Ministry of External Affairs

The Ministry of External Affairs of India is the government agency responsible for the conduct of foreign relations of India. The Ministry is responsible for the country's representation in the United Nations. It also advises other Ministries and State Governments when the latter have dealings with foreign governments or institutions. They are looking for digital solution to 18 problem statements.
Total Submissions : 7

 

Several web applications of the Ministry are hosted on the  Government of India cloud (http://cloud.gov.in).  The web server and database server hosted on the Cloud  are being monitored remotely by the project manager through login credentials.

Can we have a solution to monitor the database vulnerabilities on real time basis remotely?

Special Note: No

Sample Data required : No

Total Submissions : 2

In present time, cloud offers hosting as a service for the web applications to be launched for the public.  The users are always sceptical about the vulnerability of the cloud environment where applications are to be hosted.  Ministry has several applications hosted on the cloud.  However, Ministry do not have any tool to evaluate the level of vulnerability of the cloud environment.  Can it be possible to develop an applications to scan the whole cloud system remotely by the authorised users of the cloud and receive the report on real time basis.

Special Note:

Sample Data Required: No

Total Submissions : 4

Open Source Software (OSS) usage is on an increase. There are many distributions and applications thereon to choose from. What could be the best possible mix of OSS distribution and applications for security and user experience points of view? A software driven solution for testing vulnerability of such OSS distribution and applications thereon may also be suggested.

Special Note: No

Sample Data required : No

Total Submissions : 1

Microsoft Office for windows platform and Libre Office for Linux system are being used in the Ministry for office automation works.  Ministry has no tool to access the vulnerability or infection of these office automation software in the machine.  Ministry is looking for a solution to ensure the data being created by this automation software through an application.

Special Note:  The application should run in the user system locally

Sample Data Required: No

Total Submissions : 15

Normally, the data transmitted between the two applications over the networks are happening without any encryption.  The data being transmitted to another PC are subject to vulnerability at different places like sender’s networks on the transit or receiver’s network.  To ensure the security of the data end-to-end, i.e., from application-to-application, what solutions are provided to ensure this?  Is there any encryption technology (at least 256 AES) to any applications hosted on the cloud.

Special Note: No

Sample Data Required: No

Total Submissions : 12

Several Ministry’s e-Governance applications like MADAD Portal is being accessed globally by the NRIs, PIOs as well as Indians from India.  The users of the portal are submitting their complaints or grievances to be addressed by the Ministry.  Ministry does not have the geographical information about the applicants like from where the applicant has submitted the complaint or grievances.  Can we have the solutions to integrate the geo-tagging information of the application with his or her is portal login

Special Note:  The applications may or may not integrate with the MADAD Portal for integrating the geo-tagging information

Sample Data Required:  No

Total Submissions : 11

In the present global scenario the smart phones with Android, Mac and Blackberry operating systems are mostly used by almost all working classes. It is also understood that smart phones with various apps are most vulnerable to the cyber crimes.  It has also become an obligation to use the smart phones for various purposes like email, chatting, calling, video conferencing, messaging etc. In this context how do we ensure the fool proof security of the data transmitted through these smart phones over the internet including emails.  Is there possibility to track the various data communication through the mobile over the internet?

Special Note: No

Sample Data Required: No

Total Submissions : 4

For the security of emails and notes accessed through Smartphones, how do we ensure encryption of all the mails and the notes saved in the phone?  Can we develop a secured end-to-end encrypted email system for the smart phones?  How can it be possible to isolate the email and notes apps from malicious script installed in the smart phones?

Special Note: No

Sample Data Required: No

Total Submissions : 2

For the internet connectivity to the Government organisations, the lease line circuits are being provided by the National Informatics Centres called the NICNET. However, the NICNET networks provide the interconnections for the domestic networks, and international networks are connected through the international gateway of private service providers.  How do we secure  the data transition over the domestic and international networks.

Special Note: No

Sample Data Required: No

Total Submissions : 0

The most Linux distros don’t allow easily to set up a server with the configuration such as Samba, SMTP pop3, Apache HTTP for the virtual users.  For example, the IMAP libraries are not easily available with the version of kernel deployed with the RHEL.  How do we standardise the system for the same?

Special Note: No

Sample Data Required: No

Total Submissions : 6

Normally, FTP mode is being used for the software deployment on the cloud platform while hosting any web applications on the Cloud. However, FTP mode is not secured as it does not provide end to end encryption. Can we have a mechanism/tool to deploy the software on cloud for its hosting  with end to end encryption features?

Special Note: No

Sample Data Required: No