Both the computer and the software and data essential elements of a system of information in the digital environment associated with e-government. Computer may be associated with devices and services in the communication network terminal ends or other accounts or specific network facilities. Computing network may be a LAN or private network extended the scope of the government department or ministry concerned as a network intranet, or wide area WAN network as extranet or international information network such as the Internet, may also be linked to external contact is open to any individual provider technological means that enable access to her.
The aim of this research is the security of information systems, protection and availability of resources and its components and work their confidentiality and integrity. Where in the absence of adequate security systems and information and communication technologies, do not use all their capacities and energies. The absence or lack of security in a loss of confidence in the system to stop and not to make the most of it, making it a burden on the organization. On this basis it must protect the system and information from damage that can lead to system failures and loss dating back to their organizations and their staff.
You can identify three main dimensions of the target of various information in security systems, (I) definition: who is allowed to enter the system? Must check it out through three main entrances (II) dependence: once you learn the rules of the real user, the natural next question is what allowed for this person? Thus, an accreditation process based access to resources for this user (iii) Management: representing management saving the user attributes, in addition to the security of a given resource definition. It includes on activities such as the exclusion of the advantages of the arrival of the user or employee leaving the service.
The search results are in four axes task, first (Security Policy: The purpose of information security policy relates to provide appropriate guidance and administrative support to the security of the information and recommendation (II) Security organization: This dimension aims information security management focus in the organization (iii) the security of individuals: the purpose of the after the security of individuals to reduce the risk of human error, theft, embezzlement or misuse of facilities (iv) control of access to information).
Concludes research is the establishment of political, regulatory and legal frameworks to address the matters relating to the dangers of security such as piracy and management of domain names and the protection of citizens, the development of information security policy and encourage the application and adaptation programs and records of e-government, strengthen the expertise and Practice better for the security of information systems through the development of guidance and technical standards on a large scale and use including is a global developer, organize public campaigns to raise awareness aims to improve public knowledge and understanding of the importance of information and intellectual property rights and the protection of security software.