who are responsible to conduct risk analysis and security program based on standard, guidelines, and ICT security measures.

Drawing from the essential principles set by the "Government ICT Security Framework," the Malaysian Public Sector Management of ICT Security Handbook (MyMIS) was published in January 2002. MyMIS covers a diverse range of topic ranging from the identification of risks and threats, roles and responsibilities for ICT security, to the investigation of computer crime. MyMIS serves as a detailed guide for ICT Security infrastructure development and management. It also includes templates, checklists, and procedures that can serve as a guide for public sector agencies in the development of ICT security policy for the respective organization.

3.0 Security issues

4.1 Integrity.

Integrity is a security relation that ensure between the sender with the receiver, even though it’s consider some business processing or commercial organization which is not without some spoofing in this movement. Actually, there are many people are using e-mail or some internet technology to processing their communicate and business, in this movement maybe their detail or information will be recording into another website, for example like spoofing.

Issue of integrity

The issue of integrity is spoofing. Spoofing is the practice of deceiving the people that is into believe some e-mail or website originates from a source that it is does not at all. The most common type of spoofing is web page spoofing, but mail spoofing and IP spoofing are also very popular.

4.2 Non-repudiation.

Non-repudiation is reference to digital security, its means to ensure that a transferred message has been sent and received by the parties claiming. In addition non-repudiation is a way of guarantee that the sender of the message cannot having sent the message and the recipient cannot be deny received the message. It also can be obtained to through of the use like digital signatures and confirmation services.

Issue of non-repudiation.

In this case, if the users are into the issue of non-repudiation, the sender and the recipient will cannot be deny received the message or sent the message. If it is using in commercial ordered, there are the problem in marketing network system.

4.3 Authenticity.

In authenticity, the characteristic of a document or record for created by the entity represented as it is a creator, and it is preserved into the original form without some tampering and falsification. In fact the genuine signature is usually the best proof of the authenticity.

Issue of Authenticity

The issue of authenticity is phishing. Phishing is an email fraud method in which the perpetrator send out legitimate for looking email into the attempt to gather financial and personal information from the recipient. In addition, the messages appear to come from well trustworthy website. Some of the frequently spoofed by phishers are including eBay, MSN, Yahoo and each other. The phishing expedition like the fishing expedition it is the name for, some of the phishes like to put the lure hoping to fool at least a few preys that encounter bait.

4.4 Confidentiality

Confidentiality is an ability that can be ensuring the message and data should available only for those authorized to view. Now a day some of the business relationship between the companies are mutual want to know mutual confidentially, that are the good opportunity for sniffer who are the theft the information to know about in is into the all confidential information.

Issue of confidentiality

The issue of confidentiality is sniffing. Some of the sniffer can be a hardware device or the software program with the firmware programming. Usually Sniffer is a wire-tap devices that plugs into the computer networks and eavesdrops on to networks traffic.

4.6 Availability

The meaning of availability is to ensure the system ability to continue intended and function. Usually it is provided through some redundancy, which is often referred to denial-of –service. For example it will give some virus.

Issue of availability

The issue of availability is virus that is incorrect problem software program for can’t be functioning well. Some of the virus will attach to user files or boot sectors and order to copy the user do not know, and then spread the virus to other.

4.0 Definition of question 2

An implementation framework is designed to guide and manage the execution of the E-Government strategy. This framework is an adaptation of Accenture’s Business Integration Framework and can be broken down into four main components:

Programme Management

Technology

Process

People

Each E-Government project has its own version of the framework, where elements within the four components may differ according to the individual agency’s business or technical needs.

5.0 Programme Management

The Programme Management component is critical in ensuring that the development of the e-Government flagship as a whole as coordinated, timely and meets its objectives. A Programme Management group in MAMPU, as described in the next chapter, provides management, guidance and advisory services to project teams as well as ensures the application of common standards and guidelines across all projects. Such common standards and guidelines include systems design and testing, graphical user interface, business process reengineering, transition planning, security, benefits capture and many more.

Each application or project within E-Government is headed by a lead agency, which wears the Project Manager’s hat and has its own Project Management Team. While the ownership of the projects lies with the lead agencies, as custodian of the E-Government flagship, MAMPU assists by providing consultancy and project management services.

5.0 Technology

The Technology component addresses the implementation of new emerging technologies in the government environment: finding the right technology that supports the new processes, as well as providing information and tools that support the users.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now