A Case Study: Risk Rating Methodology for E Governance Application Security Risks

B. S. Kumar*, V. Sridhar**, K. R. Sudhindra***
*Department of Electronics and Communication Engineering, PES College of Engineering, Mandya, India.
**Department of Electronics and Communication Engineering, NMIT Bangalore, India.
***Department of Electronics and Communication Engineering, B.M.S. College of Engineering, Bangalore, India.
Periodicity:January - March'2019


Over last few years, e governance in India has made rapid progress and adopted global best practices in terms of citizen-centricity, reach, connectivity, efficiency, transparency, accountability and availability. Multiple modes and ease of access, seamless connectivity and availability, user friendliness and efficiency of e Governance services have opened up avenues making e-Governance services most prone to serious security risks. International trends and domestic experiences show that the e-governance services are constant target of organized crime by hackers and prominent government sites are being probed daily. The security threat landscape for e Governance applications constantly changes and new type of vulnerabilities keeps manifesting. In today’s race to build cutting-edge e Governance business solutions, web applications are being developed and deployed with lesser attention to critical and widespread security threats. Government can no longer afford to tolerate security issues with high risk values which could hinder delivery of services and impact the confidentiality, integrity and availability of information. To mitigate with appropriate countermeasures and security controls, it is required to evaluate and estimate risks associated with e-Governance applications security issues that can be exploited. In this context, this paper outlines the risk rating methodology from e Governance perspective to estimate risk associated with security issues at application layer that are critical and widespread.


Application Risk Rating Methodology, Overall Risks Score, Injection Attack, Threat Agent, Technical Impact.

How to Cite this Article?

Kumar, B. S., Sridhar, Sudhindra, K. R. (2019). A Case Study: Risk Rating Methodology for E Governance Application Security Risks, i-manager's Journal on Software Engineering, 13(3), 39-45.


Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.