news details |
|
|
| Public Key Infrastructure, the Technology to facilitate e-Governance | | | Jammu Dec 5 The revolution in information Technology has has given birth to financial frauds, credit card theft, identity theft, cyber blackmailing, cyber squatting, Trade secret thefts copy right related theft offences . This was disclosed by Sadhashiv Puri, Spokesman of the company M/S Jammu & Kashmir system cybernetics ltd in a press conference held here today. He further said that the recent examples are Baazi.com and hacking of UTI Bank website although govt of India has formulated e-Governance plan (2003-2007) under which services like income tax ,Passport / Visa, Company Affairs, Central excise, Pensions, Land records, Road transport, Gram panchayats, Police, Employment exchange and e-courts have been covered, Yet the privacy/confidentiality, Integrity, authentication and Non- reputation are few challenges to implement e-Governance in the country. He further said that Public Key Structure is the latest technology, which is being used as shield against the challenges. Puri explained that a public key infrastructure consists of certifying authorities like (n) code solutions which issue the Digital Signature Certificate, Local Registration Authority like Cyber system which authorize the binding between Public Key and certificate holder, Certificate holders which are the subjects Relying parties which validate signatures and certificate pattern. On the occasion ,Kahkashan Majeed, the channel partner of the company told that (n) code solutions issues all kinds of DSCs like class I/IIa/IIIa for individuals,ClassIIb/IIIb for organization and government, and classIIIc for server/ Devices security., she added.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
| |
|
|
|
|
 |
|
|