Case Study Special
I read the February issue of Network Magazine and found the case study special
to be an interesting read with its write-ups on key IT deployments from various
verticals, all selectively compiled in a single issue.
I was glad to learn that the government found space in the best of case studies
Wing Comdr. Anurodh Kumar Gupta
IT is the key business enabler for various enterprises across
verticals. We had cover five sections such as Disaster recovery, Servers, Government,
Mobile enablement, document management. These were just a few of the many case
studies that we had covered in 2006.
It is an accepted fact that government departments and corporations
are taking high-tech initiatives with regards to IT deployments and security.
This is also due to the fact that almost all the services offered by these organisations
across the country have an online presence.
We had covered three Governments IT deployments that have
made their mark in terms of services and security. Kalyan-Dombivli Municipal
Corporation (KDMC) on G2C services, the Punjab Governments Department
of ITs (DoIT) security set-up and the EDI deployment executed by Indian
Customs to handle the management of cargo at airport and seaport terminals across
This is with regards to the focus section in the Network Magazine, February
issue. The article titled (Amen!)dments to the Information Technology Act was
very informative and interesting to read.
Recent cases of bank fraud and BPO have resulted in concerns
being raised vis-a-vis the role of data protection. Most such crimes have been
committed via unauthorised access to the electronic accounts of end-customers.
Hence they come under the preview and domain of cyber crimes.
Digital signatures are an application of asymmetric key cryptography
and their security is based upon the fact that it is computationally unfeasible
to compromise the application with the computing power that is currently available.
If due to some technological innovation, a path-breaking
invention or a remarkable discovery, we should be able to overcome this limitation.
If such an eventuality comes to pass, digital signatures will no longer be usable
as authentication mechanisms and the whole legal superstructure built around
the concept will collapse, necessitating an overhaul of the Act itself. We can
only hope that the much needed amendments will be judiciously executed by the
parliamentary standing committee.
Finally an overall feel of the amendments seems to have rectified
most of the drawbacks in the original Act. Despite the Act being in force since
2000 and the increasing use of computers in every sphere, we havent seen
much court action involving the Act.
This is with regards to the News and Analysis section in Network Magazine. I
find the section informative specifically on security aspects. The various the
trends and surveys keep me updated on the latest happenings in IT. Looking forward
to read more such informative and analytical news.
The Ernst and Young security survey, sought the views of nearly
1,200 senior information security professionals in 48 countries, with 144 respondents
from India, representing both multinational and local organisations.
The survey informs that regulatory compliance will continue
to dominate information security, challenging organisations in how they sustain
compliance and integrate it into an overriding risk management framework and
internal control processes.
We always look forward to hearing
from you. Please e-mail your comments, suggestions and queries to email@example.com
or snailmail us at
Business Publications Division
Indian Express Newspapers (Mumbai) Ltd
First Floor, Express Towers
Nariman Point, Mumbai 400021