Ministry of External Affairs

The Ministry of External Affairs of India is the government agency responsible for the conduct of foreign relations of India. The Ministry is responsible for the country's representation in the United Nations. It also advises other Ministries and State Governments when the latter have dealings with foreign governments or institutions. They are looking for digital solution to 18 problem statements.
18 Problem Statement
Total Submissions : 0

Several web applications of the Ministry are hosted on the GI Cloud.  The database is being monitored remotely by the project manager through the user ID and password.  Project managers of the web applications do not have any control or access to monitor the vulnerability of the database due to the vulnerability of other web applications hosted sidelines from different Ministries.

Can we have a solution to monitor the database vulnerability on real time basis through a web app remotely.

Special Note:  The solution should support the remote access through the authorised email ID and password via web or mobile app.

Sample Data Required: No

Total Submissions : 0

In present time, cloud offers hosting as a service for the web applications to be launched for the public.  The users are always sceptical about the vulnerability of the cloud environment where applications are to be hosted.  Ministry has several applications hosted on the cloud.  However, Ministry do not have any tool to evaluate the level of vulnerability of the cloud environment.  Can it be possible to develop an applications to scan the whole cloud system remotely by the authorised users of the cloud and receive the report on real time basis.

Special Note:

Sample Data Required: No

Total Submissions : 1

Windows and Linux operating systems are being used in different Departments and Officers of the Ministry.  As per Government of India norms, Open Source Software for the OS as well as for office automation are recommended.  There are hundreds versions of Linux operating system to be used by the users.  Each version has different levels of vulnerability.  How do we ensure the best secured operating system in Linux and ensure the security of all applications installed to the operating system?

Special Note: The application should run in the user’s computer and provide the online alert from time to time about the vulnerability of the operating system.

Sample Data Required: No

Total Submissions : 0

Microsoft Office for windows platform and Libre Office for Linux system are being used in the Ministry for office automation works.  Ministry has no tool to access the vulnerability or infection of these office automation software in the machine.  Ministry is looking for a solution to ensure the data being created by this automation software through an application.

Special Note:  The application should run in the user system locally

Sample Data Required: No

Total Submissions : 0

Normally, the data transmitted between the two applications over the networks are happening without any encryption.  The data being transmitted to another PC are subject to vulnerability at different places like sender’s networks on the transit or receiver’s network.  To ensure the security of the data end-to-end, i.e., from application-to-application, what solutions are provided to ensure this?  Is there any encryption technology (at least 256 AES) to any applications hosted on the cloud.

Special Note: No

Sample Data Required: No

Total Submissions : 0

Several Ministry’s e-Governance applications like MADAD Portal is being accessed globally by the NRIs, PIOs as well as Indians from India.  The users of the portal are submitting their complaints or grievances to be addressed by the Ministry.  Ministry does not have the geographical information about the applicants like from where the applicant has submitted the complaint or grievances.  Can we have the solutions to integrate the geo-tagging information of the application with his or her is portal login

Special Note:  The applications may or may not integrate with the MADAD Portal for integrating the geo-tagging information

Sample Data Required:  No

Total Submissions : 0

In the present global scenario the smart phones with Android, Mac and Blackberry operating systems are mostly used by almost all working classes. It is also understood that smart phones with various apps are most vulnerable to the cyber crimes.  It has also become an obligation to use the smart phones for various purposes like email, chatting, calling, video conferencing, messaging etc. In this context how do we ensure the fool proof security of the data transmitted through these smart phones over the internet including emails.  Is there possibility to track the various data communication through the mobile over the internet?

Special Note: No

Sample Data Required: No

Total Submissions : 0

For the security of emails and notes accessed through Smartphones, how do we ensure encryption of all the mails and the notes saved in the phone?  Can we develop a secured end-to-end encrypted email system for the smart phones?  How can it be possible to isolate the email and notes apps from malicious script installed in the smart phones?

Special Note: No

Sample Data Required: No

Total Submissions : 0

For the internet connectivity to the Government organisations, the lease line circuits are being provided by the National Informatics Centres called the NICNET. However, the NICNET networks provide the interconnections for the domestic networks, and international networks are connected through the international gateway of private service providers.  How do we secure  the data transition over the domestic and international networks.

Special Note: No

Sample Data Required: No

Total Submissions : 0

The most Linux distros don’t allow easily to set up a server with the configuration such as Samba, SMTP pop3, Apache HTTP for the virtual users.  For example, the IMAP libraries are not easily available with the version of kernel deployed with the RHEL.  How do we standardise the system for the same?

Special Note: No

Sample Data Required: No

Total Submissions : 0

A single terminal on network may create vulnerability for entire network. So based on ports open on all the terminals of the network, identify the terminal uploading data from the network on restricted port.

Special Note: Network mapping capabilities from any terminal on networks

Sample Data Required: No

Total Submissions : 0

The virtual dashboard of the applications hosted on the GI Cloud is accessed through the specific browser with certain version. Also it requires the certain operating system in the remote computer. For example, the dashboard of applications hosted on GI cloud is accessed only on Mozilla 26 browser on windows 7 and its lower version. What are the solutions for accessing the virtual dashboard independent of the browser and operating system on the remote computer.

Special Note: No

Sample Data Required: No

Total Submissions : 1

It is possible to take the backup of the hard disk with FAT or NTFS formats by connecting it  to any working computers through the standby connector(parallel to primary hard disk).  However, in case of hard disk with ext3/ext4  formats and  linux environment, the backup of the hard disk by connecting it (parallel to primary hard disk) to any working computer is not possible.  How do we take the backup of hard disk with ext3/ext4 formats or with linux environment?

Special Note: The solution may work  on any platforms (windows or linux).

Sample Data Required: No

Total Submissions : 1

Normally, FTP mode is being used for the software deployment on the cloud platform while hosting any web applications on the Cloud. However, FTP mode is not secured as it does not provide end to end encryption. Can we have a mechanism/tool to deploy the software on cloud for its hosting  with end to end encryption features?

Special Note: No

Sample Data Required: No