Computers Security Policy has become a legal and a technical issue of critical importance for many organizations and the Government. With a view to implement proper security, a Security Architecture for the AP Secretariat was evolved and implemented with Firewalls, Intrusion Detection Systems, Access Controls etc.The Security Policy is intended to define what is expected from an organization with respect to security of Information Systems. The overall objective is to control or guide human behaviour in an attempt to reduce the risk to information assets by accident or deliberate actions. Security Policies underpin the security and well being of information resources. They are the foundation, the bottom line, of information security within an organization.
The application architecture options are:
The Components of e-governance architecture are:
Applications Middle ware
All the above components should be scalable and extensible keeping in view of the changing environments.
Click here to download the IT Architecture document
G.O.Ms.No.40 Dated: 14.08.2001
IT&C Dept. – IT Architecture – Issue of mandatory guidelines on conformance to IT Architecture and standards while implementing major IT projects – Orders – Issued.
Download Size: 32 KB
G.O. Ms. No. 13, Dated 23-07-2003
IT & C Department – Data standards and Metadata framework for computerization in Government Departments – Constitution of a Committee – Orders – Issued. Information Technology and Communications Dept.
Download size: 14 KB