Maintaining Information Security in E-Government through Steganology
نویسندگان
چکیده
INTRODUCTION Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of Information Technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructure and technology provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as far as 2004's summer 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet because it would be a waste of resource. However, the Internet is an open environment, protecting the data flowing on the Internet from attacks is therefore a pressing e-government issue. 2 All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO'04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang et al., 2004). From the last decade, steganology – the technique for digitally hiding and detecting information is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security. STEGANOGRAPHY Markus Kahn (1995) defined steganography as " the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, 3 where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by …
منابع مشابه
Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملImplementation Challenges for Information Security Awareness Initiatives in E-Government
With the widespread adoption of electronic government services, there has been a need to ensure a seamless flow of information across public sector organizations, while at the same time, maintaining confidentiality, integrity and availability. Governments have put in place various initiatives and programs including information security awareness to provide the needed understanding on how public...
متن کاملElectronic Educational and Research Services as Infrastructure for the E- Government: Role of
Introduction: Websites serve as an initial step toward an e- government adoption which facilitates delivery of online services to customers. The existing study intended to investigate the role of university website to render educational and research services based on e- government maturity model in Iranian universities. Methods: This descriptive and cross- sectional study was conducted through...
متن کاملInvestigation Of The Requirement &Constraints Affecting Teleworking In Government Institutes; Case Study : Research Institutes of Minister of Roads and Urban Development
Teleworking as an innovative way has many benefits in governmental, organizational and individual levels, but it faced with different variables in plan and implementation which is caused to low acceptance rate in organizations. By identifying and controlling these variables, managers and decision-makers can use teleworking programs in their organizations. The aim of this study is to investigate...
متن کاملInvestigation Of The Requirement &Constraints Affecting Teleworking In Government Institutes; Case Study : Research Institutes of Minister of Roads and Urban Development
Teleworking as an innovative way has many benefits in governmental, organizational and individual levels, but it faced with different variables in plan and implementation which is caused to low acceptance rate in organizations. By identifying and controlling these variables, managers and decision-makers can use teleworking programs in their organizations. The aim of this study is to investigate...
متن کامل